CN107066840A - The acquisition methods and device of data - Google Patents

The acquisition methods and device of data Download PDF

Info

Publication number
CN107066840A
CN107066840A CN201710210468.7A CN201710210468A CN107066840A CN 107066840 A CN107066840 A CN 107066840A CN 201710210468 A CN201710210468 A CN 201710210468A CN 107066840 A CN107066840 A CN 107066840A
Authority
CN
China
Prior art keywords
application program
authorization message
verified
acquisition
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710210468.7A
Other languages
Chinese (zh)
Inventor
孙吉平
尹永政
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senseshield Technology Co Ltd
Original Assignee
Beijing Senseshield Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Senseshield Technology Co Ltd filed Critical Beijing Senseshield Technology Co Ltd
Priority to CN201710210468.7A priority Critical patent/CN107066840A/en
Publication of CN107066840A publication Critical patent/CN107066840A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/123Shopping for digital content
    • G06Q20/1235Shopping for digital content with control of digital rights management [DRM]

Abstract

The invention discloses a kind of acquisition methods of data and device, it is related to Internet technical field, the problem of main purpose is to solve developer in the prior art operating process is complicated cumbersome in distribution authorization code, the step of authorization code is distributed can be simplified cumbersome.The main technical schemes of the present invention include:Application program identification information and authorization message to be verified are included in the acquisition solicited message for the application program that receiving terminal is sent, the acquisition solicited message;The legitimacy of authorization message to be verified according to the application program identification Information Authentication;If the authorization message to be verified is legal, allow to obtain application program.The present invention is obtained applied to terminal during the licensing of application program.

Description

The acquisition methods and device of data
Technical field
The present invention relates to Internet technical field, the acquisition methods and device of more particularly to a kind of data.
Background technology
With the fast development of Internet technology, the use of internet is more and more extensive, and what it is with fast development is each Developer promotes the application program of its exploitation using Internet technology.
It is each one authorization code of application assigned for example, developer is in popularization and application program, user is to developer Apply authorization code after, can application and popularizations application program.But, during implementing, developer distributes to user , it is necessary to which all authorization codes are carried out with unified management during authorization code, and in distribution authorization code, operating process complexity is cumbersome.
The content of the invention
In view of this, the acquisition methods and device for a kind of data that the present invention is provided, main purpose is to solve existing skill Developer can simplify the step of authorization code is distributed cumbersome the problem of operating process is complicated cumbersome in distribution authorization code in art.
In order to solve the above problems, present invention generally provides following technical scheme:
In a first aspect, the invention provides a kind of acquisition methods of data, this method includes:
Application program mark is included in the acquisition solicited message for the application program that receiving terminal is sent, the acquisition solicited message Know information and authorization message to be verified;
The legitimacy of authorization message to be verified according to the application program identification Information Authentication;
If the authorization message to be verified is legal, allow to obtain application program.
Optionally, before the legitimacy of authorization message to be verified according to the application program identification Information Authentication, Methods described also includes:
Receive and store the application program record information of third party developer's transmission;Included in the record information and apply journey The authorization message of sequence identification information, application program.
Optionally, the legitimacy of authorization message to be verified includes according to the application program identification Information Authentication:
According to the authorization message of the corresponding application program of the application program identification acquisition of information;
The authorization message of the application program is compared with the authorization message to be verified;
If the authorization message of the application program is consistent with the authorization message to be verified, it is determined that the mandate to be verified It is legal.
Optionally, application program expenses standard is also included in the record information, before allowing to obtain application program, institute Stating method also includes:
Obtain the available balance of stored value card in terminal;
Calculate whether the available balance meets default balance threshold according to the application program expenses standard;
It is described to allow acquisition application program also to include:
If meeting, allow to obtain the application program.
Optionally, methods described also includes:
The end for receiving the application program that the terminal is sent uses instruction;
Corresponding expense is deducted from the available balance of the stored value card according to the application program expenses standard.
Second aspect, the present invention also provides a kind of acquisition device of data, and the device includes:
First receiving unit, the acquisition solicited message of the application program sent for receiving terminal, the acquisition request letter Application program identification information and authorization message to be verified are included in breath;
Authentication unit, for according to the application program identification Information Authentication that first receiving unit is received The legitimacy of authorization message to be verified;
Processing unit, for when the authentication unit verifies that the authorization message to be verified is legal, it is allowed to obtain application Program.
Optionally, described device also includes:
Second receiving unit, for the authentication unit according to the application program identification Information Authentication it is to be verified Before the legitimacy of authorization message, the application program record information that third party developer sends is received;Wrapped in the record information Information containing application program identification, the authorization message of application program;
Memory cell, the record information for second receiving unit to be received is stored.
Optionally, the authentication unit includes:
Acquisition module, for the authorization message according to the corresponding application program of the application program identification acquisition of information;
Comparing module, to be verified is awarded for the authorization message of the application program that obtains the acquisition module with described Power information is compared;
Determining module, the authorization message for the application program when the comparison module to be verified is awarded with described When power information is consistent, determine that the mandate to be verified is legal.
Optionally, application program expenses standard is also included in the record information, described device also includes:
Acquiring unit, for before the processing unit allows to obtain application program, obtaining stored value card in terminal Available balance;
Computing unit, the application program expenses standard for being obtained according to the acquiring unit calculate it is described can be more than Whether volume meets default balance threshold;
The processing unit, is additionally operable to when computing unit determines that the application program expenses standard calculates the available balance When meeting the default balance threshold, it is allowed to obtain the application program.
Optionally, described device also includes:
3rd receiving unit, the end for receiving the application program that the terminal is sent uses instruction;
Unit is deducted, for deducting phase from the available balance of the stored value card according to the application program expenses standard Answer expense.
By above-mentioned technical proposal, the technical scheme that the present invention is provided at least has following advantages:
Acquisition methods and device based on data that the present invention is provided, the application program that server receiving terminal is sent is obtained Solicited message is taken, application program identification information and authorization message to be verified are included in the acquisition solicited message, according to application program Identification information verifies the legitimacy of authorization message to be verified, if authorization message to be verified is legal, allows to obtain application program, with Prior art is compared, and the present invention is managed on behalf of another the distributed tasks of authorization message by server, rather than is to go management by developer oneself Distribution authorization information, the step of reducing developer's independent distribution authorization information, making the process of distribution authorization information becomes simple.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit is common for this area Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows a kind of flow chart of the acquisition methods of data provided in an embodiment of the present invention;
Fig. 2 shows a kind of block schematic illustration of system provided in an embodiment of the present invention;
Fig. 3 shows a kind of composition frame chart of the acquisition device of data provided in an embodiment of the present invention;
Fig. 4 shows the composition frame chart of the acquisition device of another data provided in an embodiment of the present invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
The embodiments of the invention provide a kind of acquisition methods of data, this method is applied to server side, as shown in figure 1, Methods described includes:
101st, included in the acquisition solicited message for the application program that server receiving terminal is sent, the acquisition solicited message Application program identification information and authorization message to be verified.
As shown in Fig. 2 Fig. 2 shows a kind of block schematic illustration of system provided in an embodiment of the present invention, the system is included Server, terminal (N is more than 2), third party developer, wherein, server is proxy server, substitutes developer in the prior art Distribution authorization information, the work for verifying authorization message, terminal, for being interacted with server, to obtain application program;3rd There is provided each application program and its corresponding authorization message by square developer.
When terminal obtains application program, without being interacted with third party developer, but directly enter with server Row interaction, in this way, just making warrant distributing become simpler, flexible without the independent distribution authorization information of each developer.It is first First, terminal to server sends the acquisition request of application program, comprising application program and to be verified awards in the acquisition solicited message Information is weighed, wherein, the authorization message to be verified is that terminal is obtained by predetermined form, including but not limited to following interior Hold, for example:By scanning the forms such as Quick Response Code, short message, mailbox, specifically, the embodiment of the present invention is not limited.
102nd, the legitimacy of server authorization message to be verified according to the application program identification Information Authentication.
Server is local according to its after the application program identification information and authorization message to be verified of terminal transmission is received The application program identification information and authorization message of storage verify the accuracy of authorization message to be verified, however, it is determined that mandate to be verified Information is legal (consistent with the authorization message being locally stored), then continues executing with step 103;If it is determined that authorization message to be verified does not conform to Method (inconsistent with the authorization message that is locally stored), then refuse terminal and use application program.
As the optional mode of the embodiment of the present invention, when in multiple (three times) the acquisitions solicited message that same terminal is sent Comprising authorization message to be verified it is illegal when, within a predetermined period of time (such as 10 minutes) reject the terminal continue send out The acquisition solicited message sent, until please more than the acquisition for after predetermined amount of time (such as 10 minutes), continuing to terminal transmission Seek information;Wherein, predetermined amount of time can also be 5 minutes, 15 minutes etc., specifically, the embodiment of the present invention is not limited.
If the 103, the authorization message to be verified is legal, server allows to obtain application program.
Acquisition methods provided in an embodiment of the present invention based on data, the application program that server receiving terminal is sent is obtained Solicited message is taken, application program identification information and authorization message to be verified are included in the acquisition solicited message, according to application program Identification information verifies the legitimacy of authorization message to be verified, if authorization message to be verified is legal, allows to obtain application program, with Prior art is compared, and the embodiment of the present invention is managed on behalf of another the distributed tasks of authorization message by server, rather than is by developer oneself Go to manage distribution authorization information, the step of reducing developer's independent distribution authorization information becomes the process of distribution authorization information Obtain simply.
Further, as the refinement and extension to above-described embodiment, step 102 is being performed according to the application program mark Know before the legitimacy of authorization message to be verified described in Information Authentication, server also needs to obtain the Shen of third party developer first It please authorize, a variety of application programs are included in the server, different application programs may be from different developers, it is also possible to From same developer, do not limit specifically.
After the application mandate of third party developer is obtained, the application program of third party developer's transmission can be received and stored Application program identification information, authorization message of application program etc. are included in record information, the record information.
Corresponding relation between identification information and authorization message of the server based on the application program stored, according to institute The legitimacy of authorization message to be verified described in application program identification Information Authentication is stated, can use but be not limited to following methods: According to the authorization message of the corresponding application program of the application program identification acquisition of information;By the authorization message of the application program It is compared with the authorization message to be verified;If the authorization message of the application program and the authorization message one to be verified Cause, it is determined that the mandate to be verified is legal.The process, comparison be authorization message to be verified and the authorization message that has stored it Between uniformity, if unanimously, it is legal;It is illegal if inconsistent.
The application scenarios of an embodiment of the present invention provided below, the application scenarios are related to terminal and are using application program When, the scene charged on time or in due order.A stored value card service is provided in terminal, user can deposit in the stored value card The certain amount of money of storage, after using application program, to deduct corresponding expense.Said from server side, receiving third party Also include application program expenses standard in the record information that developer sends, in order to ensure having foot in the stored value card in terminal A kind of SS services are provided in the enough amount of money of deducting fees, server, the SS is serviced for before terminal obtains application program, obtaining eventually Whether the available balance of stored value card in end, meet according to the application program expenses standard calculating available balance more than presetting Volume threshold value.In the embodiment of the present invention, application program expenses standard developer according to having had what experience was voluntarily set, generally comprise by Charged according to access times, according to using duration, according to the milimeter number that uses charge etc..Default balance threshold is also Developer is according to a parameter information for having had experience to set, for example, default balance threshold is 0.5 yuan, 1 yuan etc..Specifically, The embodiment of the present invention is not limited application program expenses standard and default balance threshold.
In order to make it easy to understand, illustrating in exemplary fashion below.It is assumed that application program expenses standard is to receive per hour 2 yuan are taken, comprising being discontented with 1 hour, was collected by 1 hour, it is 0.5 yuan to preset balance threshold;The first situation, it is assumed that terminal electricity Available balance in sub- wallet is 2 yuans, calculate available balance be 2 yuan with 2 yuan of expenses standard/when difference be 0,0 to be less than in advance If balance threshold is 0.5 yuan, then terminal is allowed to obtain application program.Second of situation, it is assumed that available in terminal electronic wallet Remaining sum is 0.3 yuan, calculate available balance be 0.3 yuan with 2 yuan of expenses standard/when difference be -1.7, | -1.7 | more than presetting Balance threshold is 0.5 yuan, therefore, and server refusal terminal obtains application program.As the alternative of inventive embodiments, when true When determining to put the available balance deficiency in wallet in terminal, the prompt message that output display is please supplemented with money in time, to avoid delaying use Family uses application program.These are only exemplary citing, limited about the concrete numerical value that occurs in example, can not as pair The restriction of particular content.
Terminal is got after application program, using the application program, when user's operation terminal stops using this to apply journey Sequence, then terminal can to server send application program end using instruct, server receive this terminate using instruction after, Application program expenses standard in record information deducts corresponding expense from the available balance of the stored value card.
Further, as the realization to method shown in above-mentioned Fig. 1, another embodiment of the present invention additionally provides a kind of data Acquisition device.The device embodiment is corresponding with preceding method embodiment, and for ease of reading, present apparatus embodiment is no longer to foregoing Detail content in embodiment of the method is repeated one by one, it should be understood that the device in the present embodiment can be corresponded to before realizing State the full content in embodiment of the method.
The embodiment of the present invention provides a kind of acquisition device of data, as shown in figure 3, described device includes:
First receiving unit 21, the acquisition solicited message of the application program sent for receiving terminal, the acquisition request Application program identification information and authorization message to be verified are included in information;
Authentication unit 22, for the application program identification Information Authentication received according to first receiving unit 21 The legitimacy of the authorization message to be verified;
Processing unit 23, for when the authentication unit 22 verifies that the authorization message to be verified is legal, it is allowed to obtain Application program.
Further, as shown in figure 4, described device also includes:
Second receiving unit 24, for being treated in the authentication unit 22 according to the application program identification Information Authentication Before the legitimacy for verifying authorization message, the application program record information that third party developer sends is received;The record information In include application program identification information, the authorization message of application program;
Memory cell 25, the record information for second receiving unit 24 to be received is stored.
Further, as shown in figure 4, the authentication unit 22 includes:
Acquisition module 221, for the authorization message according to the corresponding application program of the application program identification acquisition of information;
Comparing module 222, for the authorization message of the application program that obtains the acquisition module with it is described to be tested Card authorization message is compared;
Determining module 223, for the application program when the comparison module authorization message with it is described to be tested When card authorization message is consistent, determine that the mandate to be verified is legal.
Application program expenses standard is also included in the record information, as shown in figure 4, described device also includes:
Acquiring unit 26, for before the processing unit 23 allows to obtain application program, obtaining electronic money in terminal The available balance of bag;
Computing unit 27, for can described in being calculated according to the application program expenses standard that the acquiring unit 26 is obtained Whether meet default balance threshold with remaining sum;
The processing unit 23, is additionally operable to when computing unit 27 determines that the application program expenses standard can be used described in calculating When remaining sum meets the default balance threshold, it is allowed to obtain the application program.
Further, as shown in figure 4, described device also includes:
3rd receiving unit 28, the end for receiving the application program that the terminal is sent uses instruction;
Unit 29 is deducted, for being deducted according to the application program expenses standard from the available balance of the stored value card Corresponding expense.
Acquisition device provided in an embodiment of the present invention based on data, the application program that server receiving terminal is sent is obtained Solicited message is taken, application program identification information and authorization message to be verified are included in the acquisition solicited message, according to application program Identification information verifies the legitimacy of authorization message to be verified, if authorization message to be verified is legal, allows to obtain application program, with Prior art is compared, and the embodiment of the present invention is managed on behalf of another the distributed tasks of authorization message by server, rather than is by developer oneself Go to manage distribution authorization information, the step of reducing developer's independent distribution authorization information becomes the process of distribution authorization information Obtain simply.
The data processing equipment based on encryption lock includes processor and memory, and above-mentioned authentication unit, first receive Unit, acquiring unit and transmitting element etc. in memory, storage are stored in by computing device as program unit storage Said procedure unit in device realizes corresponding function.
Kernel is included in processor, is gone in memory to transfer corresponding program unit by kernel.Kernel can set one Or more, solve in the prior art computer data is being carried out using hardware encryption lock to protect by adjusting kernel parameter The problem of Cheng Zhong, hardware encryption lock is inconvenient to carry, and easy to lose.
Memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/ Or the form, such as read-only storage (ROM) or flash memory (flash RAM) such as Nonvolatile memory, memory is deposited including at least one Store up chip.
Present invention also provides a kind of computer program product, when being performed on data processing equipment, it is adapted for carrying out just The program code of beginningization there are as below methods step:The acquisition solicited message for the application program that receiving terminal is sent, the acquisition please Ask and application program identification information and authorization message to be verified are included in information;According to the application program identification Information Authentication The legitimacy of authorization message to be verified;If the authorization message to be verified is legal, allow to obtain application program.
In the above embodiment of the present invention, the description to each embodiment all emphasizes particularly on different fields, and does not have in some embodiment The part of detailed description, may refer to the associated description of other embodiment.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program Product.Therefore, the application can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the application can be used in one or more computers for wherein including computer usable program code The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The application is the flow with reference to method, equipment (system) and computer program product according to the embodiment of the present application Figure and/or block diagram are described.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which is produced, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and internal memory.
Memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/ Or the form, such as read-only storage (ROM) or flash memory (flash RAM) such as Nonvolatile memory.Memory is computer-readable Jie The example of matter.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability Comprising so that process, method, commodity or equipment including a series of key elements are not only including those key elements, but also wrap Include other key elements being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including key element Also there is other identical element in process, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product. Therefore, the application can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Form.Deposited moreover, the application can use to can use in one or more computers for wherein including computer usable program code The shape for the computer program product that storage media is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
Embodiments herein is these are only, the application is not limited to.To those skilled in the art, The application can have various modifications and variations.All any modifications made within spirit herein and principle, equivalent substitution, Improve etc., it should be included within the scope of claims hereof.

Claims (10)

1. a kind of acquisition methods of data, it is characterised in that including:
Application program identification letter is included in the acquisition solicited message for the application program that receiving terminal is sent, the acquisition solicited message Breath and authorization message to be verified;
The legitimacy of authorization message to be verified according to the application program identification Information Authentication;
If the authorization message to be verified is legal, allow to obtain application program.
2. according to the method described in claim 1, it is characterised in that treated according to the application program identification Information Authentication Before the legitimacy for verifying authorization message, methods described also includes:
Receive and store the application program record information of third party developer's transmission;Application program mark is included in the record information Know information, the authorization message of application program.
3. method according to claim 2, it is characterised in that to be tested according to the application program identification Information Authentication The legitimacy of card authorization message includes:
According to the authorization message of the corresponding application program of the application program identification acquisition of information;
The authorization message of the application program is compared with the authorization message to be verified;
If the authorization message of the application program is consistent with the authorization message to be verified, it is determined that to be verified authorize is closed Method.
4. method according to claim 2, it is characterised in that also charge and mark comprising application program in the record information Standard, before allowing to obtain application program, methods described also includes:
Obtain the available balance of stored value card in terminal;
Calculate whether the available balance meets default balance threshold according to the application program expenses standard;
It is described to allow acquisition application program also to include:
If meeting, allow to obtain the application program.
5. method according to claim 4, it is characterised in that methods described also includes:
The end for receiving the application program that the terminal is sent uses instruction;
Corresponding expense is deducted from the available balance of the stored value card according to the application program expenses standard.
6. a kind of acquisition device of data, it is characterised in that including:
In first receiving unit, the acquisition solicited message of the application program sent for receiving terminal, the acquisition solicited message Include application program identification information and authorization message to be verified;
Authentication unit, for be tested according to the application program identification Information Authentication that first receiving unit is received Demonstrate,prove the legitimacy of authorization message;
Processing unit, for when the authentication unit verifies that the authorization message to be verified is legal, it is allowed to obtain application program.
7. device according to claim 6, it is characterised in that described device also includes:
Second receiving unit, for the mandate to be verified according to the application program identification Information Authentication in the authentication unit Before the legitimacy of information, the application program record information that third party developer sends is received;Being included in the record information should With program identification information, the authorization message of application program;
Memory cell, the record information for second receiving unit to be received is stored.
8. device according to claim 7, it is characterised in that the authentication unit includes:
Acquisition module, for the authorization message according to the corresponding application program of the application program identification acquisition of information;
Comparing module, the authorization message of the application program for the acquisition module to be obtained is believed with to be verified authorize Breath is compared;
Determining module, authorization message and to be verified authorize for the application program when the comparison module are believed When ceasing consistent, determine that the mandate to be verified is legal.
9. device according to claim 7, it is characterised in that also charge and mark comprising application program in the record information Standard, described device also includes:
Acquiring unit, for before the processing unit allows to obtain application program, stored value card to be available in acquisition terminal Remaining sum;
Computing unit, the application program expenses standard for being obtained according to the acquiring unit, which calculates the available balance, is It is no to meet default balance threshold;
The processing unit, is additionally operable to when computing unit determines that the application program expenses standard calculates the available balance and met During the default balance threshold, it is allowed to obtain the application program.
10. device according to claim 9, it is characterised in that described device also includes:
3rd receiving unit, the end for receiving the application program that the terminal is sent uses instruction;
Unit is deducted, for deducting corresponding expense from the available balance of the stored value card according to the application program expenses standard With.
CN201710210468.7A 2017-03-31 2017-03-31 The acquisition methods and device of data Pending CN107066840A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710210468.7A CN107066840A (en) 2017-03-31 2017-03-31 The acquisition methods and device of data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710210468.7A CN107066840A (en) 2017-03-31 2017-03-31 The acquisition methods and device of data

Publications (1)

Publication Number Publication Date
CN107066840A true CN107066840A (en) 2017-08-18

Family

ID=59601552

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710210468.7A Pending CN107066840A (en) 2017-03-31 2017-03-31 The acquisition methods and device of data

Country Status (1)

Country Link
CN (1) CN107066840A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112637231A (en) * 2020-12-29 2021-04-09 航天信息股份有限公司 Authorization method, authorization device, storage medium and server

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101909273A (en) * 2010-07-23 2010-12-08 雷毅 Third party system and method for carrying out authentication and billing by utilizing same
US20130132854A1 (en) * 2009-01-28 2013-05-23 Headwater Partners I Llc Service Plan Design, User Interfaces, Application Programming Interfaces, and Device Management
CN104601582A (en) * 2015-01-20 2015-05-06 广东欧珀移动通信有限公司 File transfer method, device and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130132854A1 (en) * 2009-01-28 2013-05-23 Headwater Partners I Llc Service Plan Design, User Interfaces, Application Programming Interfaces, and Device Management
CN101909273A (en) * 2010-07-23 2010-12-08 雷毅 Third party system and method for carrying out authentication and billing by utilizing same
CN104601582A (en) * 2015-01-20 2015-05-06 广东欧珀移动通信有限公司 File transfer method, device and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112637231A (en) * 2020-12-29 2021-04-09 航天信息股份有限公司 Authorization method, authorization device, storage medium and server
CN112637231B (en) * 2020-12-29 2023-12-12 航天信息股份有限公司 Authorization method, device, storage medium and server

Similar Documents

Publication Publication Date Title
CN112600841B (en) Credit record sharing method and device based on block chain and electronic equipment
CN107592292B (en) A kind of block chain communication method between nodes and device
CN107392040B (en) A kind of method and device of common recognition verifying
CN109359971B (en) Block chain transaction method and device and electronic equipment
CN107395557A (en) A kind of processing method and processing device of service request
CN109947845A (en) A kind of block chain deposits card method, apparatus and computer equipment
CN108665946A (en) A kind of access method and device of business datum
CN107370730A (en) A kind of log-on message processing method and equipment
CN108985742A (en) Transaction processing method, device and block catenary system
CN107038562A (en) Method of payment, charge system and the payment system of traffic block meter rate
CN109101787A (en) A kind of method and device carrying out credit appraisal to copyright user based on block chain
CN111461691B (en) Flow statistical system, method and device based on block chain
CN108846263B (en) Software authorization processing and running method and device and electronic equipment
JP4796312B2 (en) Service provider method and system for managing exposure to non-payment by service users
CN113221191B (en) Block chain-based data evidence storage method, device, equipment and storage medium
CN110033371A (en) A kind of account checking method and device based on transaction in assets
CN110334824A (en) Safety moves in method and device
CN112465627A (en) Financial loan auditing method and system based on block chain and machine learning
CN107733882A (en) SSL certificate automatically dispose method and apparatus
CN109145649A (en) Method for processing video frequency, certificates constructing method and related device based on law enforcement terminal
CN110266494A (en) Time service authentication method, device and equipment in a kind of piece of chain type account book
CN108418833A (en) A kind of management method of software, cloud server and terminal
CN106296183A (en) The off-line charging method of a kind of smart card and equipment
CN107066840A (en) The acquisition methods and device of data
CN108737521A (en) A kind of method of data asynchronous transmission

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170818

RJ01 Rejection of invention patent application after publication