CN107066840A - The acquisition methods and device of data - Google Patents
The acquisition methods and device of data Download PDFInfo
- Publication number
- CN107066840A CN107066840A CN201710210468.7A CN201710210468A CN107066840A CN 107066840 A CN107066840 A CN 107066840A CN 201710210468 A CN201710210468 A CN 201710210468A CN 107066840 A CN107066840 A CN 107066840A
- Authority
- CN
- China
- Prior art keywords
- application program
- authorization message
- verified
- acquisition
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 238000013475 authorization Methods 0.000 claims abstract description 109
- 238000012545 processing Methods 0.000 claims description 16
- 230000005540 biological transmission Effects 0.000 claims description 6
- 238000009826 distribution Methods 0.000 abstract description 14
- 230000008569 process Effects 0.000 abstract description 11
- 238000003860 storage Methods 0.000 description 17
- 238000004590 computer program Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 238000011161 development Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
- G06Q20/123—Shopping for digital content
- G06Q20/1235—Shopping for digital content with control of digital rights management [DRM]
Abstract
The invention discloses a kind of acquisition methods of data and device, it is related to Internet technical field, the problem of main purpose is to solve developer in the prior art operating process is complicated cumbersome in distribution authorization code, the step of authorization code is distributed can be simplified cumbersome.The main technical schemes of the present invention include:Application program identification information and authorization message to be verified are included in the acquisition solicited message for the application program that receiving terminal is sent, the acquisition solicited message;The legitimacy of authorization message to be verified according to the application program identification Information Authentication;If the authorization message to be verified is legal, allow to obtain application program.The present invention is obtained applied to terminal during the licensing of application program.
Description
Technical field
The present invention relates to Internet technical field, the acquisition methods and device of more particularly to a kind of data.
Background technology
With the fast development of Internet technology, the use of internet is more and more extensive, and what it is with fast development is each
Developer promotes the application program of its exploitation using Internet technology.
It is each one authorization code of application assigned for example, developer is in popularization and application program, user is to developer
Apply authorization code after, can application and popularizations application program.But, during implementing, developer distributes to user
, it is necessary to which all authorization codes are carried out with unified management during authorization code, and in distribution authorization code, operating process complexity is cumbersome.
The content of the invention
In view of this, the acquisition methods and device for a kind of data that the present invention is provided, main purpose is to solve existing skill
Developer can simplify the step of authorization code is distributed cumbersome the problem of operating process is complicated cumbersome in distribution authorization code in art.
In order to solve the above problems, present invention generally provides following technical scheme:
In a first aspect, the invention provides a kind of acquisition methods of data, this method includes:
Application program mark is included in the acquisition solicited message for the application program that receiving terminal is sent, the acquisition solicited message
Know information and authorization message to be verified;
The legitimacy of authorization message to be verified according to the application program identification Information Authentication;
If the authorization message to be verified is legal, allow to obtain application program.
Optionally, before the legitimacy of authorization message to be verified according to the application program identification Information Authentication,
Methods described also includes:
Receive and store the application program record information of third party developer's transmission;Included in the record information and apply journey
The authorization message of sequence identification information, application program.
Optionally, the legitimacy of authorization message to be verified includes according to the application program identification Information Authentication:
According to the authorization message of the corresponding application program of the application program identification acquisition of information;
The authorization message of the application program is compared with the authorization message to be verified;
If the authorization message of the application program is consistent with the authorization message to be verified, it is determined that the mandate to be verified
It is legal.
Optionally, application program expenses standard is also included in the record information, before allowing to obtain application program, institute
Stating method also includes:
Obtain the available balance of stored value card in terminal;
Calculate whether the available balance meets default balance threshold according to the application program expenses standard;
It is described to allow acquisition application program also to include:
If meeting, allow to obtain the application program.
Optionally, methods described also includes:
The end for receiving the application program that the terminal is sent uses instruction;
Corresponding expense is deducted from the available balance of the stored value card according to the application program expenses standard.
Second aspect, the present invention also provides a kind of acquisition device of data, and the device includes:
First receiving unit, the acquisition solicited message of the application program sent for receiving terminal, the acquisition request letter
Application program identification information and authorization message to be verified are included in breath;
Authentication unit, for according to the application program identification Information Authentication that first receiving unit is received
The legitimacy of authorization message to be verified;
Processing unit, for when the authentication unit verifies that the authorization message to be verified is legal, it is allowed to obtain application
Program.
Optionally, described device also includes:
Second receiving unit, for the authentication unit according to the application program identification Information Authentication it is to be verified
Before the legitimacy of authorization message, the application program record information that third party developer sends is received;Wrapped in the record information
Information containing application program identification, the authorization message of application program;
Memory cell, the record information for second receiving unit to be received is stored.
Optionally, the authentication unit includes:
Acquisition module, for the authorization message according to the corresponding application program of the application program identification acquisition of information;
Comparing module, to be verified is awarded for the authorization message of the application program that obtains the acquisition module with described
Power information is compared;
Determining module, the authorization message for the application program when the comparison module to be verified is awarded with described
When power information is consistent, determine that the mandate to be verified is legal.
Optionally, application program expenses standard is also included in the record information, described device also includes:
Acquiring unit, for before the processing unit allows to obtain application program, obtaining stored value card in terminal
Available balance;
Computing unit, the application program expenses standard for being obtained according to the acquiring unit calculate it is described can be more than
Whether volume meets default balance threshold;
The processing unit, is additionally operable to when computing unit determines that the application program expenses standard calculates the available balance
When meeting the default balance threshold, it is allowed to obtain the application program.
Optionally, described device also includes:
3rd receiving unit, the end for receiving the application program that the terminal is sent uses instruction;
Unit is deducted, for deducting phase from the available balance of the stored value card according to the application program expenses standard
Answer expense.
By above-mentioned technical proposal, the technical scheme that the present invention is provided at least has following advantages:
Acquisition methods and device based on data that the present invention is provided, the application program that server receiving terminal is sent is obtained
Solicited message is taken, application program identification information and authorization message to be verified are included in the acquisition solicited message, according to application program
Identification information verifies the legitimacy of authorization message to be verified, if authorization message to be verified is legal, allows to obtain application program, with
Prior art is compared, and the present invention is managed on behalf of another the distributed tasks of authorization message by server, rather than is to go management by developer oneself
Distribution authorization information, the step of reducing developer's independent distribution authorization information, making the process of distribution authorization information becomes simple.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can
Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit is common for this area
Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention
Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows a kind of flow chart of the acquisition methods of data provided in an embodiment of the present invention;
Fig. 2 shows a kind of block schematic illustration of system provided in an embodiment of the present invention;
Fig. 3 shows a kind of composition frame chart of the acquisition device of data provided in an embodiment of the present invention;
Fig. 4 shows the composition frame chart of the acquisition device of another data provided in an embodiment of the present invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
Complete conveys to those skilled in the art.
The embodiments of the invention provide a kind of acquisition methods of data, this method is applied to server side, as shown in figure 1,
Methods described includes:
101st, included in the acquisition solicited message for the application program that server receiving terminal is sent, the acquisition solicited message
Application program identification information and authorization message to be verified.
As shown in Fig. 2 Fig. 2 shows a kind of block schematic illustration of system provided in an embodiment of the present invention, the system is included
Server, terminal (N is more than 2), third party developer, wherein, server is proxy server, substitutes developer in the prior art
Distribution authorization information, the work for verifying authorization message, terminal, for being interacted with server, to obtain application program;3rd
There is provided each application program and its corresponding authorization message by square developer.
When terminal obtains application program, without being interacted with third party developer, but directly enter with server
Row interaction, in this way, just making warrant distributing become simpler, flexible without the independent distribution authorization information of each developer.It is first
First, terminal to server sends the acquisition request of application program, comprising application program and to be verified awards in the acquisition solicited message
Information is weighed, wherein, the authorization message to be verified is that terminal is obtained by predetermined form, including but not limited to following interior
Hold, for example:By scanning the forms such as Quick Response Code, short message, mailbox, specifically, the embodiment of the present invention is not limited.
102nd, the legitimacy of server authorization message to be verified according to the application program identification Information Authentication.
Server is local according to its after the application program identification information and authorization message to be verified of terminal transmission is received
The application program identification information and authorization message of storage verify the accuracy of authorization message to be verified, however, it is determined that mandate to be verified
Information is legal (consistent with the authorization message being locally stored), then continues executing with step 103;If it is determined that authorization message to be verified does not conform to
Method (inconsistent with the authorization message that is locally stored), then refuse terminal and use application program.
As the optional mode of the embodiment of the present invention, when in multiple (three times) the acquisitions solicited message that same terminal is sent
Comprising authorization message to be verified it is illegal when, within a predetermined period of time (such as 10 minutes) reject the terminal continue send out
The acquisition solicited message sent, until please more than the acquisition for after predetermined amount of time (such as 10 minutes), continuing to terminal transmission
Seek information;Wherein, predetermined amount of time can also be 5 minutes, 15 minutes etc., specifically, the embodiment of the present invention is not limited.
If the 103, the authorization message to be verified is legal, server allows to obtain application program.
Acquisition methods provided in an embodiment of the present invention based on data, the application program that server receiving terminal is sent is obtained
Solicited message is taken, application program identification information and authorization message to be verified are included in the acquisition solicited message, according to application program
Identification information verifies the legitimacy of authorization message to be verified, if authorization message to be verified is legal, allows to obtain application program, with
Prior art is compared, and the embodiment of the present invention is managed on behalf of another the distributed tasks of authorization message by server, rather than is by developer oneself
Go to manage distribution authorization information, the step of reducing developer's independent distribution authorization information becomes the process of distribution authorization information
Obtain simply.
Further, as the refinement and extension to above-described embodiment, step 102 is being performed according to the application program mark
Know before the legitimacy of authorization message to be verified described in Information Authentication, server also needs to obtain the Shen of third party developer first
It please authorize, a variety of application programs are included in the server, different application programs may be from different developers, it is also possible to
From same developer, do not limit specifically.
After the application mandate of third party developer is obtained, the application program of third party developer's transmission can be received and stored
Application program identification information, authorization message of application program etc. are included in record information, the record information.
Corresponding relation between identification information and authorization message of the server based on the application program stored, according to institute
The legitimacy of authorization message to be verified described in application program identification Information Authentication is stated, can use but be not limited to following methods:
According to the authorization message of the corresponding application program of the application program identification acquisition of information;By the authorization message of the application program
It is compared with the authorization message to be verified;If the authorization message of the application program and the authorization message one to be verified
Cause, it is determined that the mandate to be verified is legal.The process, comparison be authorization message to be verified and the authorization message that has stored it
Between uniformity, if unanimously, it is legal;It is illegal if inconsistent.
The application scenarios of an embodiment of the present invention provided below, the application scenarios are related to terminal and are using application program
When, the scene charged on time or in due order.A stored value card service is provided in terminal, user can deposit in the stored value card
The certain amount of money of storage, after using application program, to deduct corresponding expense.Said from server side, receiving third party
Also include application program expenses standard in the record information that developer sends, in order to ensure having foot in the stored value card in terminal
A kind of SS services are provided in the enough amount of money of deducting fees, server, the SS is serviced for before terminal obtains application program, obtaining eventually
Whether the available balance of stored value card in end, meet according to the application program expenses standard calculating available balance more than presetting
Volume threshold value.In the embodiment of the present invention, application program expenses standard developer according to having had what experience was voluntarily set, generally comprise by
Charged according to access times, according to using duration, according to the milimeter number that uses charge etc..Default balance threshold is also
Developer is according to a parameter information for having had experience to set, for example, default balance threshold is 0.5 yuan, 1 yuan etc..Specifically,
The embodiment of the present invention is not limited application program expenses standard and default balance threshold.
In order to make it easy to understand, illustrating in exemplary fashion below.It is assumed that application program expenses standard is to receive per hour
2 yuan are taken, comprising being discontented with 1 hour, was collected by 1 hour, it is 0.5 yuan to preset balance threshold;The first situation, it is assumed that terminal electricity
Available balance in sub- wallet is 2 yuans, calculate available balance be 2 yuan with 2 yuan of expenses standard/when difference be 0,0 to be less than in advance
If balance threshold is 0.5 yuan, then terminal is allowed to obtain application program.Second of situation, it is assumed that available in terminal electronic wallet
Remaining sum is 0.3 yuan, calculate available balance be 0.3 yuan with 2 yuan of expenses standard/when difference be -1.7, | -1.7 | more than presetting
Balance threshold is 0.5 yuan, therefore, and server refusal terminal obtains application program.As the alternative of inventive embodiments, when true
When determining to put the available balance deficiency in wallet in terminal, the prompt message that output display is please supplemented with money in time, to avoid delaying use
Family uses application program.These are only exemplary citing, limited about the concrete numerical value that occurs in example, can not as pair
The restriction of particular content.
Terminal is got after application program, using the application program, when user's operation terminal stops using this to apply journey
Sequence, then terminal can to server send application program end using instruct, server receive this terminate using instruction after,
Application program expenses standard in record information deducts corresponding expense from the available balance of the stored value card.
Further, as the realization to method shown in above-mentioned Fig. 1, another embodiment of the present invention additionally provides a kind of data
Acquisition device.The device embodiment is corresponding with preceding method embodiment, and for ease of reading, present apparatus embodiment is no longer to foregoing
Detail content in embodiment of the method is repeated one by one, it should be understood that the device in the present embodiment can be corresponded to before realizing
State the full content in embodiment of the method.
The embodiment of the present invention provides a kind of acquisition device of data, as shown in figure 3, described device includes:
First receiving unit 21, the acquisition solicited message of the application program sent for receiving terminal, the acquisition request
Application program identification information and authorization message to be verified are included in information;
Authentication unit 22, for the application program identification Information Authentication received according to first receiving unit 21
The legitimacy of the authorization message to be verified;
Processing unit 23, for when the authentication unit 22 verifies that the authorization message to be verified is legal, it is allowed to obtain
Application program.
Further, as shown in figure 4, described device also includes:
Second receiving unit 24, for being treated in the authentication unit 22 according to the application program identification Information Authentication
Before the legitimacy for verifying authorization message, the application program record information that third party developer sends is received;The record information
In include application program identification information, the authorization message of application program;
Memory cell 25, the record information for second receiving unit 24 to be received is stored.
Further, as shown in figure 4, the authentication unit 22 includes:
Acquisition module 221, for the authorization message according to the corresponding application program of the application program identification acquisition of information;
Comparing module 222, for the authorization message of the application program that obtains the acquisition module with it is described to be tested
Card authorization message is compared;
Determining module 223, for the application program when the comparison module authorization message with it is described to be tested
When card authorization message is consistent, determine that the mandate to be verified is legal.
Application program expenses standard is also included in the record information, as shown in figure 4, described device also includes:
Acquiring unit 26, for before the processing unit 23 allows to obtain application program, obtaining electronic money in terminal
The available balance of bag;
Computing unit 27, for can described in being calculated according to the application program expenses standard that the acquiring unit 26 is obtained
Whether meet default balance threshold with remaining sum;
The processing unit 23, is additionally operable to when computing unit 27 determines that the application program expenses standard can be used described in calculating
When remaining sum meets the default balance threshold, it is allowed to obtain the application program.
Further, as shown in figure 4, described device also includes:
3rd receiving unit 28, the end for receiving the application program that the terminal is sent uses instruction;
Unit 29 is deducted, for being deducted according to the application program expenses standard from the available balance of the stored value card
Corresponding expense.
Acquisition device provided in an embodiment of the present invention based on data, the application program that server receiving terminal is sent is obtained
Solicited message is taken, application program identification information and authorization message to be verified are included in the acquisition solicited message, according to application program
Identification information verifies the legitimacy of authorization message to be verified, if authorization message to be verified is legal, allows to obtain application program, with
Prior art is compared, and the embodiment of the present invention is managed on behalf of another the distributed tasks of authorization message by server, rather than is by developer oneself
Go to manage distribution authorization information, the step of reducing developer's independent distribution authorization information becomes the process of distribution authorization information
Obtain simply.
The data processing equipment based on encryption lock includes processor and memory, and above-mentioned authentication unit, first receive
Unit, acquiring unit and transmitting element etc. in memory, storage are stored in by computing device as program unit storage
Said procedure unit in device realizes corresponding function.
Kernel is included in processor, is gone in memory to transfer corresponding program unit by kernel.Kernel can set one
Or more, solve in the prior art computer data is being carried out using hardware encryption lock to protect by adjusting kernel parameter
The problem of Cheng Zhong, hardware encryption lock is inconvenient to carry, and easy to lose.
Memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/
Or the form, such as read-only storage (ROM) or flash memory (flash RAM) such as Nonvolatile memory, memory is deposited including at least one
Store up chip.
Present invention also provides a kind of computer program product, when being performed on data processing equipment, it is adapted for carrying out just
The program code of beginningization there are as below methods step:The acquisition solicited message for the application program that receiving terminal is sent, the acquisition please
Ask and application program identification information and authorization message to be verified are included in information;According to the application program identification Information Authentication
The legitimacy of authorization message to be verified;If the authorization message to be verified is legal, allow to obtain application program.
In the above embodiment of the present invention, the description to each embodiment all emphasizes particularly on different fields, and does not have in some embodiment
The part of detailed description, may refer to the associated description of other embodiment.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program
Product.Therefore, the application can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.Moreover, the application can be used in one or more computers for wherein including computer usable program code
The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The application is the flow with reference to method, equipment (system) and computer program product according to the embodiment of the present application
Figure and/or block diagram are described.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which is produced, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net
Network interface and internal memory.
Memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/
Or the form, such as read-only storage (ROM) or flash memory (flash RAM) such as Nonvolatile memory.Memory is computer-readable Jie
The example of matter.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved
State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus
Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein
Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability
Comprising so that process, method, commodity or equipment including a series of key elements are not only including those key elements, but also wrap
Include other key elements being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including key element
Also there is other identical element in process, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product.
Therefore, the application can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Form.Deposited moreover, the application can use to can use in one or more computers for wherein including computer usable program code
The shape for the computer program product that storage media is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
Embodiments herein is these are only, the application is not limited to.To those skilled in the art,
The application can have various modifications and variations.All any modifications made within spirit herein and principle, equivalent substitution,
Improve etc., it should be included within the scope of claims hereof.
Claims (10)
1. a kind of acquisition methods of data, it is characterised in that including:
Application program identification letter is included in the acquisition solicited message for the application program that receiving terminal is sent, the acquisition solicited message
Breath and authorization message to be verified;
The legitimacy of authorization message to be verified according to the application program identification Information Authentication;
If the authorization message to be verified is legal, allow to obtain application program.
2. according to the method described in claim 1, it is characterised in that treated according to the application program identification Information Authentication
Before the legitimacy for verifying authorization message, methods described also includes:
Receive and store the application program record information of third party developer's transmission;Application program mark is included in the record information
Know information, the authorization message of application program.
3. method according to claim 2, it is characterised in that to be tested according to the application program identification Information Authentication
The legitimacy of card authorization message includes:
According to the authorization message of the corresponding application program of the application program identification acquisition of information;
The authorization message of the application program is compared with the authorization message to be verified;
If the authorization message of the application program is consistent with the authorization message to be verified, it is determined that to be verified authorize is closed
Method.
4. method according to claim 2, it is characterised in that also charge and mark comprising application program in the record information
Standard, before allowing to obtain application program, methods described also includes:
Obtain the available balance of stored value card in terminal;
Calculate whether the available balance meets default balance threshold according to the application program expenses standard;
It is described to allow acquisition application program also to include:
If meeting, allow to obtain the application program.
5. method according to claim 4, it is characterised in that methods described also includes:
The end for receiving the application program that the terminal is sent uses instruction;
Corresponding expense is deducted from the available balance of the stored value card according to the application program expenses standard.
6. a kind of acquisition device of data, it is characterised in that including:
In first receiving unit, the acquisition solicited message of the application program sent for receiving terminal, the acquisition solicited message
Include application program identification information and authorization message to be verified;
Authentication unit, for be tested according to the application program identification Information Authentication that first receiving unit is received
Demonstrate,prove the legitimacy of authorization message;
Processing unit, for when the authentication unit verifies that the authorization message to be verified is legal, it is allowed to obtain application program.
7. device according to claim 6, it is characterised in that described device also includes:
Second receiving unit, for the mandate to be verified according to the application program identification Information Authentication in the authentication unit
Before the legitimacy of information, the application program record information that third party developer sends is received;Being included in the record information should
With program identification information, the authorization message of application program;
Memory cell, the record information for second receiving unit to be received is stored.
8. device according to claim 7, it is characterised in that the authentication unit includes:
Acquisition module, for the authorization message according to the corresponding application program of the application program identification acquisition of information;
Comparing module, the authorization message of the application program for the acquisition module to be obtained is believed with to be verified authorize
Breath is compared;
Determining module, authorization message and to be verified authorize for the application program when the comparison module are believed
When ceasing consistent, determine that the mandate to be verified is legal.
9. device according to claim 7, it is characterised in that also charge and mark comprising application program in the record information
Standard, described device also includes:
Acquiring unit, for before the processing unit allows to obtain application program, stored value card to be available in acquisition terminal
Remaining sum;
Computing unit, the application program expenses standard for being obtained according to the acquiring unit, which calculates the available balance, is
It is no to meet default balance threshold;
The processing unit, is additionally operable to when computing unit determines that the application program expenses standard calculates the available balance and met
During the default balance threshold, it is allowed to obtain the application program.
10. device according to claim 9, it is characterised in that described device also includes:
3rd receiving unit, the end for receiving the application program that the terminal is sent uses instruction;
Unit is deducted, for deducting corresponding expense from the available balance of the stored value card according to the application program expenses standard
With.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710210468.7A CN107066840A (en) | 2017-03-31 | 2017-03-31 | The acquisition methods and device of data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710210468.7A CN107066840A (en) | 2017-03-31 | 2017-03-31 | The acquisition methods and device of data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107066840A true CN107066840A (en) | 2017-08-18 |
Family
ID=59601552
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710210468.7A Pending CN107066840A (en) | 2017-03-31 | 2017-03-31 | The acquisition methods and device of data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107066840A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112637231A (en) * | 2020-12-29 | 2021-04-09 | 航天信息股份有限公司 | Authorization method, authorization device, storage medium and server |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101909273A (en) * | 2010-07-23 | 2010-12-08 | 雷毅 | Third party system and method for carrying out authentication and billing by utilizing same |
US20130132854A1 (en) * | 2009-01-28 | 2013-05-23 | Headwater Partners I Llc | Service Plan Design, User Interfaces, Application Programming Interfaces, and Device Management |
CN104601582A (en) * | 2015-01-20 | 2015-05-06 | 广东欧珀移动通信有限公司 | File transfer method, device and system |
-
2017
- 2017-03-31 CN CN201710210468.7A patent/CN107066840A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130132854A1 (en) * | 2009-01-28 | 2013-05-23 | Headwater Partners I Llc | Service Plan Design, User Interfaces, Application Programming Interfaces, and Device Management |
CN101909273A (en) * | 2010-07-23 | 2010-12-08 | 雷毅 | Third party system and method for carrying out authentication and billing by utilizing same |
CN104601582A (en) * | 2015-01-20 | 2015-05-06 | 广东欧珀移动通信有限公司 | File transfer method, device and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112637231A (en) * | 2020-12-29 | 2021-04-09 | 航天信息股份有限公司 | Authorization method, authorization device, storage medium and server |
CN112637231B (en) * | 2020-12-29 | 2023-12-12 | 航天信息股份有限公司 | Authorization method, device, storage medium and server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112600841B (en) | Credit record sharing method and device based on block chain and electronic equipment | |
CN107592292B (en) | A kind of block chain communication method between nodes and device | |
CN107392040B (en) | A kind of method and device of common recognition verifying | |
CN109359971B (en) | Block chain transaction method and device and electronic equipment | |
CN107395557A (en) | A kind of processing method and processing device of service request | |
CN109947845A (en) | A kind of block chain deposits card method, apparatus and computer equipment | |
CN108665946A (en) | A kind of access method and device of business datum | |
CN107370730A (en) | A kind of log-on message processing method and equipment | |
CN108985742A (en) | Transaction processing method, device and block catenary system | |
CN107038562A (en) | Method of payment, charge system and the payment system of traffic block meter rate | |
CN109101787A (en) | A kind of method and device carrying out credit appraisal to copyright user based on block chain | |
CN111461691B (en) | Flow statistical system, method and device based on block chain | |
CN108846263B (en) | Software authorization processing and running method and device and electronic equipment | |
JP4796312B2 (en) | Service provider method and system for managing exposure to non-payment by service users | |
CN113221191B (en) | Block chain-based data evidence storage method, device, equipment and storage medium | |
CN110033371A (en) | A kind of account checking method and device based on transaction in assets | |
CN110334824A (en) | Safety moves in method and device | |
CN112465627A (en) | Financial loan auditing method and system based on block chain and machine learning | |
CN107733882A (en) | SSL certificate automatically dispose method and apparatus | |
CN109145649A (en) | Method for processing video frequency, certificates constructing method and related device based on law enforcement terminal | |
CN110266494A (en) | Time service authentication method, device and equipment in a kind of piece of chain type account book | |
CN108418833A (en) | A kind of management method of software, cloud server and terminal | |
CN106296183A (en) | The off-line charging method of a kind of smart card and equipment | |
CN107066840A (en) | The acquisition methods and device of data | |
CN108737521A (en) | A kind of method of data asynchronous transmission |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170818 |
|
RJ01 | Rejection of invention patent application after publication |