CN107135214A - Above-the-line protection of usage right method, equipment and computer-readable recording medium - Google Patents
Above-the-line protection of usage right method, equipment and computer-readable recording medium Download PDFInfo
- Publication number
- CN107135214A CN107135214A CN201710289857.3A CN201710289857A CN107135214A CN 107135214 A CN107135214 A CN 107135214A CN 201710289857 A CN201710289857 A CN 201710289857A CN 107135214 A CN107135214 A CN 107135214A
- Authority
- CN
- China
- Prior art keywords
- activity
- user
- usage right
- instruction
- protection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of Above-the-line protection of usage right method, equipment and computer-readable recording medium.The protection of usage right method includes:When receiving the request instruction of participation activity, authorization requests instruction is sent to campaign owners system, the user profile of the user of request participation activity is carried in the authorization requests instruction;And, receive authorized order or unauthorized instruction that the campaign owners system is returned according to the user profile.Apply the technical scheme of the present invention, malicious act, lifting system security can be prevented.
Description
Technical field
The present invention relates to computer communication technology field, more particularly to a kind of Above-the-line protection of usage right method, equipment and
Computer-readable recording medium.
Background technology
With the development of business on grid line, various Above-the-line are more and more.The system of industry-by-industry passes through third party
The modes such as (movable undertaker) activity reward user integral prize are popularized very much.Also layer goes out for the behavior of various malice brush integrations simultaneously
It is not poor, normal users interests are damaged, animation effect is influenceed.Therefore website before release activity it is necessary to carrying out security protection.
Current web station system typically all provides a kind of mechanism, and third party (movable undertaker) activity system is accessed to user
Control of authority and protection are carried out, malicious act is prevented.However, the method for preventing malicious act currently commonly used:Website is by knowing
User agent information in other user's http request accesses to identify whether normal users by webpage or App, but this
Plant data to be relatively easily forged, after data are tampered, this recognition mechanism just fails.The user for sponsoring method, system is simply the
Tripartite's activity (movable undertaker) system does simple user authentication, and sponsor is with regard to uncontrollable third party (movable undertaker) system
System behavior, and the system that third party's leak or malicious act unavoidably have influence on oneself.For example, User logs in Taobao is (living
Dynamic sponsor) after system, the sweepstake of some flagship store of official (movable undertaker) system is participated in, due to movable undertaker system
System simply does simple certification to user, and this simple authentication security is not high, is easily tampered, so as to influence the sponsor to be
System.
The content of the invention
It is a primary object of the present invention to propose a kind of Above-the-line protection of usage right method, equipment and computer-readable storage
Medium, can prevent malicious act, lifting system security.
To achieve the above object, a kind of Above-the-line protection of usage right method that the present invention is provided, applied to the activity on line
Method, system is undertaken, the protection of usage right method includes:
When receiving the request instruction of participation activity, authorization requests instruction is sent to method, system is sponsored, the mandate please
Ask and the user profile that request participates in active user is carried in instruction;And,
Authorized order or unauthorized instruction that method, system is returned according to the user profile are sponsored described in receiving.
Wherein, refer to sponsoring authorized order or unauthorized that method, system returns according to the user profile described in the reception
After order, the protection of usage right method also includes:
If what is received is the unauthorized instruction, the prompting of output refusal participation activity;
If what is received is the authorized order, the instruction user of the authorization message carried according to the authorized order is joined
With activity.
Wherein, it is described after the instruction user participation activity of the authorization message carried according to the authorized order
Protection of usage right method also includes:
The action message of user's participation activity is sent to described and sponsors method, system.
Present invention also offers a kind of Above-the-line protection of usage right method, applied to the campaign owners system on line, institute
Stating protection of usage right method includes:
The authorization requests instruction that method, system is sent is undertaken in reception activity, and carrying request in the authorization requests instruction participates in
The user profile of active user;
According to activity preset rules and the user profile, it is determined whether authorize user's participation activity;
Method, system, which is undertaken, to the activity sends authorized order or unauthorized instruction.
Wherein, it is described to it is described activity undertake method, system send authorized order after, the protection of usage right method is also wrapped
Include:
Receive the action message that user's participation activity that method, system is sent is undertaken in the activity;
The activity data of the user of storage is updated according to the action message.
In addition, to achieve the above object, the present invention also proposes a kind of Above-the-line protection of usage right equipment, the protection of usage right
Equipment includes memory, processor and is stored in the protection of usage right journey that can be run on the memory and on the processor
Sequence, the protection of usage right program performs following steps:
When receiving the request instruction of participation activity, authorization requests instruction is sent to method, system is sponsored, the mandate please
Ask and the user profile that request participates in active user is carried in instruction;And,
Authorized order or unauthorized instruction that method, system is returned according to the user profile are sponsored described in receiving.
Wherein, refer to sponsoring authorized order or unauthorized that method, system returns according to the user profile described in the reception
After order, the protection of usage right program is also performed:
If what is received is the unauthorized instruction, the prompting of output refusal participation activity;
If what is received is the authorized order, the instruction user of the authorization message carried according to the authorized order is joined
With activity.
Wherein, it is described to it is described activity undertake method, system send authorized order after, the protection of usage right program is also held
OK:
Receive the action message that user's participation activity that method, system is sent is undertaken in the activity;
The activity data of the user of storage is updated according to the action message.
Present invention also offers a kind of Above-the-line protection of usage right equipment, the protection of usage right equipment includes memory, place
Manage device and be stored in the protection of usage right program that can be run on the memory and on the processor, the protection of usage right program
Perform following steps:
The authorization requests instruction that method, system is sent is undertaken in reception activity, and carrying request in the authorization requests instruction participates in
The user profile of active user;
According to activity preset rules and the user profile, it is determined whether authorize user's participation activity;
Method, system, which is undertaken, to the activity sends authorized order or unauthorized instruction.
Wherein, it is described to it is described activity undertake method, system send authorized order after, the protection of usage right program is also wrapped
Include:
Receive the action message that user's participation activity that method, system is sent is undertaken in the activity;
The activity data of the user of storage is updated according to the action message.
In addition, present invention also offers a kind of computer-readable recording medium, the computer-readable recording medium storage
Defence program is had permission, realization activity is undertaken method, system and performed when the protection of usage right program is by least one computing device
Protection of usage right method the step of.
Present invention also offers a kind of computer-readable recording medium, the computer-readable recording medium storage has permission
Defence program, realizes that claim campaign owners system is held when the protection of usage right program is by least one computing device
The step of capable protection of usage right method.
The beneficial effects of the invention are as follows:
The technical scheme of the embodiment of the present invention, activity undertake method, system receive user request participation activity request it
Afterwards, it is necessary to send authorization requests instruction, use of the request campaign owners system to request participation activity to campaign owners system
Family is authorized.Campaign owners system is after authorization requests instruction is received, it is necessary to be carried in being instructed according to authorization requests
User profile and activity preset rules the user for asking participation activity is authorized, and return to authorized order or unauthorized
Instruct and undertake method, system to activity.Compared with being authenticated merely of movable undertaker's system of users information in the prior art,
The method of the embodiment of the present invention needs campaign owners system to asking the user of participation activity to ask to authorize so that activity is sponsored
Method, system can control activity to undertake the behavior of method, system, user can be authenticated and be protected, prevent malicious act.
Brief description of the drawings
Fig. 1 is the hardware architecture diagram for the mobile terminal for realizing each embodiment of the invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the first embodiment that the Above-the-line protection of usage right method of method, system is undertaken in activity that is applied to of the present invention
Schematic flow sheet;
Fig. 4 is the second embodiment of the Above-the-line protection of usage right method for being applied to activity undertaking method, system of the present invention
Schematic flow sheet;
Fig. 5 is the first embodiment of the Above-the-line protection of usage right method applied to campaign owners system of the present invention
Schematic flow sheet;
Fig. 6 is the second embodiment of the Above-the-line protection of usage right method applied to campaign owners system of the present invention
Schematic flow sheet;
Fig. 7 is the schematic flow sheet of the embodiment of the Above-the-line protection of usage right method of the present invention;
Fig. 8 is the interaction schematic diagram of the Above-the-line protection of usage right method of the present invention;
Fig. 9 is the interaction schematic diagram of the Above-the-line protection of usage right method of the present invention;
Figure 10 is the structural representation of the first embodiment of the Above-the-line protection of usage right equipment of the present invention;
Figure 11 is the structural representation of the second embodiment of the Above-the-line protection of usage right equipment of the present invention;
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only
Be conducive to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can be mixed
Ground is used.
The Above-the-line protection of usage right equipment and computer-readable recording medium provided in the present invention, for example, can be each
Plant terminal.Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board
Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable
Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. are moved
Move the fixed terminals such as terminal, and numeral TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special
Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of realization each embodiment of the invention, the shifting
Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit
103rd, A/V (audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit
108th, the part such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1
Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal can be included than illustrating more or less parts,
Either combine some parts or different parts arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station
Downlink information receive after, handled to processor 110;In addition, up data are sent into base station.Generally, radio frequency unit 101
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating
Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication
Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications
System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code
Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division
Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code
Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division
Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division
Duplexing-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user's transmitting-receiving electricity by WiFi module 102
Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows
Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need
To be omitted in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 1 00
When under the isotypes such as formula, speech recognition mode, broadcast reception mode, it is that radio frequency unit 101 or WiFi module 102 are received or
The voice data stored in memory 109 is converted into audio signal and is output as sound.Moreover, audio output unit 103
The audio output related to the specific function that mobile terminal 1 00 is performed can also be provided (for example, call signal receives sound, disappeared
Breath receives sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042,1041 pairs of graphics processor is in video acquisition mode
Or the view data progress of the static images or video obtained in image capture mode by image capture apparatus (such as camera)
Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after being handled through graphics processor 1041 can be deposited
Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike
Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042
Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can
To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model.
Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound
The noise produced during frequency signal or interference.
Mobile terminal 1 00 also includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity transducer can close when mobile terminal 1 00 is moved in one's ear
Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axles) size of acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,
The other sensors such as hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can be wrapped
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal
The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with
And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it
(such as user is using any suitable objects such as finger, stylus or annex on contact panel 1071 or in contact panel 1071
Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection
Two parts of device and touch controller.Wherein, touch detecting apparatus detects the touch orientation of user, and detects touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
It is converted into contact coordinate, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can
To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel
1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can be wrapped
Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or
After neighbouring touch operation, processor 110 is sent to determine the type of touch event, with preprocessor 110 according to touch thing
The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel
1061 be input and the output function that mobile terminal is realized as two independent parts, but in certain embodiments, can
By contact panel 1071 and the input that is integrated and realizing mobile terminal of display panel 1061 and output function, not do specifically herein
Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 1 00.For example,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number
It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 1 00 or can be with
For transmitting data between mobile terminal 1 00 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area
And storage data field, wherein, application program (the such as sound that storing program area can be needed for storage program area, at least one function
Sound playing function, image player function etc.) etc.;Storage data field can be stored uses created data (such as according to mobile phone
Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, it can also include non-easy
The property lost memory, for example, at least one disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection
Individual part, by operation or performs and is stored in software program and/or module in memory 109, and calls and be stored in storage
Data in device 109, perform the various functions and processing data of mobile terminal, so as to carry out integral monitoring to mobile terminal.Place
Reason device 110 may include one or more processing units;It is preferred that, processor 110 can integrated application processor and modulatedemodulate mediate
Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main
Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 1 00 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111
Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put
The function such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 1 00 can also will not be repeated here including bluetooth module etc..
For the ease of understanding the embodiment of the present invention, the communications network system that the mobile terminal of the present invention is based on is entered below
Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system
Unite as the LTE system of universal mobile communications technology, UE (User Equipment, use of the LTE system including communicating connection successively
Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands
Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation
204。
Specifically, UE201 can be above-mentioned terminal 100, and here is omitted.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning
Journey (backhaul) (such as X2 interface) is connected with other eNodeB2022, and eNodeB2021 is connected to EPC203,
ENodeB2021 can provide UE201 to EPC203 access.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS
(Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way,
Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and
Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and
There is provided carrying and connection management for the control node of signaling between EPC203.HSS2032 is all to manage for providing some registers
Such as function of attaching position register (not shown) etc, and some are preserved about the use such as service features, data rate
The special information in family.All customer data can be transmitted by SGW2034, and PGW2035 can provide UE 201 IP
Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources
Point, it selects and provided available strategy and charging control decision-making with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia
System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only
Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with
And following new network system etc., do not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the inventive method is proposed.
Description based on background technology understand, active user participate in line on miscellaneous service when, due to movable undertaker
System is to carry out simple user authentication, and this mechanism is easily forged, and due to sponsoring the uncontrollable activity of method, system
The system action of undertaker, thus activity undertake method, system leak or malicious act can also be impacted to sponsoring method, system.
It is proposed to this end that Above-the-line protection of usage right method, equipment and the computer-readable recording medium of the present invention.
As shown in figure 3, being the first of the Above-the-line protection of usage right method for being applied to activity undertaking method, system of the present invention
The schematic flow sheet of embodiment.Wherein, the Above-the-line protection of usage right method can be used for mobile terminal, for example, can be intelligence
The equipment such as mobile phone, tablet personal computer, personal digital assistant.
As shown in figure 3, the Above-the-line protection of usage right method comprises the following steps:
Step 301:When receiving the request instruction of participation activity, send authorization requests to campaign owners system and refer to
Order, carries the user profile of the user of request participation activity in the authorization requests instruction.
Step 302:Authorized order or unauthorized instruction that method, system is returned according to the user profile are sponsored described in receiving.
It should be noted that user participation activity undertake method, system undertake activity before, it is necessary to first log in sponsor
System, then by way of sending request instruction, the activity that method, system is held is undertaken in request participation activity.It is living in step 301
It is dynamic to undertake when method, system receives the request instruction that user sends, it is necessary to send authorization requests instruction to campaign owners system,
To ask behavior of the campaign owners to user's participation activity to authorize.Request is carried in authorization requests instruction to participate in living
The user profile of dynamic user, such as user's id information.Campaign owners system is received after authorization requests instruction, and extraction is awarded
The user's id information carried in power request instruction, whether then according to activity preset rules, it is that satisfaction activity is pre- to search the user
If the user of rule, if it is, return to authorized order undertakes method, system to activity, if it is not, then returning to unauthorized instruction
Method, system is undertaken to activity.
Wherein, activity preset rules for example can be:The region belonging to the user of participation activity is set, participation activity is set
User belonging to grade etc..
In step 302, the authorized order or unauthorized that activity undertaking method, system receives the return of campaign owners system refer to
After order, the instruction instructed according to authorized order or unauthorized, it is allowed to or refusal user's participation activity.Wherein, authorized order can
To be transmitted in an encrypted form, also, the authorized order sent can have necessarily ageing, expired, can not make
With.Unauthorized instruction can be then transmitted in the form of plaintext.
The Above-the-line protection of usage right method of the embodiment of the present invention, activity undertakes method, system and is receiving user's request participation
, it is necessary to send authorization requests instruction to campaign owners system, request campaign owners system is to request after the request of activity
The user of participation activity is authorized.With movable undertaker's system of users information in the prior art merely be authenticated phase
Than the method for the embodiment of the present invention needs campaign owners system to asking the user of participation activity to ask to authorize so that activity
Sponsoring method, system can control activity to undertake the behavior of method, system, user can be authenticated and be protected, prevent malicious act.
As shown in figure 4, being the second of the Above-the-line protection of usage right method for being applied to activity undertaking method, system of the present invention
The schematic flow sheet of embodiment.Wherein, the Above-the-line protection of usage right method can be used for mobile terminal, for example, can be intelligence
The equipment such as mobile phone, tablet personal computer, personal digital assistant.
As shown in figure 4, the Above-the-line protection of usage right method comprises the following steps:
Step 401:When receiving the request instruction of participation activity, send authorization requests to campaign owners system and refer to
Order, carries the user profile of the user of request participation activity in the authorization requests instruction.
Step 402:Authorized order or unauthorized instruction that method, system is returned according to the user profile are sponsored described in receiving.
Step 403:If what is received is the unauthorized instruction, the prompting of output refusal user's participation activity.
Step 404:If what is received is the authorized order, the authorization message carried according to the authorized order is indicated
User's participation activity.
Step 405:The action message of user's participation activity is sent to the campaign owners system.
It should be noted that the present embodiment and the difference of the embodiment shown in Fig. 3 are:
In step 402, the instruction difference that method, system is received is undertaken according to activity, operation is also differed.If step 402
In receive is unauthorized instruction, then into step 403, the prompting of output refusal user's participation activity, such as Fig. 8 institutes
Show.It should be noted that while the prompting of output refusal user's participation activity, refusal can also be exported and participate in interactive original
The user of cause, such as inactive region, or user gradation are not up to requirement etc..If what is received in step 402 is to authorize to refer to
Order, then into step 404 to step 405.
When performing step 404, activity undertakes method, system and also the user profile is authenticated, i.e., authorized according to described
Instruct the authorization message instruction user participation activity carried.The specific specific bar for indicating user's participation activity in authorization message
Part, for example, it is assumed that authorization message indicates to allow the time of user's participation activity to be a hour.So movable undertaker then basis
The authorization message, instruction user participation activity, as shown in Figure 9.When user be already engaged in activity time reach one small when it
Afterwards, activity undertaking method, system then points out user to continue activity.
After user has participated in activity, activity undertakes method, system and also performs step 405, by the activity of user's participation activity
Information is sent to campaign owners system.When sending action message, secured communication channel, such as https are used between system.This
Sample so that campaign owners system can be preserved and analyzed according to the action message received, to obtain activity purpose
Data.
The Above-the-line protection of usage right method of the embodiment of the present invention, activity undertakes method, system and is receiving user's request participation
, it is necessary to send authorization requests instruction to campaign owners system, request campaign owners system is to request after the request of activity
The user of participation activity is authorized.With movable undertaker's system of users information in the prior art merely be authenticated phase
Than the method for the embodiment of the present invention needs campaign owners system to asking the user of participation activity to ask to authorize so that activity
Sponsoring method, system can control activity to undertake the behavior of method, system, user can be authenticated and be protected, prevent malicious act.
Also, activity undertakes method, system after the authorized order that campaign owners system is sent is received, being capable of basis
The authorization message that the authorized order is carried is authenticated to user profile, while also sending out the action message of the user of participation activity
Deliver to campaign owners system, thus successfully to campaign owners system and activity undertake method, system coupling carried out every
From, it is ensured that the security of campaign owners system.
It should be noted that being that Above-the-line protection of usage right method is retouched from the angle of movable undertaker above
State, below, Above-the-line protection of usage right method will be described from campaign owners angle by Fig. 5 and Fig. 6.
As shown in figure 5, being the first of the Above-the-line protection of usage right method applied to campaign owners system of the present invention
The schematic flow sheet of embodiment.The Above-the-line protection of usage right method can be used for mobile terminal, for example can be smart mobile phone,
The equipment such as tablet personal computer, personal digital assistant.
As shown in figure 5, the Above-the-line protection of usage right method comprises the following steps:
Step 501:The authorization requests instruction that method, system is sent is undertaken in reception activity, is carried in the authorization requests instruction
Ask the user profile of the user of participation activity.
Step 502:According to activity preset rules and the user profile, it is determined whether authorize user's participation activity.
Step 503:Method, system, which is undertaken, to the activity sends authorized order or unauthorized instruction.
In step 501 to step 503, user is before the activity that method, system is undertaken is undertaken in participation activity, it is necessary to first log in
Campaign owners system, then by way of sending request instruction, the activity that method, system is held is undertaken in request participation activity.It is living
It is dynamic to undertake when method, system receives the request instruction that user sends, it is necessary to send authorization requests instruction to campaign owners system,
To ask behavior of the campaign owners to user's participation activity to authorize.Request is carried in authorization requests instruction to participate in living
The user profile of dynamic user, such as user's id information.Campaign owners system is received after authorization requests instruction, and extraction is awarded
The user's id information carried in power request instruction, whether then according to activity preset rules, it is that satisfaction activity is pre- to search the user
If the user of rule, if it is, return to authorized order undertakes method, system to activity, if it is not, then returning to unauthorized instruction
Method, system is undertaken to activity.So enable activity to undertake the instruction that method, system is instructed according to authorized order or unauthorized, permit
Perhaps or refusal user's participation activity.Wherein, authorized order can be transmitted in an encrypted form, also, the mandate sent refers to
Order can have necessarily ageing, expired then unusable.Unauthorized instruction can be then transmitted in the form of plaintext.
The Above-the-line protection of usage right method of the embodiment of the present invention, campaign owners system is receiving authorization requests instruction
Afterwards, it is necessary to the user profile and activity preset rules that are carried in being instructed according to authorization requests to ask participation activity user
Authorized, and return to authorized order or unauthorized instructs and undertakes method, system to activity.It is with movable undertaker in the prior art
System is simple to user profile to be authenticated comparing, and the method for the embodiment of the present invention needs campaign owners system to participate in request
User's request of activity is authorized so that campaign owners system can control the behavior of activity undertaking method, system, can be to user
It is authenticated and protects, prevents malicious act.
As shown in fig. 6, being the second of the Above-the-line protection of usage right method applied to campaign owners system of the present invention
The schematic flow sheet of embodiment.The Above-the-line protection of usage right method can be used for mobile terminal, for example can be smart mobile phone,
The equipment such as tablet personal computer, personal digital assistant.
As shown in fig. 6, the Above-the-line protection of usage right method comprises the following steps:
Step 601:The authorization requests instruction that method, system is sent is undertaken in reception activity, is carried in the authorization requests instruction
Ask the user profile of the user of participation activity.
Step 602:According to activity preset rules and the user profile, it is determined whether authorize user's participation activity.
Step 603:Method, system, which is undertaken, to the activity sends authorized order or unauthorized instruction.
Step 604:If what it is to the activity undertaking method, system transmission is authorized order, the movable undertaker is also received
The action message for user's participation activity that system is sent.
Step 605:The activity data of the user of storage is updated according to the action message.
It should be noted is that, the present embodiment and the difference of the embodiment shown in Fig. 5 are:
After step 603 is performed, step 604 is also performed to step 605.I other words, it is being to the movable undertaker
System is sent after authorized order, and activity undertakes method, system and then participated in living according to the authorization message instruction user carried in authorized order
It is dynamic.After user's participation activity is finished, then activity is undertaken method, system and is also led to the action message of user's participation activity using safety
Believe passage, such as http form is sent to campaign owners system.Campaign owners system reception activity is undertaken method, system and sent
User's participation activity action message, and update the activity data of the user of the participation activity of storage.
The Above-the-line protection of usage right method of the embodiment of the present invention, campaign owners system is receiving authorization requests instruction
Afterwards, it is necessary to the user profile and activity preset rules that are carried in being instructed according to authorization requests to ask participation activity user
Authorized, and return to authorized order and undertake method, system to activity.With movable undertaker's system of users information in the prior art
Simple to be authenticated comparing, the method for the embodiment of the present invention needs campaign owners system please to the user for asking participation activity
Ask mandate so that campaign owners system can control activity to undertake the behavior of method, system, user can be authenticated and be protected
Shield, prevents malicious act.
Also, activity undertakes method, system after the authorized order that campaign owners system is sent is received, being capable of basis
The authorization message that the authorized order is carried is authenticated to user profile, while also sending out the action message of the user of participation activity
Deliver to campaign owners system, thus successfully to campaign owners system and activity undertake method, system coupling carried out every
From, it is ensured that the security of campaign owners system.
Above-described embodiment individually describes the Above-the-line power of the present invention from the angle of movable undertaker or campaign owners
Guard method is limited, below, by by the embodiment shown in Fig. 7, this hair is described from the angle of movable undertaker and campaign owners
Bright Above-the-line protection of usage right method.
As shown in fig. 7, being the schematic flow sheet of the embodiment of the Above-the-line protection of usage right method of the present invention.It is living on the line
Dynamic protection of usage right method can be used for mobile terminal, be set such as can be smart mobile phone, tablet personal computer, personal digital assistant
It is standby.The Above-the-line protection of usage right method comprises the following steps:
Step 700, the request instruction that method, system receives participation activity is undertaken in activity.
Step 701, when method, system is undertaken in activity receives the request instruction of participation activity, sent out to campaign owners system
Send authorization requests to instruct, the user profile of the user of request participation activity is carried in the authorization requests instruction.
Step 702, the authorization requests instruction that method, system is sent is undertaken in campaign owners system reception activity.
Step 703, campaign owners system is according to activity preset rules and the user profile, it is determined whether authorize described
User's participation activity.
Step 704, campaign owners system undertakes method, system to the activity and sends authorized order or unauthorized instruction.
Step 705, activity undertakes method, system and receives the campaign owners system according to awarding that the user profile is returned
Power instruction or unauthorized instruction.
Step 706, if what activity undertook that method, system receives is unauthorized instruction, output refusal participation activity
Prompting.
Step 707, if what activity undertook that method, system receives is the authorized order, carried according to the authorized order
Authorization message instruction user participation activity.
Step 708, activity undertaking method, system, which sends the action message of user's participation activity to the activity, sponsors
Method, system.
Step 709, campaign owners system receives the activity and undertakes user's participation activity that method, system is sent
Action message.
Step 710, campaign owners system updates the activity data of the user of storage according to the action message.
The Above-the-line protection of usage right method of the embodiment of the present invention, activity undertakes method, system and is receiving user's request participation
, it is necessary to send authorization requests instruction to campaign owners system, request campaign owners system is to request after the request of activity
The user of participation activity is authorized.Campaign owners system is after authorization requests instruction is received, it is necessary to please according to authorizing
Ask the user profile carried in instruction and activity preset rules to authorize the user for asking participation activity, and return to mandate
Instruction or unauthorized are instructed undertakes method, system to activity.With the entering merely of movable undertaker's system of users information in the prior art
Row certification is compared, and the method for the embodiment of the present invention needs campaign owners system to asking the user of participation activity to ask to authorize,
Enable campaign owners system to control activity to undertake the behavior of method, system, user can be authenticated and be protected, prevented
Malicious act.
Also, activity undertakes method, system after the authorized order that campaign owners system is sent is received, being capable of basis
The authorization message that the authorized order is carried is authenticated to user profile, while also sending out the action message of the user of participation activity
Deliver to campaign owners system, thus successfully to campaign owners system and activity undertake method, system coupling carried out every
From, it is ensured that the security of campaign owners system.
It is above-mentioned that Above-the-line protection of usage right method is described in detail, below, will be to being weighed using the Above-the-line
The equipment and computer-readable recording medium for limiting guard method are described.
As shown in Figure 10, the structural representation of the first embodiment for the protection of usage right equipment that the present invention is provided, the authority is protected
Shield equipment includes:Memory 101, processor 102.Wherein, the protection of usage right program that is stored with memory 101 simultaneously can be in processing
Run on device 102.During protection of usage right program on the run memory 101 of processor 102, following steps are performed:
When receiving the request instruction of participation activity, authorization requests instruction is sent to method, system is sponsored, the mandate please
Ask and the user profile that request participates in active user is carried in instruction;And, method, system is sponsored according to the user described in reception
Authorized order or the unauthorized instruction that information is returned.
It should be noted that user participation activity undertake method, system undertake activity before, it is necessary to first log in sponsor
System, then by way of sending request instruction, the activity that method, system is held is undertaken in request participation activity.Movable undertaker system
, it is necessary to authorization requests instruction be sent to campaign owners system, to ask activity when system receives the request instruction that user sends
Behavior of the sponsor to user's participation activity is authorized.Carry the user's of request participation activity in authorization requests instruction
User profile, such as user's id information.Campaign owners system is received after authorization requests instruction, extracts authorization requests instruction
User's id information of middle carrying, whether then according to activity preset rules, it is the use for meeting activity preset rules to search the user
Family, if it is, return to authorized order undertakes method, system to activity, activity undertaking is given if it is not, then returning to unauthorized and instructing
Method, system.
Wherein, activity preset rules for example can be:The region belonging to the user of participation activity is set, participation activity is set
User belonging to grade etc..
Activity is undertaken after authorized order or the unauthorized instruction that method, system receives the return of campaign owners system, according to
Authorized order or the instruction of unauthorized instruction, it is allowed to or refusal user's participation activity.Wherein, authorized order can be with the shape of encryption
Formula is transmitted, also, the authorized order sent can have necessarily ageing, expired then unusable.Unauthorized is instructed
It can be then transmitted in the form of plaintext.
The Above-the-line protection of usage right equipment of the embodiment of the present invention, activity undertakes method, system and is receiving user's request participation
, it is necessary to send authorization requests instruction to campaign owners system, request campaign owners system is to request after the request of activity
The user of participation activity is authorized.With movable undertaker's system of users information in the prior art merely be authenticated phase
Than the equipment of the embodiment of the present invention needs campaign owners system to asking the user of participation activity to ask to authorize so that activity
Sponsoring method, system can control activity to undertake the behavior of method, system, user can be authenticated and be protected, prevent malicious act.
Further, the processor 102 is when performing authority defence program, and the instruction that activity undertaking method, system is received is not
Together, operation is also differed.If what is received is unauthorized instruction, the prompting of output refusal user's participation activity.Need
Illustrate, while the prompting of output refusal user's participation activity, the reason for refusal participates in interactive can also be exported, for example
The user of inactive region, or user gradation are not up to requirement etc..If what is received is authorized order, enter activity undertaking
The step of method, system is authenticated to the user profile.The authorization message instruction user carried according to the authorized order is joined
With activity.The specific actual conditions for indicating user's participation activity in authorization message, for example, it is assumed that authorization message indicates to allow to use
The time of family participation activity is a hour.So movable undertaker is then according to the authorization message, instruction user participation activity.When
User is already engaged in after the time of activity reaches a hour, and activity undertakes method, system and then points out user to continue to participate in work
It is dynamic.
After user has participated in activity, action message of the processor 102 also by user's participation activity is sent to movable master
Do method, system.When sending action message, secured communication channel, such as https are used between system.So so that campaign owners
System can be preserved and analyzed according to the action message received, to obtain activity purpose data.
The Above-the-line protection of usage right equipment of the embodiment of the present invention, activity undertakes method, system and is receiving campaign owners system
Unite after the authorized order sent, the authorization message that can be carried according to the authorized order is authenticated to user profile, simultaneously
Also the action message of the user of participation activity is sent to campaign owners system, thus successfully to campaign owners system and
The coupling that method, system is undertaken in activity is isolated, it is ensured that the security of campaign owners system.
As shown in figure 11, the structural representation of the second embodiment for the protection of usage right equipment that the present invention is provided, the authority is protected
Shield equipment includes:Memory 111, processor 112.Wherein, the protection of usage right program that is stored with memory 111 simultaneously can be in processing
Run on device 112.During protection of usage right program on the run memory 111 of processor 112, following steps are performed:
The authorization requests instruction that method, system is sent is undertaken in reception activity, and carrying request in the authorization requests instruction participates in
The user profile of active user;
According to activity preset rules and the user profile, it is determined whether authorize user's participation activity;
Method, system, which is undertaken, to the activity sends authorized order or unauthorized instruction.
Wherein, user participation activity undertake method, system undertake activity before, it is necessary to first log in campaign owners system,
Then by way of sending request instruction, the activity that method, system is held is undertaken in request participation activity.Activity is undertaken method, system and connect
, it is necessary to authorization requests instruction be sent to campaign owners system, to ask activity to be sponsored when receiving the request instruction that user sends
Behavior of the side to user's participation activity is authorized.The user of the user of request participation activity is carried in authorization requests instruction
Information, such as user's id information.Campaign owners system is received after authorization requests instruction, is extracted and is taken in authorization requests instruction
User's id information of band, then according to activity preset rules, whether be the user that meets activity preset rules, such as if searching the user
Fruit is then to return to authorized order and undertake method, system to activity, and movable undertaker system is given if it is not, then returning to unauthorized and instructing
System.Activity is so enabled to undertake the instruction that method, system is instructed according to authorized order or unauthorized, it is allowed to or refusal user's ginseng
With activity.Wherein, authorized order can be transmitted in an encrypted form, also, the authorized order sent can have necessarily
It is ageing, it is expired then unusable.Unauthorized instruction can be then transmitted in the form of plaintext.
The Above-the-line protection of usage right equipment of the embodiment of the present invention, campaign owners system is receiving authorization requests instruction
Afterwards, it is necessary to the user profile and activity preset rules that are carried in being instructed according to authorization requests to ask participation activity user
Authorized, and return to authorized order or unauthorized instructs and undertakes method, system to activity.It is with movable undertaker in the prior art
System is simple to user profile to be authenticated comparing, and the equipment of the embodiment of the present invention needs campaign owners system to participate in request
User's request of activity is authorized so that campaign owners system can control the behavior of activity undertaking method, system, can be to user
It is authenticated and protects, prevents malicious act.
Further, the processor 112 is also executed the following steps when performing authority defence program:
Receive the action message that user's participation activity that method, system is sent is undertaken in the activity;
The activity data of the user of storage is updated according to the action message.
Wherein, after method, system transmission authorized order is undertaken to the activity, activity undertakes method, system then according to mandate
The authorization message instruction user participation activity carried in instruction.After user's participation activity is finished, then activity undertakes method, system also
The action message of user's participation activity is used into secured communication channel, such as http form is sent to campaign owners system.It is living
It is dynamic to sponsor the action message for user's participation activity that method, system reception activity undertaking method, system is sent, and update the ginseng of storage
With the activity data of the user of activity.
The equipment of the embodiment of the present invention, undertakes method, system in activity and refers to receiving the mandate that campaign owners system sends
After order, the authorization message that can be carried according to the authorized order is authenticated to user profile, while also by participation activity
The action message of user is sent to campaign owners system, so as to successfully undertake method, system to campaign owners system and activity
Coupling isolated, it is ensured that the security of campaign owners system.
Correspondingly, present invention also offers a kind of computer-readable recording medium, the computer-readable recording medium storage
Defence program is had permission, when the protection of usage right program is by least one computing device, following steps are performed:
When receiving the request instruction of participation activity, authorization requests instruction is sent to campaign owners system, it is described to award
The user profile of the user of request participation activity is carried in power request instruction;And, receive the campaign owners system root
Authorized order or the unauthorized instruction returned according to the user profile.
And refer to sponsoring authorized order or unauthorized that method, system returns according to the user profile described in the reception
After order, also perform:If what is received is the unauthorized instruction, the prompting of output refusal participation activity;If receiving
The authorized order, then the authorization message instruction user participation activity carried according to the authorized order.Described according to institute
After the authorization message instruction user participation activity for stating authorized order carrying, also perform:By the activity of user's participation activity
The step of information is sent to the campaign owners system.
Correspondingly, present invention also offers a kind of computer-readable recording medium, the computer-readable recording medium storage
Defence program is had permission, when the protection of usage right program is by least one computing device, following steps are performed:
The authorization requests instruction that method, system is sent is undertaken in reception activity, and carrying request in the authorization requests instruction participates in
The user profile of the user of activity;According to activity preset rules and the user profile, it is determined whether authorize the user to participate in
Activity;And undertake method, system transmission authorized order or unauthorized instruction to the activity.
Also, it is described to it is described activity undertake method, system send authorized order after, also perform:
Receive the action message that user's participation activity that method, system is sent is undertaken in the activity;And according to the work
The activity data of the user of dynamic information updating storage.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property is included, so that process, method, article or device including a series of key elements not only include those key elements, and
And also including other key elements being not expressly set out, or also include for this process, method, article or device institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Also there is other identical element in process, method, article or the device of key element.
The embodiments of the present invention are for illustration only, and the quality of embodiment is not represented.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Understood based on such, technical scheme is substantially done to prior art in other words
Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions are to cause a station terminal equipment (can be mobile phone, computer, clothes
It is engaged in device, air conditioner, or network equipment etc.) perform method described in each embodiment of the invention.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair
Equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of Above-the-line protection of usage right method, undertakes method, system, it is characterised in that the protection of usage right side applied to activity
Method includes:
When receiving the request instruction of participation activity, authorization requests instruction is sent to campaign owners system, the mandate please
Seek the user profile for the user that request participation activity is carried in instruction;And,
Receive authorized order or unauthorized instruction that the campaign owners system is returned according to the user profile;
If what is received is the unauthorized instruction, the prompting of output refusal participation activity;
If what is received is the authorized order, the authorization message instruction user carried according to the authorized order participates in living
It is dynamic.
2. protection of usage right method as claimed in claim 1, it is characterised in that described according to awarding that the authorized order is carried
Weigh after information instruction user participation activity, the protection of usage right method also includes:
The action message of user's participation activity is sent to the campaign owners system.
3. a kind of Above-the-line protection of usage right method, applied to campaign owners system, it is characterised in that the protection of usage right side
Method includes:
The authorization requests instruction that method, system is sent is undertaken in reception activity, and request participation activity is carried in the authorization requests instruction
User user profile;
According to activity preset rules and the user profile, it is determined whether authorize user's participation activity;
Method, system, which is undertaken, to the activity sends authorized order or unauthorized instruction.
4. protection of usage right method as claimed in claim 3, it is characterised in that sent described to the activity undertaking method, system
After authorized order, the protection of usage right method also includes:
Receive the action message that user's participation activity that method, system is sent is undertaken in the activity;
The activity data of the user of storage is updated according to the action message.
5. a kind of Above-the-line protection of usage right equipment, it is characterised in that the protection of usage right equipment include memory, processor and
The protection of usage right program that can be run on the memory and on the processor is stored in, the protection of usage right program is performed such as
Lower step:
When receiving the request instruction of participation activity, authorization requests instruction is sent to method, system is sponsored, the authorization requests refer to
The user profile that request participates in active user is carried in order;
Authorized order or unauthorized instruction that method, system is returned according to the user profile are sponsored described in receiving;
If what is received is the unauthorized instruction, the prompting of output refusal participation activity;
If what is received is the authorized order, the instruction user of the authorization message carried according to the authorized order participates in living
It is dynamic.
6. protection of usage right equipment as claimed in claim 5, it is characterised in that sent described to the activity undertaking method, system
After authorized order, the protection of usage right program is also performed:
Receive the action message that user's participation activity that method, system is sent is undertaken in the activity;
The activity data of the user of storage is updated according to the action message.
7. a kind of Above-the-line protection of usage right equipment, it is characterised in that the protection of usage right equipment include memory, processor and
The protection of usage right program that can be run on the memory and on the processor is stored in, the protection of usage right program is performed such as
Lower step:
The authorization requests instruction that method, system is sent is undertaken in reception activity, and request participation activity is carried in the authorization requests instruction
The user profile of user;
According to activity preset rules and the user profile, it is determined whether authorize user's participation activity;
Method, system, which is undertaken, to the activity sends authorized order or unauthorized instruction.
8. protection of usage right equipment as claimed in claim 7, it is characterised in that sent described to the activity undertaking method, system
After authorized order, the protection of usage right program also includes:
Receive the action message that user's participation activity that method, system is sent is undertaken in the activity;
The activity data of the user of storage is updated according to the action message.
9. a kind of computer-readable recording medium, it is characterised in that the computer-readable recording medium storage has permission protection
Program, the power any one of claim 1 to 2 is realized when the protection of usage right program is by least one computing device
The step of limiting guard method.
10. a kind of computer-readable recording medium, it is characterised in that the computer-readable recording medium storage has permission protection
Program, the power any one of claim 3 to 4 is realized when the protection of usage right program is by least one computing device
The step of limiting guard method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710289857.3A CN107135214A (en) | 2017-04-27 | 2017-04-27 | Above-the-line protection of usage right method, equipment and computer-readable recording medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710289857.3A CN107135214A (en) | 2017-04-27 | 2017-04-27 | Above-the-line protection of usage right method, equipment and computer-readable recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107135214A true CN107135214A (en) | 2017-09-05 |
Family
ID=59715362
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710289857.3A Pending CN107135214A (en) | 2017-04-27 | 2017-04-27 | Above-the-line protection of usage right method, equipment and computer-readable recording medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107135214A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103164636A (en) * | 2011-12-09 | 2013-06-19 | 北大方正集团有限公司 | On-line reading digital content authentication method and system |
CN104038508A (en) * | 2014-07-02 | 2014-09-10 | 携程计算机技术(上海)有限公司 | Setting system and method for website account access permission |
US20150280911A1 (en) * | 2013-08-02 | 2015-10-01 | Issam ANDONI | Methods of and Systems for Facilitating Decryption of Encrypted Electronic Information |
CN105897682A (en) * | 2015-12-11 | 2016-08-24 | 乐视云计算有限公司 | Online authentication method and device |
CN106330888A (en) * | 2016-08-19 | 2017-01-11 | 中国银行股份有限公司 | Method and device for ensuring security of Internet online payment |
CN106453195A (en) * | 2015-08-04 | 2017-02-22 | 腾讯科技(深圳)有限公司 | Resource request processing, authentication request processing and authentication method, system and device |
CN106506560A (en) * | 2016-12-29 | 2017-03-15 | 广州华多网络科技有限公司 | A kind of right management method, and device |
-
2017
- 2017-04-27 CN CN201710289857.3A patent/CN107135214A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103164636A (en) * | 2011-12-09 | 2013-06-19 | 北大方正集团有限公司 | On-line reading digital content authentication method and system |
US20150280911A1 (en) * | 2013-08-02 | 2015-10-01 | Issam ANDONI | Methods of and Systems for Facilitating Decryption of Encrypted Electronic Information |
CN104038508A (en) * | 2014-07-02 | 2014-09-10 | 携程计算机技术(上海)有限公司 | Setting system and method for website account access permission |
CN106453195A (en) * | 2015-08-04 | 2017-02-22 | 腾讯科技(深圳)有限公司 | Resource request processing, authentication request processing and authentication method, system and device |
CN105897682A (en) * | 2015-12-11 | 2016-08-24 | 乐视云计算有限公司 | Online authentication method and device |
CN106330888A (en) * | 2016-08-19 | 2017-01-11 | 中国银行股份有限公司 | Method and device for ensuring security of Internet online payment |
CN106506560A (en) * | 2016-12-29 | 2017-03-15 | 广州华多网络科技有限公司 | A kind of right management method, and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107527200A (en) | A kind of payment management method, mobile terminal and computer-readable recording medium | |
CN107508892A (en) | A kind of page access method, server and computer-readable recording medium | |
CN107885474A (en) | Multi-screen terminal mobile payment control method, terminal and computer-readable recording medium | |
CN107395850A (en) | A kind of social communication information guard method, device and computer-readable recording medium | |
CN107862196A (en) | Fingerprint verification method, mobile terminal and computer-readable recording medium | |
CN107517321A (en) | Terminal pattern switching method, mobile terminal and computer-readable recording medium | |
CN107517208A (en) | Apparatus control method, device and computer-readable recording medium | |
CN107122817A (en) | Processing method and Quick Response Code terminal based on Quick Response Code | |
CN107580336A (en) | A kind of method for connecting network, terminal and computer-readable recording medium | |
CN107343272A (en) | A kind of data traffic sharing method and mobile terminal | |
CN107276991A (en) | Load method, equipment and the computer-readable recording medium of Web page | |
CN107896287A (en) | Phone number risk monitoring method and mobile terminal | |
CN107180184A (en) | Application program right management method, device and computer-readable recording medium | |
CN107846675A (en) | Register method, terminal, registrar and computer-readable recording medium | |
CN108601062A (en) | WiFi connections sharing method, terminal and computer storage media | |
CN107347117A (en) | A kind of message management method, mobile terminal and computer-readable recording medium | |
CN107330314A (en) | Authorization method, mobile terminal and readable storage medium storing program for executing based on biological characteristic | |
CN107613130A (en) | A kind of application management method, mobile terminal and computer-readable recording medium | |
CN110052023A (en) | Game control method, mobile terminal and computer readable storage medium | |
CN107194217A (en) | User data access control method, equipment and computer-readable recording medium | |
CN107516051A (en) | A kind of data encryption storage method, device and computer-readable recording medium | |
CN107395363A (en) | Fingerprint sharing method and mobile terminal | |
CN107204977A (en) | Interface security method of calibration and device, computer-readable recording medium | |
CN107317932A (en) | Use method for limiting, mobile terminal and the computer-readable recording medium of terminal | |
CN106888225A (en) | A kind of control method of single-sign-on application, mobile terminal and computer-readable medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170905 |
|
RJ01 | Rejection of invention patent application after publication |