CN107135214A - Above-the-line protection of usage right method, equipment and computer-readable recording medium - Google Patents

Above-the-line protection of usage right method, equipment and computer-readable recording medium Download PDF

Info

Publication number
CN107135214A
CN107135214A CN201710289857.3A CN201710289857A CN107135214A CN 107135214 A CN107135214 A CN 107135214A CN 201710289857 A CN201710289857 A CN 201710289857A CN 107135214 A CN107135214 A CN 107135214A
Authority
CN
China
Prior art keywords
activity
user
usage right
instruction
protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710289857.3A
Other languages
Chinese (zh)
Inventor
黄沂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201710289857.3A priority Critical patent/CN107135214A/en
Publication of CN107135214A publication Critical patent/CN107135214A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of Above-the-line protection of usage right method, equipment and computer-readable recording medium.The protection of usage right method includes:When receiving the request instruction of participation activity, authorization requests instruction is sent to campaign owners system, the user profile of the user of request participation activity is carried in the authorization requests instruction;And, receive authorized order or unauthorized instruction that the campaign owners system is returned according to the user profile.Apply the technical scheme of the present invention, malicious act, lifting system security can be prevented.

Description

Above-the-line protection of usage right method, equipment and computer-readable recording medium
Technical field
The present invention relates to computer communication technology field, more particularly to a kind of Above-the-line protection of usage right method, equipment and Computer-readable recording medium.
Background technology
With the development of business on grid line, various Above-the-line are more and more.The system of industry-by-industry passes through third party The modes such as (movable undertaker) activity reward user integral prize are popularized very much.Also layer goes out for the behavior of various malice brush integrations simultaneously It is not poor, normal users interests are damaged, animation effect is influenceed.Therefore website before release activity it is necessary to carrying out security protection.
Current web station system typically all provides a kind of mechanism, and third party (movable undertaker) activity system is accessed to user Control of authority and protection are carried out, malicious act is prevented.However, the method for preventing malicious act currently commonly used:Website is by knowing User agent information in other user's http request accesses to identify whether normal users by webpage or App, but this Plant data to be relatively easily forged, after data are tampered, this recognition mechanism just fails.The user for sponsoring method, system is simply the Tripartite's activity (movable undertaker) system does simple user authentication, and sponsor is with regard to uncontrollable third party (movable undertaker) system System behavior, and the system that third party's leak or malicious act unavoidably have influence on oneself.For example, User logs in Taobao is (living Dynamic sponsor) after system, the sweepstake of some flagship store of official (movable undertaker) system is participated in, due to movable undertaker system System simply does simple certification to user, and this simple authentication security is not high, is easily tampered, so as to influence the sponsor to be System.
The content of the invention
It is a primary object of the present invention to propose a kind of Above-the-line protection of usage right method, equipment and computer-readable storage Medium, can prevent malicious act, lifting system security.
To achieve the above object, a kind of Above-the-line protection of usage right method that the present invention is provided, applied to the activity on line Method, system is undertaken, the protection of usage right method includes:
When receiving the request instruction of participation activity, authorization requests instruction is sent to method, system is sponsored, the mandate please Ask and the user profile that request participates in active user is carried in instruction;And,
Authorized order or unauthorized instruction that method, system is returned according to the user profile are sponsored described in receiving.
Wherein, refer to sponsoring authorized order or unauthorized that method, system returns according to the user profile described in the reception After order, the protection of usage right method also includes:
If what is received is the unauthorized instruction, the prompting of output refusal participation activity;
If what is received is the authorized order, the instruction user of the authorization message carried according to the authorized order is joined With activity.
Wherein, it is described after the instruction user participation activity of the authorization message carried according to the authorized order Protection of usage right method also includes:
The action message of user's participation activity is sent to described and sponsors method, system.
Present invention also offers a kind of Above-the-line protection of usage right method, applied to the campaign owners system on line, institute Stating protection of usage right method includes:
The authorization requests instruction that method, system is sent is undertaken in reception activity, and carrying request in the authorization requests instruction participates in The user profile of active user;
According to activity preset rules and the user profile, it is determined whether authorize user's participation activity;
Method, system, which is undertaken, to the activity sends authorized order or unauthorized instruction.
Wherein, it is described to it is described activity undertake method, system send authorized order after, the protection of usage right method is also wrapped Include:
Receive the action message that user's participation activity that method, system is sent is undertaken in the activity;
The activity data of the user of storage is updated according to the action message.
In addition, to achieve the above object, the present invention also proposes a kind of Above-the-line protection of usage right equipment, the protection of usage right Equipment includes memory, processor and is stored in the protection of usage right journey that can be run on the memory and on the processor Sequence, the protection of usage right program performs following steps:
When receiving the request instruction of participation activity, authorization requests instruction is sent to method, system is sponsored, the mandate please Ask and the user profile that request participates in active user is carried in instruction;And,
Authorized order or unauthorized instruction that method, system is returned according to the user profile are sponsored described in receiving.
Wherein, refer to sponsoring authorized order or unauthorized that method, system returns according to the user profile described in the reception After order, the protection of usage right program is also performed:
If what is received is the unauthorized instruction, the prompting of output refusal participation activity;
If what is received is the authorized order, the instruction user of the authorization message carried according to the authorized order is joined With activity.
Wherein, it is described to it is described activity undertake method, system send authorized order after, the protection of usage right program is also held OK:
Receive the action message that user's participation activity that method, system is sent is undertaken in the activity;
The activity data of the user of storage is updated according to the action message.
Present invention also offers a kind of Above-the-line protection of usage right equipment, the protection of usage right equipment includes memory, place Manage device and be stored in the protection of usage right program that can be run on the memory and on the processor, the protection of usage right program Perform following steps:
The authorization requests instruction that method, system is sent is undertaken in reception activity, and carrying request in the authorization requests instruction participates in The user profile of active user;
According to activity preset rules and the user profile, it is determined whether authorize user's participation activity;
Method, system, which is undertaken, to the activity sends authorized order or unauthorized instruction.
Wherein, it is described to it is described activity undertake method, system send authorized order after, the protection of usage right program is also wrapped Include:
Receive the action message that user's participation activity that method, system is sent is undertaken in the activity;
The activity data of the user of storage is updated according to the action message.
In addition, present invention also offers a kind of computer-readable recording medium, the computer-readable recording medium storage Defence program is had permission, realization activity is undertaken method, system and performed when the protection of usage right program is by least one computing device Protection of usage right method the step of.
Present invention also offers a kind of computer-readable recording medium, the computer-readable recording medium storage has permission Defence program, realizes that claim campaign owners system is held when the protection of usage right program is by least one computing device The step of capable protection of usage right method.
The beneficial effects of the invention are as follows:
The technical scheme of the embodiment of the present invention, activity undertake method, system receive user request participation activity request it Afterwards, it is necessary to send authorization requests instruction, use of the request campaign owners system to request participation activity to campaign owners system Family is authorized.Campaign owners system is after authorization requests instruction is received, it is necessary to be carried in being instructed according to authorization requests User profile and activity preset rules the user for asking participation activity is authorized, and return to authorized order or unauthorized Instruct and undertake method, system to activity.Compared with being authenticated merely of movable undertaker's system of users information in the prior art, The method of the embodiment of the present invention needs campaign owners system to asking the user of participation activity to ask to authorize so that activity is sponsored Method, system can control activity to undertake the behavior of method, system, user can be authenticated and be protected, prevent malicious act.
Brief description of the drawings
Fig. 1 is the hardware architecture diagram for the mobile terminal for realizing each embodiment of the invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the first embodiment that the Above-the-line protection of usage right method of method, system is undertaken in activity that is applied to of the present invention Schematic flow sheet;
Fig. 4 is the second embodiment of the Above-the-line protection of usage right method for being applied to activity undertaking method, system of the present invention Schematic flow sheet;
Fig. 5 is the first embodiment of the Above-the-line protection of usage right method applied to campaign owners system of the present invention Schematic flow sheet;
Fig. 6 is the second embodiment of the Above-the-line protection of usage right method applied to campaign owners system of the present invention Schematic flow sheet;
Fig. 7 is the schematic flow sheet of the embodiment of the Above-the-line protection of usage right method of the present invention;
Fig. 8 is the interaction schematic diagram of the Above-the-line protection of usage right method of the present invention;
Fig. 9 is the interaction schematic diagram of the Above-the-line protection of usage right method of the present invention;
Figure 10 is the structural representation of the first embodiment of the Above-the-line protection of usage right equipment of the present invention;
Figure 11 is the structural representation of the second embodiment of the Above-the-line protection of usage right equipment of the present invention;
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only Be conducive to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can be mixed Ground is used.
The Above-the-line protection of usage right equipment and computer-readable recording medium provided in the present invention, for example, can be each Plant terminal.Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. are moved Move the fixed terminals such as terminal, and numeral TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of realization each embodiment of the invention, the shifting Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103rd, A/V (audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit 108th, the part such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1 Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal can be included than illustrating more or less parts, Either combine some parts or different parts arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station Downlink information receive after, handled to processor 110;In addition, up data are sent into base station.Generally, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user's transmitting-receiving electricity by WiFi module 102 Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need To be omitted in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 1 00 When under the isotypes such as formula, speech recognition mode, broadcast reception mode, it is that radio frequency unit 101 or WiFi module 102 are received or The voice data stored in memory 109 is converted into audio signal and is output as sound.Moreover, audio output unit 103 The audio output related to the specific function that mobile terminal 1 00 is performed can also be provided (for example, call signal receives sound, disappeared Breath receives sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042,1041 pairs of graphics processor is in video acquisition mode Or the view data progress of the static images or video obtained in image capture mode by image capture apparatus (such as camera) Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after being handled through graphics processor 1041 can be deposited Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model. Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound The noise produced during frequency signal or interference.
Mobile terminal 1 00 also includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity transducer can close when mobile terminal 1 00 is moved in one's ear Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general For three axles) size of acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can be wrapped Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it (such as user is using any suitable objects such as finger, stylus or annex on contact panel 1071 or in contact panel 1071 Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection Two parts of device and touch controller.Wherein, touch detecting apparatus detects the touch orientation of user, and detects touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can be wrapped Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, with preprocessor 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel 1061 be input and the output function that mobile terminal is realized as two independent parts, but in certain embodiments, can By contact panel 1071 and the input that is integrated and realizing mobile terminal of display panel 1061 and output function, not do specifically herein Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 1 00.For example, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 1 00 or can be with For transmitting data between mobile terminal 1 00 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area And storage data field, wherein, application program (the such as sound that storing program area can be needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data field can be stored uses created data (such as according to mobile phone Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, it can also include non-easy The property lost memory, for example, at least one disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection Individual part, by operation or performs and is stored in software program and/or module in memory 109, and calls and be stored in storage Data in device 109, perform the various functions and processing data of mobile terminal, so as to carry out integral monitoring to mobile terminal.Place Reason device 110 may include one or more processing units;It is preferred that, processor 110 can integrated application processor and modulatedemodulate mediate Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 1 00 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put The function such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 1 00 can also will not be repeated here including bluetooth module etc..
For the ease of understanding the embodiment of the present invention, the communications network system that the mobile terminal of the present invention is based on is entered below Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system Unite as the LTE system of universal mobile communications technology, UE (User Equipment, use of the LTE system including communicating connection successively Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and here is omitted.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connected with other eNodeB2022, and eNodeB2021 is connected to EPC203, ENodeB2021 can provide UE201 to EPC203 access.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way, Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and There is provided carrying and connection management for the control node of signaling between EPC203.HSS2032 is all to manage for providing some registers Such as function of attaching position register (not shown) etc, and some are preserved about the use such as service features, data rate The special information in family.All customer data can be transmitted by SGW2034, and PGW2035 can provide UE 201 IP Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources Point, it selects and provided available strategy and charging control decision-making with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And following new network system etc., do not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the inventive method is proposed.
Description based on background technology understand, active user participate in line on miscellaneous service when, due to movable undertaker System is to carry out simple user authentication, and this mechanism is easily forged, and due to sponsoring the uncontrollable activity of method, system The system action of undertaker, thus activity undertake method, system leak or malicious act can also be impacted to sponsoring method, system. It is proposed to this end that Above-the-line protection of usage right method, equipment and the computer-readable recording medium of the present invention.
As shown in figure 3, being the first of the Above-the-line protection of usage right method for being applied to activity undertaking method, system of the present invention The schematic flow sheet of embodiment.Wherein, the Above-the-line protection of usage right method can be used for mobile terminal, for example, can be intelligence The equipment such as mobile phone, tablet personal computer, personal digital assistant.
As shown in figure 3, the Above-the-line protection of usage right method comprises the following steps:
Step 301:When receiving the request instruction of participation activity, send authorization requests to campaign owners system and refer to Order, carries the user profile of the user of request participation activity in the authorization requests instruction.
Step 302:Authorized order or unauthorized instruction that method, system is returned according to the user profile are sponsored described in receiving.
It should be noted that user participation activity undertake method, system undertake activity before, it is necessary to first log in sponsor System, then by way of sending request instruction, the activity that method, system is held is undertaken in request participation activity.It is living in step 301 It is dynamic to undertake when method, system receives the request instruction that user sends, it is necessary to send authorization requests instruction to campaign owners system, To ask behavior of the campaign owners to user's participation activity to authorize.Request is carried in authorization requests instruction to participate in living The user profile of dynamic user, such as user's id information.Campaign owners system is received after authorization requests instruction, and extraction is awarded The user's id information carried in power request instruction, whether then according to activity preset rules, it is that satisfaction activity is pre- to search the user If the user of rule, if it is, return to authorized order undertakes method, system to activity, if it is not, then returning to unauthorized instruction Method, system is undertaken to activity.
Wherein, activity preset rules for example can be:The region belonging to the user of participation activity is set, participation activity is set User belonging to grade etc..
In step 302, the authorized order or unauthorized that activity undertaking method, system receives the return of campaign owners system refer to After order, the instruction instructed according to authorized order or unauthorized, it is allowed to or refusal user's participation activity.Wherein, authorized order can To be transmitted in an encrypted form, also, the authorized order sent can have necessarily ageing, expired, can not make With.Unauthorized instruction can be then transmitted in the form of plaintext.
The Above-the-line protection of usage right method of the embodiment of the present invention, activity undertakes method, system and is receiving user's request participation , it is necessary to send authorization requests instruction to campaign owners system, request campaign owners system is to request after the request of activity The user of participation activity is authorized.With movable undertaker's system of users information in the prior art merely be authenticated phase Than the method for the embodiment of the present invention needs campaign owners system to asking the user of participation activity to ask to authorize so that activity Sponsoring method, system can control activity to undertake the behavior of method, system, user can be authenticated and be protected, prevent malicious act.
As shown in figure 4, being the second of the Above-the-line protection of usage right method for being applied to activity undertaking method, system of the present invention The schematic flow sheet of embodiment.Wherein, the Above-the-line protection of usage right method can be used for mobile terminal, for example, can be intelligence The equipment such as mobile phone, tablet personal computer, personal digital assistant.
As shown in figure 4, the Above-the-line protection of usage right method comprises the following steps:
Step 401:When receiving the request instruction of participation activity, send authorization requests to campaign owners system and refer to Order, carries the user profile of the user of request participation activity in the authorization requests instruction.
Step 402:Authorized order or unauthorized instruction that method, system is returned according to the user profile are sponsored described in receiving.
Step 403:If what is received is the unauthorized instruction, the prompting of output refusal user's participation activity.
Step 404:If what is received is the authorized order, the authorization message carried according to the authorized order is indicated User's participation activity.
Step 405:The action message of user's participation activity is sent to the campaign owners system.
It should be noted that the present embodiment and the difference of the embodiment shown in Fig. 3 are:
In step 402, the instruction difference that method, system is received is undertaken according to activity, operation is also differed.If step 402 In receive is unauthorized instruction, then into step 403, the prompting of output refusal user's participation activity, such as Fig. 8 institutes Show.It should be noted that while the prompting of output refusal user's participation activity, refusal can also be exported and participate in interactive original The user of cause, such as inactive region, or user gradation are not up to requirement etc..If what is received in step 402 is to authorize to refer to Order, then into step 404 to step 405.
When performing step 404, activity undertakes method, system and also the user profile is authenticated, i.e., authorized according to described Instruct the authorization message instruction user participation activity carried.The specific specific bar for indicating user's participation activity in authorization message Part, for example, it is assumed that authorization message indicates to allow the time of user's participation activity to be a hour.So movable undertaker then basis The authorization message, instruction user participation activity, as shown in Figure 9.When user be already engaged in activity time reach one small when it Afterwards, activity undertaking method, system then points out user to continue activity.
After user has participated in activity, activity undertakes method, system and also performs step 405, by the activity of user's participation activity Information is sent to campaign owners system.When sending action message, secured communication channel, such as https are used between system.This Sample so that campaign owners system can be preserved and analyzed according to the action message received, to obtain activity purpose Data.
The Above-the-line protection of usage right method of the embodiment of the present invention, activity undertakes method, system and is receiving user's request participation , it is necessary to send authorization requests instruction to campaign owners system, request campaign owners system is to request after the request of activity The user of participation activity is authorized.With movable undertaker's system of users information in the prior art merely be authenticated phase Than the method for the embodiment of the present invention needs campaign owners system to asking the user of participation activity to ask to authorize so that activity Sponsoring method, system can control activity to undertake the behavior of method, system, user can be authenticated and be protected, prevent malicious act.
Also, activity undertakes method, system after the authorized order that campaign owners system is sent is received, being capable of basis The authorization message that the authorized order is carried is authenticated to user profile, while also sending out the action message of the user of participation activity Deliver to campaign owners system, thus successfully to campaign owners system and activity undertake method, system coupling carried out every From, it is ensured that the security of campaign owners system.
It should be noted that being that Above-the-line protection of usage right method is retouched from the angle of movable undertaker above State, below, Above-the-line protection of usage right method will be described from campaign owners angle by Fig. 5 and Fig. 6.
As shown in figure 5, being the first of the Above-the-line protection of usage right method applied to campaign owners system of the present invention The schematic flow sheet of embodiment.The Above-the-line protection of usage right method can be used for mobile terminal, for example can be smart mobile phone, The equipment such as tablet personal computer, personal digital assistant.
As shown in figure 5, the Above-the-line protection of usage right method comprises the following steps:
Step 501:The authorization requests instruction that method, system is sent is undertaken in reception activity, is carried in the authorization requests instruction Ask the user profile of the user of participation activity.
Step 502:According to activity preset rules and the user profile, it is determined whether authorize user's participation activity.
Step 503:Method, system, which is undertaken, to the activity sends authorized order or unauthorized instruction.
In step 501 to step 503, user is before the activity that method, system is undertaken is undertaken in participation activity, it is necessary to first log in Campaign owners system, then by way of sending request instruction, the activity that method, system is held is undertaken in request participation activity.It is living It is dynamic to undertake when method, system receives the request instruction that user sends, it is necessary to send authorization requests instruction to campaign owners system, To ask behavior of the campaign owners to user's participation activity to authorize.Request is carried in authorization requests instruction to participate in living The user profile of dynamic user, such as user's id information.Campaign owners system is received after authorization requests instruction, and extraction is awarded The user's id information carried in power request instruction, whether then according to activity preset rules, it is that satisfaction activity is pre- to search the user If the user of rule, if it is, return to authorized order undertakes method, system to activity, if it is not, then returning to unauthorized instruction Method, system is undertaken to activity.So enable activity to undertake the instruction that method, system is instructed according to authorized order or unauthorized, permit Perhaps or refusal user's participation activity.Wherein, authorized order can be transmitted in an encrypted form, also, the mandate sent refers to Order can have necessarily ageing, expired then unusable.Unauthorized instruction can be then transmitted in the form of plaintext.
The Above-the-line protection of usage right method of the embodiment of the present invention, campaign owners system is receiving authorization requests instruction Afterwards, it is necessary to the user profile and activity preset rules that are carried in being instructed according to authorization requests to ask participation activity user Authorized, and return to authorized order or unauthorized instructs and undertakes method, system to activity.It is with movable undertaker in the prior art System is simple to user profile to be authenticated comparing, and the method for the embodiment of the present invention needs campaign owners system to participate in request User's request of activity is authorized so that campaign owners system can control the behavior of activity undertaking method, system, can be to user It is authenticated and protects, prevents malicious act.
As shown in fig. 6, being the second of the Above-the-line protection of usage right method applied to campaign owners system of the present invention The schematic flow sheet of embodiment.The Above-the-line protection of usage right method can be used for mobile terminal, for example can be smart mobile phone, The equipment such as tablet personal computer, personal digital assistant.
As shown in fig. 6, the Above-the-line protection of usage right method comprises the following steps:
Step 601:The authorization requests instruction that method, system is sent is undertaken in reception activity, is carried in the authorization requests instruction Ask the user profile of the user of participation activity.
Step 602:According to activity preset rules and the user profile, it is determined whether authorize user's participation activity.
Step 603:Method, system, which is undertaken, to the activity sends authorized order or unauthorized instruction.
Step 604:If what it is to the activity undertaking method, system transmission is authorized order, the movable undertaker is also received The action message for user's participation activity that system is sent.
Step 605:The activity data of the user of storage is updated according to the action message.
It should be noted is that, the present embodiment and the difference of the embodiment shown in Fig. 5 are:
After step 603 is performed, step 604 is also performed to step 605.I other words, it is being to the movable undertaker System is sent after authorized order, and activity undertakes method, system and then participated in living according to the authorization message instruction user carried in authorized order It is dynamic.After user's participation activity is finished, then activity is undertaken method, system and is also led to the action message of user's participation activity using safety Believe passage, such as http form is sent to campaign owners system.Campaign owners system reception activity is undertaken method, system and sent User's participation activity action message, and update the activity data of the user of the participation activity of storage.
The Above-the-line protection of usage right method of the embodiment of the present invention, campaign owners system is receiving authorization requests instruction Afterwards, it is necessary to the user profile and activity preset rules that are carried in being instructed according to authorization requests to ask participation activity user Authorized, and return to authorized order and undertake method, system to activity.With movable undertaker's system of users information in the prior art Simple to be authenticated comparing, the method for the embodiment of the present invention needs campaign owners system please to the user for asking participation activity Ask mandate so that campaign owners system can control activity to undertake the behavior of method, system, user can be authenticated and be protected Shield, prevents malicious act.
Also, activity undertakes method, system after the authorized order that campaign owners system is sent is received, being capable of basis The authorization message that the authorized order is carried is authenticated to user profile, while also sending out the action message of the user of participation activity Deliver to campaign owners system, thus successfully to campaign owners system and activity undertake method, system coupling carried out every From, it is ensured that the security of campaign owners system.
Above-described embodiment individually describes the Above-the-line power of the present invention from the angle of movable undertaker or campaign owners Guard method is limited, below, by by the embodiment shown in Fig. 7, this hair is described from the angle of movable undertaker and campaign owners Bright Above-the-line protection of usage right method.
As shown in fig. 7, being the schematic flow sheet of the embodiment of the Above-the-line protection of usage right method of the present invention.It is living on the line Dynamic protection of usage right method can be used for mobile terminal, be set such as can be smart mobile phone, tablet personal computer, personal digital assistant It is standby.The Above-the-line protection of usage right method comprises the following steps:
Step 700, the request instruction that method, system receives participation activity is undertaken in activity.
Step 701, when method, system is undertaken in activity receives the request instruction of participation activity, sent out to campaign owners system Send authorization requests to instruct, the user profile of the user of request participation activity is carried in the authorization requests instruction.
Step 702, the authorization requests instruction that method, system is sent is undertaken in campaign owners system reception activity.
Step 703, campaign owners system is according to activity preset rules and the user profile, it is determined whether authorize described User's participation activity.
Step 704, campaign owners system undertakes method, system to the activity and sends authorized order or unauthorized instruction.
Step 705, activity undertakes method, system and receives the campaign owners system according to awarding that the user profile is returned Power instruction or unauthorized instruction.
Step 706, if what activity undertook that method, system receives is unauthorized instruction, output refusal participation activity Prompting.
Step 707, if what activity undertook that method, system receives is the authorized order, carried according to the authorized order Authorization message instruction user participation activity.
Step 708, activity undertaking method, system, which sends the action message of user's participation activity to the activity, sponsors Method, system.
Step 709, campaign owners system receives the activity and undertakes user's participation activity that method, system is sent Action message.
Step 710, campaign owners system updates the activity data of the user of storage according to the action message.
The Above-the-line protection of usage right method of the embodiment of the present invention, activity undertakes method, system and is receiving user's request participation , it is necessary to send authorization requests instruction to campaign owners system, request campaign owners system is to request after the request of activity The user of participation activity is authorized.Campaign owners system is after authorization requests instruction is received, it is necessary to please according to authorizing Ask the user profile carried in instruction and activity preset rules to authorize the user for asking participation activity, and return to mandate Instruction or unauthorized are instructed undertakes method, system to activity.With the entering merely of movable undertaker's system of users information in the prior art Row certification is compared, and the method for the embodiment of the present invention needs campaign owners system to asking the user of participation activity to ask to authorize, Enable campaign owners system to control activity to undertake the behavior of method, system, user can be authenticated and be protected, prevented Malicious act.
Also, activity undertakes method, system after the authorized order that campaign owners system is sent is received, being capable of basis The authorization message that the authorized order is carried is authenticated to user profile, while also sending out the action message of the user of participation activity Deliver to campaign owners system, thus successfully to campaign owners system and activity undertake method, system coupling carried out every From, it is ensured that the security of campaign owners system.
It is above-mentioned that Above-the-line protection of usage right method is described in detail, below, will be to being weighed using the Above-the-line The equipment and computer-readable recording medium for limiting guard method are described.
As shown in Figure 10, the structural representation of the first embodiment for the protection of usage right equipment that the present invention is provided, the authority is protected Shield equipment includes:Memory 101, processor 102.Wherein, the protection of usage right program that is stored with memory 101 simultaneously can be in processing Run on device 102.During protection of usage right program on the run memory 101 of processor 102, following steps are performed:
When receiving the request instruction of participation activity, authorization requests instruction is sent to method, system is sponsored, the mandate please Ask and the user profile that request participates in active user is carried in instruction;And, method, system is sponsored according to the user described in reception Authorized order or the unauthorized instruction that information is returned.
It should be noted that user participation activity undertake method, system undertake activity before, it is necessary to first log in sponsor System, then by way of sending request instruction, the activity that method, system is held is undertaken in request participation activity.Movable undertaker system , it is necessary to authorization requests instruction be sent to campaign owners system, to ask activity when system receives the request instruction that user sends Behavior of the sponsor to user's participation activity is authorized.Carry the user's of request participation activity in authorization requests instruction User profile, such as user's id information.Campaign owners system is received after authorization requests instruction, extracts authorization requests instruction User's id information of middle carrying, whether then according to activity preset rules, it is the use for meeting activity preset rules to search the user Family, if it is, return to authorized order undertakes method, system to activity, activity undertaking is given if it is not, then returning to unauthorized and instructing Method, system.
Wherein, activity preset rules for example can be:The region belonging to the user of participation activity is set, participation activity is set User belonging to grade etc..
Activity is undertaken after authorized order or the unauthorized instruction that method, system receives the return of campaign owners system, according to Authorized order or the instruction of unauthorized instruction, it is allowed to or refusal user's participation activity.Wherein, authorized order can be with the shape of encryption Formula is transmitted, also, the authorized order sent can have necessarily ageing, expired then unusable.Unauthorized is instructed It can be then transmitted in the form of plaintext.
The Above-the-line protection of usage right equipment of the embodiment of the present invention, activity undertakes method, system and is receiving user's request participation , it is necessary to send authorization requests instruction to campaign owners system, request campaign owners system is to request after the request of activity The user of participation activity is authorized.With movable undertaker's system of users information in the prior art merely be authenticated phase Than the equipment of the embodiment of the present invention needs campaign owners system to asking the user of participation activity to ask to authorize so that activity Sponsoring method, system can control activity to undertake the behavior of method, system, user can be authenticated and be protected, prevent malicious act.
Further, the processor 102 is when performing authority defence program, and the instruction that activity undertaking method, system is received is not Together, operation is also differed.If what is received is unauthorized instruction, the prompting of output refusal user's participation activity.Need Illustrate, while the prompting of output refusal user's participation activity, the reason for refusal participates in interactive can also be exported, for example The user of inactive region, or user gradation are not up to requirement etc..If what is received is authorized order, enter activity undertaking The step of method, system is authenticated to the user profile.The authorization message instruction user carried according to the authorized order is joined With activity.The specific actual conditions for indicating user's participation activity in authorization message, for example, it is assumed that authorization message indicates to allow to use The time of family participation activity is a hour.So movable undertaker is then according to the authorization message, instruction user participation activity.When User is already engaged in after the time of activity reaches a hour, and activity undertakes method, system and then points out user to continue to participate in work It is dynamic.
After user has participated in activity, action message of the processor 102 also by user's participation activity is sent to movable master Do method, system.When sending action message, secured communication channel, such as https are used between system.So so that campaign owners System can be preserved and analyzed according to the action message received, to obtain activity purpose data.
The Above-the-line protection of usage right equipment of the embodiment of the present invention, activity undertakes method, system and is receiving campaign owners system Unite after the authorized order sent, the authorization message that can be carried according to the authorized order is authenticated to user profile, simultaneously Also the action message of the user of participation activity is sent to campaign owners system, thus successfully to campaign owners system and The coupling that method, system is undertaken in activity is isolated, it is ensured that the security of campaign owners system.
As shown in figure 11, the structural representation of the second embodiment for the protection of usage right equipment that the present invention is provided, the authority is protected Shield equipment includes:Memory 111, processor 112.Wherein, the protection of usage right program that is stored with memory 111 simultaneously can be in processing Run on device 112.During protection of usage right program on the run memory 111 of processor 112, following steps are performed:
The authorization requests instruction that method, system is sent is undertaken in reception activity, and carrying request in the authorization requests instruction participates in The user profile of active user;
According to activity preset rules and the user profile, it is determined whether authorize user's participation activity;
Method, system, which is undertaken, to the activity sends authorized order or unauthorized instruction.
Wherein, user participation activity undertake method, system undertake activity before, it is necessary to first log in campaign owners system, Then by way of sending request instruction, the activity that method, system is held is undertaken in request participation activity.Activity is undertaken method, system and connect , it is necessary to authorization requests instruction be sent to campaign owners system, to ask activity to be sponsored when receiving the request instruction that user sends Behavior of the side to user's participation activity is authorized.The user of the user of request participation activity is carried in authorization requests instruction Information, such as user's id information.Campaign owners system is received after authorization requests instruction, is extracted and is taken in authorization requests instruction User's id information of band, then according to activity preset rules, whether be the user that meets activity preset rules, such as if searching the user Fruit is then to return to authorized order and undertake method, system to activity, and movable undertaker system is given if it is not, then returning to unauthorized and instructing System.Activity is so enabled to undertake the instruction that method, system is instructed according to authorized order or unauthorized, it is allowed to or refusal user's ginseng With activity.Wherein, authorized order can be transmitted in an encrypted form, also, the authorized order sent can have necessarily It is ageing, it is expired then unusable.Unauthorized instruction can be then transmitted in the form of plaintext.
The Above-the-line protection of usage right equipment of the embodiment of the present invention, campaign owners system is receiving authorization requests instruction Afterwards, it is necessary to the user profile and activity preset rules that are carried in being instructed according to authorization requests to ask participation activity user Authorized, and return to authorized order or unauthorized instructs and undertakes method, system to activity.It is with movable undertaker in the prior art System is simple to user profile to be authenticated comparing, and the equipment of the embodiment of the present invention needs campaign owners system to participate in request User's request of activity is authorized so that campaign owners system can control the behavior of activity undertaking method, system, can be to user It is authenticated and protects, prevents malicious act.
Further, the processor 112 is also executed the following steps when performing authority defence program:
Receive the action message that user's participation activity that method, system is sent is undertaken in the activity;
The activity data of the user of storage is updated according to the action message.
Wherein, after method, system transmission authorized order is undertaken to the activity, activity undertakes method, system then according to mandate The authorization message instruction user participation activity carried in instruction.After user's participation activity is finished, then activity undertakes method, system also The action message of user's participation activity is used into secured communication channel, such as http form is sent to campaign owners system.It is living It is dynamic to sponsor the action message for user's participation activity that method, system reception activity undertaking method, system is sent, and update the ginseng of storage With the activity data of the user of activity.
The equipment of the embodiment of the present invention, undertakes method, system in activity and refers to receiving the mandate that campaign owners system sends After order, the authorization message that can be carried according to the authorized order is authenticated to user profile, while also by participation activity The action message of user is sent to campaign owners system, so as to successfully undertake method, system to campaign owners system and activity Coupling isolated, it is ensured that the security of campaign owners system.
Correspondingly, present invention also offers a kind of computer-readable recording medium, the computer-readable recording medium storage Defence program is had permission, when the protection of usage right program is by least one computing device, following steps are performed:
When receiving the request instruction of participation activity, authorization requests instruction is sent to campaign owners system, it is described to award The user profile of the user of request participation activity is carried in power request instruction;And, receive the campaign owners system root Authorized order or the unauthorized instruction returned according to the user profile.
And refer to sponsoring authorized order or unauthorized that method, system returns according to the user profile described in the reception After order, also perform:If what is received is the unauthorized instruction, the prompting of output refusal participation activity;If receiving The authorized order, then the authorization message instruction user participation activity carried according to the authorized order.Described according to institute After the authorization message instruction user participation activity for stating authorized order carrying, also perform:By the activity of user's participation activity The step of information is sent to the campaign owners system.
Correspondingly, present invention also offers a kind of computer-readable recording medium, the computer-readable recording medium storage Defence program is had permission, when the protection of usage right program is by least one computing device, following steps are performed:
The authorization requests instruction that method, system is sent is undertaken in reception activity, and carrying request in the authorization requests instruction participates in The user profile of the user of activity;According to activity preset rules and the user profile, it is determined whether authorize the user to participate in Activity;And undertake method, system transmission authorized order or unauthorized instruction to the activity.
Also, it is described to it is described activity undertake method, system send authorized order after, also perform:
Receive the action message that user's participation activity that method, system is sent is undertaken in the activity;And according to the work The activity data of the user of dynamic information updating storage.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property is included, so that process, method, article or device including a series of key elements not only include those key elements, and And also including other key elements being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Also there is other identical element in process, method, article or the device of key element.
The embodiments of the present invention are for illustration only, and the quality of embodiment is not represented.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Understood based on such, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are to cause a station terminal equipment (can be mobile phone, computer, clothes It is engaged in device, air conditioner, or network equipment etc.) perform method described in each embodiment of the invention.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair Equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of Above-the-line protection of usage right method, undertakes method, system, it is characterised in that the protection of usage right side applied to activity Method includes:
When receiving the request instruction of participation activity, authorization requests instruction is sent to campaign owners system, the mandate please Seek the user profile for the user that request participation activity is carried in instruction;And,
Receive authorized order or unauthorized instruction that the campaign owners system is returned according to the user profile;
If what is received is the unauthorized instruction, the prompting of output refusal participation activity;
If what is received is the authorized order, the authorization message instruction user carried according to the authorized order participates in living It is dynamic.
2. protection of usage right method as claimed in claim 1, it is characterised in that described according to awarding that the authorized order is carried Weigh after information instruction user participation activity, the protection of usage right method also includes:
The action message of user's participation activity is sent to the campaign owners system.
3. a kind of Above-the-line protection of usage right method, applied to campaign owners system, it is characterised in that the protection of usage right side Method includes:
The authorization requests instruction that method, system is sent is undertaken in reception activity, and request participation activity is carried in the authorization requests instruction User user profile;
According to activity preset rules and the user profile, it is determined whether authorize user's participation activity;
Method, system, which is undertaken, to the activity sends authorized order or unauthorized instruction.
4. protection of usage right method as claimed in claim 3, it is characterised in that sent described to the activity undertaking method, system After authorized order, the protection of usage right method also includes:
Receive the action message that user's participation activity that method, system is sent is undertaken in the activity;
The activity data of the user of storage is updated according to the action message.
5. a kind of Above-the-line protection of usage right equipment, it is characterised in that the protection of usage right equipment include memory, processor and The protection of usage right program that can be run on the memory and on the processor is stored in, the protection of usage right program is performed such as Lower step:
When receiving the request instruction of participation activity, authorization requests instruction is sent to method, system is sponsored, the authorization requests refer to The user profile that request participates in active user is carried in order;
Authorized order or unauthorized instruction that method, system is returned according to the user profile are sponsored described in receiving;
If what is received is the unauthorized instruction, the prompting of output refusal participation activity;
If what is received is the authorized order, the instruction user of the authorization message carried according to the authorized order participates in living It is dynamic.
6. protection of usage right equipment as claimed in claim 5, it is characterised in that sent described to the activity undertaking method, system After authorized order, the protection of usage right program is also performed:
Receive the action message that user's participation activity that method, system is sent is undertaken in the activity;
The activity data of the user of storage is updated according to the action message.
7. a kind of Above-the-line protection of usage right equipment, it is characterised in that the protection of usage right equipment include memory, processor and The protection of usage right program that can be run on the memory and on the processor is stored in, the protection of usage right program is performed such as Lower step:
The authorization requests instruction that method, system is sent is undertaken in reception activity, and request participation activity is carried in the authorization requests instruction The user profile of user;
According to activity preset rules and the user profile, it is determined whether authorize user's participation activity;
Method, system, which is undertaken, to the activity sends authorized order or unauthorized instruction.
8. protection of usage right equipment as claimed in claim 7, it is characterised in that sent described to the activity undertaking method, system After authorized order, the protection of usage right program also includes:
Receive the action message that user's participation activity that method, system is sent is undertaken in the activity;
The activity data of the user of storage is updated according to the action message.
9. a kind of computer-readable recording medium, it is characterised in that the computer-readable recording medium storage has permission protection Program, the power any one of claim 1 to 2 is realized when the protection of usage right program is by least one computing device The step of limiting guard method.
10. a kind of computer-readable recording medium, it is characterised in that the computer-readable recording medium storage has permission protection Program, the power any one of claim 3 to 4 is realized when the protection of usage right program is by least one computing device The step of limiting guard method.
CN201710289857.3A 2017-04-27 2017-04-27 Above-the-line protection of usage right method, equipment and computer-readable recording medium Pending CN107135214A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710289857.3A CN107135214A (en) 2017-04-27 2017-04-27 Above-the-line protection of usage right method, equipment and computer-readable recording medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710289857.3A CN107135214A (en) 2017-04-27 2017-04-27 Above-the-line protection of usage right method, equipment and computer-readable recording medium

Publications (1)

Publication Number Publication Date
CN107135214A true CN107135214A (en) 2017-09-05

Family

ID=59715362

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710289857.3A Pending CN107135214A (en) 2017-04-27 2017-04-27 Above-the-line protection of usage right method, equipment and computer-readable recording medium

Country Status (1)

Country Link
CN (1) CN107135214A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103164636A (en) * 2011-12-09 2013-06-19 北大方正集团有限公司 On-line reading digital content authentication method and system
CN104038508A (en) * 2014-07-02 2014-09-10 携程计算机技术(上海)有限公司 Setting system and method for website account access permission
US20150280911A1 (en) * 2013-08-02 2015-10-01 Issam ANDONI Methods of and Systems for Facilitating Decryption of Encrypted Electronic Information
CN105897682A (en) * 2015-12-11 2016-08-24 乐视云计算有限公司 Online authentication method and device
CN106330888A (en) * 2016-08-19 2017-01-11 中国银行股份有限公司 Method and device for ensuring security of Internet online payment
CN106453195A (en) * 2015-08-04 2017-02-22 腾讯科技(深圳)有限公司 Resource request processing, authentication request processing and authentication method, system and device
CN106506560A (en) * 2016-12-29 2017-03-15 广州华多网络科技有限公司 A kind of right management method, and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103164636A (en) * 2011-12-09 2013-06-19 北大方正集团有限公司 On-line reading digital content authentication method and system
US20150280911A1 (en) * 2013-08-02 2015-10-01 Issam ANDONI Methods of and Systems for Facilitating Decryption of Encrypted Electronic Information
CN104038508A (en) * 2014-07-02 2014-09-10 携程计算机技术(上海)有限公司 Setting system and method for website account access permission
CN106453195A (en) * 2015-08-04 2017-02-22 腾讯科技(深圳)有限公司 Resource request processing, authentication request processing and authentication method, system and device
CN105897682A (en) * 2015-12-11 2016-08-24 乐视云计算有限公司 Online authentication method and device
CN106330888A (en) * 2016-08-19 2017-01-11 中国银行股份有限公司 Method and device for ensuring security of Internet online payment
CN106506560A (en) * 2016-12-29 2017-03-15 广州华多网络科技有限公司 A kind of right management method, and device

Similar Documents

Publication Publication Date Title
CN107527200A (en) A kind of payment management method, mobile terminal and computer-readable recording medium
CN107508892A (en) A kind of page access method, server and computer-readable recording medium
CN107885474A (en) Multi-screen terminal mobile payment control method, terminal and computer-readable recording medium
CN107395850A (en) A kind of social communication information guard method, device and computer-readable recording medium
CN107862196A (en) Fingerprint verification method, mobile terminal and computer-readable recording medium
CN107517321A (en) Terminal pattern switching method, mobile terminal and computer-readable recording medium
CN107517208A (en) Apparatus control method, device and computer-readable recording medium
CN107122817A (en) Processing method and Quick Response Code terminal based on Quick Response Code
CN107580336A (en) A kind of method for connecting network, terminal and computer-readable recording medium
CN107343272A (en) A kind of data traffic sharing method and mobile terminal
CN107276991A (en) Load method, equipment and the computer-readable recording medium of Web page
CN107896287A (en) Phone number risk monitoring method and mobile terminal
CN107180184A (en) Application program right management method, device and computer-readable recording medium
CN107846675A (en) Register method, terminal, registrar and computer-readable recording medium
CN108601062A (en) WiFi connections sharing method, terminal and computer storage media
CN107347117A (en) A kind of message management method, mobile terminal and computer-readable recording medium
CN107330314A (en) Authorization method, mobile terminal and readable storage medium storing program for executing based on biological characteristic
CN107613130A (en) A kind of application management method, mobile terminal and computer-readable recording medium
CN110052023A (en) Game control method, mobile terminal and computer readable storage medium
CN107194217A (en) User data access control method, equipment and computer-readable recording medium
CN107516051A (en) A kind of data encryption storage method, device and computer-readable recording medium
CN107395363A (en) Fingerprint sharing method and mobile terminal
CN107204977A (en) Interface security method of calibration and device, computer-readable recording medium
CN107317932A (en) Use method for limiting, mobile terminal and the computer-readable recording medium of terminal
CN106888225A (en) A kind of control method of single-sign-on application, mobile terminal and computer-readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170905

RJ01 Rejection of invention patent application after publication