CN108111534A - A kind of method and device for controlling authorization - Google Patents

A kind of method and device for controlling authorization Download PDF

Info

Publication number
CN108111534A
CN108111534A CN201810027013.6A CN201810027013A CN108111534A CN 108111534 A CN108111534 A CN 108111534A CN 201810027013 A CN201810027013 A CN 201810027013A CN 108111534 A CN108111534 A CN 108111534A
Authority
CN
China
Prior art keywords
authorization
client
target software
request
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810027013.6A
Other languages
Chinese (zh)
Other versions
CN108111534B (en
Inventor
王文岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Cloud Technologies Co Ltd
Original Assignee
New H3C Cloud Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Cloud Technologies Co Ltd filed Critical New H3C Cloud Technologies Co Ltd
Priority to CN201810027013.6A priority Critical patent/CN108111534B/en
Publication of CN108111534A publication Critical patent/CN108111534A/en
Application granted granted Critical
Publication of CN108111534B publication Critical patent/CN108111534B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application involves Software Protection Technique fields; a kind of more particularly to method and device for controlling authorization; to set a time window to license to the authorization of client; after the time point Th to obtain the arthorization with client; it is separated by the authorization that the time point recycling client of the length Tw not less than time window obtains, rationally to be controlled the authorization of software under plurality of application scenes.This method is applied to the Service controll end of target software, including:Time difference between the time point Th that monitoring current point in time and client are obtained the arthorization;The authorization that client obtains includes function authorization and management number of objects authorization;Management number of objects refers to the quantity for the object that client is managed based on target software;When the time difference being not less than the length Tw of preset time window, the authorization obtained to client carries out mandate recycling;Wherein, the initial time of preset time window is Th, and the termination time is Th+Tw.

Description

A kind of method and device for controlling authorization
Technical field
This application involves technical field of software copyright protection more particularly to a kind of methods and dress for controlling authorization It puts.
Background technology
With the continuous development of computer technology, further flourishing, software copyright protection and the authorization of software industry Also increasingly paid attention to be subject to software enterprise.For enterprise-level management software, the concurrent large-scale application of software So that the reasonability of soft ware authorization license method and method becomes the key issue of soft ware authorization.Since the authorization of software needs It buys, if authorization is too harsh, user does not approve;If authorization is too loose, the work of the owner of software copyright Making achievement cannot protect.
The authorization scheme of current enterprise grade management software includes two kinds of function mandate and management number of objects mandate.Work( It can authorize, i.e., it just can be using all or part of function of the software after carrying out software registration using the equipment of software;Pipe Manage number of objects mandate, i.e., on the basis of function mandate, authorized client can synchronization management object most Big quantity.
When authorization is carried out, client is permitted first in the function mandate of Service controll end registration target software Can, it is obtaining the function authorization of target software and then is registering the quantity authorization of the target software so that service control End processed client-based can be asked, and authorized client is based on target software and manages multiple objects.
When client need using target software when, first to Service controll end send it is corresponding with the software to orthicon Reason request;Service controll end first has to judge the type of authorization requests namely judges that this is awarded after Object Management group request is received Power request is request function mandate or number of requests mandate.If request function mandate, the current visitor of Service controll end detection Whether family end has the function of corresponding target software authorization, if active client has the function of that corresponding target software is awarded Power license, and the function authorization within effective time, then authorized client uses above-mentioned target software;If existing customer Holding function authorization or active client without corresponding target software has the function of that corresponding target software mandate is permitted Can, but the function authorization then refuses client and uses above-mentioned target software not within effective time.If number of requests Authorization is then detecting there is target software authorization, and base of the function authorization within effective time On plinth, the quantity authorization whether client has registered the software is also detected;Detecting the client registers software Quantity authorization when, then the quantity authorization of the software based on client registers, currently allocated authorization And the current residual quantity of unappropriated authorization, the Object Management group request of client is responded.
For different enterprise-level management softwares, since different software has different frequency of usage, not at the same level Other oncurrent processing ability, it is higher that the control method of above-mentioned authorization is only suitable for being applied to frequency of usage, and concurrent processing energy In the relatively low authorization management of power, actual application scenarios are limited.
The content of the invention
The embodiment of the present application provides a kind of method for controlling authorization, to be realized under plurality of application scenes to software Authorization reasonable control.
In a first aspect, a kind of method for controlling authorization is provided, applied to the Service controll end of target software, this method Including:
Time difference between the time point Tx that monitoring current point in time and client are obtained the arthorization;Wherein, the visitor The authorization that family end obtains includes function authorization and management number of objects authorization;The management number of objects refers to The quantity for the object that client is managed based on the target software;
When the time difference being not less than the length Tw of preset time window, the authorization that the client obtains is carried out Authorize recycling;Wherein, the initial time of the preset time window is Tx, and the termination time is Tx+Tw.
Second aspect provides a kind of device for controlling authorization, applied to the Service controll end of target software, the device Including:
Monitoring modular, for the time for monitoring current point in time between time point Tx that client is obtained the arthorization Difference;Wherein, the authorization that the client obtains includes function authorization and management number of objects authorization;The pipe Reason number of objects refers to the quantity for the object that client is managed based on the target software;
Authorize recycling module, for the time difference be not less than preset time window length Tw when, to the client The authorization of acquisition carries out mandate recycling;Wherein, the initial time of the preset time window is Tx, and the termination time is Tx+Tw.
The embodiment of the present application sets one when controlling authorization, to license to the authorization of client Time window, the time window are used to that the authorization that client obtains to be carried out to authorize the control of recycling namely target software mandate It is awarded when being managed to client authorization using target software to multiple objects with client at the Service controll end of license When weighing the time point arrival of the time point interval time window of license, the authorization of recycling client acquisition was both carried to client It has supplied to authorize the function of discharging, has ensured that authorization is not occupied always by a client, and ensured in time window, not to visitor The authorization that family end obtains is recycled, and makes other clients that can not obtain identical authorization in the time window, only It can realize that the large-scale concurrent of software uses by increasing the quantity of authorization, so that enterprise and software supplier Between interests more balance, the reasonable control to target software authorization can be realized under more application scenarios.
Description of the drawings
It, below will be to the application in order to clearly illustrate the embodiment of the present application or technical solution of the prior art Required attached drawing does simple introduction in embodiment or description of the prior art.It should be evident that the accompanying drawings in the following description Only some embodiments described in the application, for those of ordinary skill in the art, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 is the method flow schematic diagram for the control authorization that the embodiment of the present application proposes;
Fig. 2 is in the method for the control authorization that the embodiment of the present application proposes, detection business performs what is carried in request Whether the current residual quantity that target software identifies corresponding authorization meets the license request carried in business execution request The method flow diagram of quantity;
Fig. 3 is the method flow schematic diagram for another control authorization that the embodiment of the present application proposes;
Fig. 4 is a kind of structure diagram of the device for control authorization that the embodiment of the present application proposes;
Fig. 5 is a kind of structure diagram of the device for control authorization that the embodiment of the present application proposes;
Fig. 6 is a kind of structure diagram of the device for control authorization that the embodiment of the present application proposes.
Specific embodiment
The application scenarios that the control method of existing authorization is suitble to are limited.
Such as server dress machine management system (target software i.e. in the embodiment of the present application), service is installed The server (client i.e. in the embodiment of the present application) of device dress machine management system needs to realize to multiple host in the same time The installation management of (object i.e. in the embodiment of the present application), therefore it is required that being equipped with the server of server dress machine management system Oncurrent processing ability with higher level namely be equipped with server dress machine management system server can obtain it is more Quantity authorization.If server dress machine management system provides the release function of authorization, filled using the server The enterprise of machine management system can use one to authorize and server dress machine management system is installed on all servers, this It is very unfavorable for software supplier;If server dress machine management system does not provide the release work(of permission Can, it is soft since server dress machine management system generally only needs to install the frequency once or installed on the server than relatively low The authorization of part is occupied always by a server, this is very unfavorable for enterprise.It installs and manages for server For reason system, permission also needs to the frequency of usage and oncurrent processing ability in view of software function, therefore in order to take The Equilibrium of Interests between enterprise and software supplier is obtained, software is not only needed to provide the releasability of authorization, but also cannot nothing Limitation allows enterprise that same authorization can be used to complete the installation that server on Servers-all fills machine management system.
In another example for configuration management system (target software i.e. in the embodiment of the present application), it may have with server Fill the similar feature of machine management system, by the object of configuration management system configuration management once received pipe to management equipment (i.e. Client in the application) after, management equipment can carry out repeated multiple times configuration to object and operate, and can be simultaneously to multiple Pipe object of receiving carries out concurrently configuration operation.In order to obtain the Equilibrium of Interests between enterprise and software supplier, it is necessary to comprehensive mark The frequency of usage and oncurrent processing ability of software carry out the management of authorization.
Application scheme is when authorization is controlled, when setting one to license to the authorization of client Between window, the time window be used for client obtain authorization carry out authorize recycling control so that enterprise and software Interests between provider more balance, and the reasonable control to target software authorization can be realized under more application scenarios System.
It is below in conjunction with the accompanying drawings and specific real to enable the above-mentioned purpose of the application, feature and advantage more obvious understandable Mode is applied to be further described in detail the application.
As shown in Figure 1, the method flow schematic diagram of the control authorization proposed for the embodiment of the present application.The application is implemented In example, it is responsible for performing the Service controll end that the main body for controlling authorization process is target software, this method comprises the following steps:
S101:When receiving the registration request transmitted by client, according to the target software mark carried in registration request Know and number of objects mandate is registered and managed to the number of objects of management, the function authorization that target software is carried out to client Allowed registration.
In the embodiment of the present application, the Service controll end of target software, for carrying out pipe to the authorization of target software Reason.Service controll end is the authorization management equipment that software supplier provides to enterprise, is applied not only to client executing Authorization is registered, and the distribution for being additionally operable to carry out client authorization controls.That is, when enterprise is carried out based on target software Before business operation, client will be from the Service controll end registering functional authorization and management number of objects authorization;When When enterprise is based on target software progress business operation, the client-based request in Service controll end is permitted to client distribution authorization It can.
Client can be based on target software and manage multiple objects, and the object that client can manage at certain moment is most Big quantity is by client in the quantity registered during the registration of quantity authorization.Herein it should be noted that in the application Client for a virtual identity, be not bundled on any physical machine or virtual machine, such as two in enterprise Platform physical machine uses identical client identity (such as same set of account number cipher registered at Service controll end) to Service controll End sends request, and in the case that two physical machines meet authorization distribution conditions, two physical machines can obtain service The authorization of control terminal distribution.
When client wants will be managed multiple objects using target software, generation registration request is first had to, It is carried in the registration request thinks the corresponding target software mark of target software to be used and the number of objects of its desired management It measures, and the registration request of generation is sent to the Service controll end of target software.
After the Service controll termination of target software receives the registration request transmitted by client, it can be based in registration request The target software mark of carrying carries out the function authorization registration of target software, meanwhile, based on the pipe carried in registration request The quantity of the object of reason, be managed number of objects authorization registration so that client can be based on target software management with The object of number of objects authorization corresponding number.
In an alternative embodiment, Service controll end to client carry out target software function authorization registration and After managing the registration of number of objects authorization, can record the entry-into-force time point Ts of authorization registration, authorization it is effective when Between Tv, then authorization out-of-service time point Te meet:
Te=Ts+Tv, then the term of validity of authorization is Ts between Te.Therefore Service controll end can be every preset time Detect whether authorization is in term of validity Ts between Te;If detecting that authorization is not at the term of validity, will award Power license is invalid.
S102:When the business for receiving client transmission performs request, detection business performs the target carried in request Whether the current residual quantity of the corresponding authorization of software identification, which meets business, performs the license request quantity carried in request.
When specific implementation, function authorization and management number of objects authorization perform simultaneously.Authorization Current residual quantity refer to that Service controll end is not distributed to client, and the quantity of the authorization in effective status.Often When Service controll end by authorization be distributed to client or by authorization from effective status be converted into failure state or Person's Service controll end has carried out the authorization for being distributed to client to authorize recycling, all can to the volume residual of authorization into Row update.
When client needs to perform business based on target software, during realizing to the control of object, the business of firstly generating is held Row request carries target software mark and license request quantity in the business performs request.Wherein, license request number Amount, refers to client when this is in the business of execution, the quantity for the object to be controlled.And the license request quantity be less than or Person is equal to the quantity of the authorization of registration.
It is shown in Figure 2, when the business that Service controll termination is received transmitted by client performs request, can be based on following Whether the current residual quantity that step detection business performs the corresponding authorization of target software mark carried in request meets Business performs the license request quantity carried in request:
S201:Whether detection is in the term of validity with the corresponding authorization of target software mark.
When specific implementation, Service controll end is after the business transmitted by client that receives performs request, first It is identified and obtained and the corresponding authorization of target software mark according to target software;Then detect whether current point in time is in institute The term of validity of the authorization of acquisition, if detecting that current point in time is in the term of validity of acquired authorization, with Target software identifies corresponding authorization and is in the term of validity.
Herein, it should be noted that the registration that client can repeatedly be sent in different time points to Service controll end please It asks.Since the time point of each registed authorization license is all different, out-of-service time of the authorization registered every time is not caused also not Together;Every time when identifying acquisition with the target software corresponding authorization of mark according to target software, client may be obtained The authorization repeatedly registered;Due to the out-of-service time of authorization registered each time and the number of objects of management not phase With, it is necessary to be made whether effectively to detect respectively to the acquired authorization repeatedly registered.
S202:When detection is in the term of validity with the corresponding authorization of target software mark, detects effective authorize and permitted Can current residual quantity whether be not less than license request quantity.
S203:If the current residual quantity of effective authorization is not less than license request quantity, with target software The current residual quantity for identifying corresponding authorization meets license request quantity.
When specific implementation, since client to Service controll end requires that this, in the business of execution, to be controlled The quantity of the object of system, therefore in Service controll end, the current residual quantity for not being distributed to effective authorization of client should When the current residual quantity not less than the license request quantity required by client, the then corresponding authorization of target software mark Meet license request quantity.
S103:If the current residual quantity of authorization, which meets business, performs the license request quantity carried in request, Then client will be licensed to the corresponding target software of target software mark according to license request quantity to use, so that client's end group Object is managed in target software, and the quantity of managed object is consistent with license request quantity.
When specific implementation, will target software mandate corresponding with target software mark according to license request quantity To client in use, being the authorization to client distribution and license request quantity corresponding number.When client receives During the response that Service controll end is permitted to its distribution authorization, based on the authorization of Service controll end distribution, target software is used Management and the object of license request quantity corresponding number.
Method shown in Figure 3, that the application example also provides another control authorization, this method include:
S301:Time difference between the time point Th that monitoring current point in time and client are obtained the arthorization.Wherein, it is objective The authorization that family end obtains includes function authorization and management number of objects authorization;Management number of objects refers to client The quantity for the object that end group is managed in the target software.
S302:When the time difference being not less than the length Tw of preset time window, the authorization obtained to client is awarded Power recycling;Wherein, the initial time of preset time window is Th, and the termination time is Th+Tw.
When specific implementation, the time between the time point that current point in time and client are obtained the arthorization is monitored There are many modes of difference.
In a kind of alternative embodiment, an authorization is often distributed in Service controll end to client, and Service controll end is all Can one timer be set for the authorization distributed;Timer is since the time point that client is obtained the arthorization from zero Timing, at some time point, between the time point that the timing of timer is the time point and client is obtained the arthorization Time difference.
In another alternative embodiment, an authorization, Service controll end are often distributed in Service controll end to client The time point that client is obtained the arthorization, and the time point that the client recorded is obtained the arthorization will be recorded, with The authorization of distribution, which corresponds to, to be preserved.At regular intervals, Service controll end can all calculate a current point in time with being recorded Time point for obtaining the arthorization of client between time difference.
For example, the length of preset time window is Tw;The total quantity of the authorization of client registers is Nt;In authorization Certain moment Tx after the entry-into-force time point Ts of registration, client initiate business to Service controll end and perform request, which holds The license request quantity carried in row request is Nx;Ti (i=1,2 ... ..., n, Tx-Tw within Tx-Tw to Tx periods ≤ Ti < Tx) moment, client initiates other business to Service controll end and performs request, and what is carried in other service requests asks Seeking licensed number, then the current residual quantity Nv at Tx moment meets for Nt:Nv=Nt- (N1+N2+ ...+Nn), and Nv >=0.
Certain moment Tx, client initiates business to Service controll end and performs request, and the business performs what is carried in request Request licensed number is Nx, and Nx≤Nt, and after the length Tw by preset time window, authorization Nx can be by service control terminal It withdraws.
When monitoring that the time difference is equal to the length of default time window, the authorization obtained to client authorizes Recycling.
Herein, it should be noted that S301 will be held after the license of client distribution authorization every time at Service controll end Row, until this time divides after the authorization that client singly distributes carries out mandate withdrawal by service control terminal, with this time to client The monitoring of hair authorization corresponding time difference can just terminate.Therefore SS301 and S103 is actually what can be performed parallel, and Without stringent priority execution sequence.
The application example is when authorization is controlled, when setting one to license to the authorization of client Between window, the time window be used for client obtain authorization carry out authorize recycling control namely target software mandate permitted Can Service controll end when being managed to client authorization using target software to multiple objects, authorized with client When the length of time point of the time point interval time window of license reaches, the authorization of recycling client acquisition, both to client The function of authorizing release is provided, ensures that authorization is not occupied always by a client, and is ensured in time window, it is not right The authorization that client obtains is recycled, and makes other clients that can not obtain identical authorization in the time window, It is merely able to realize that the large-scale concurrent of software uses by increasing the quantity of authorization, so that enterprise and software provide Interests between business more balance, and the reasonable control to target software authorization can be realized under more application scenarios.
Based on same inventive concept, control corresponding with the method for control authorization is additionally provided in the embodiment of the present application The device of authorization, since the principle that the device in the embodiment of the present application solves the problems, such as and the above-mentioned control of the embodiment of the present application are awarded The method for weighing license is similar, therefore the implementation of device may refer to the implementation of method, and overlaps will not be repeated.
As shown in figure 4, the structure diagram of the device of the control authorization provided by the embodiment of the present application, including: Monitoring modular 41, for the time difference for monitoring current point in time between time point Th that client is obtained the arthorization;Wherein, The authorization that client obtains includes function authorization and management number of objects authorization;Management number of objects refers to visitor The quantity for the object that family end group is managed in target software;
Recycling module 42 is authorized, for the mandate in length Tw of the time difference not less than time window, obtained to client License carries out mandate recycling;Wherein, the initial time of preset time window is Th, and the termination time is Th+Tw.
Optionally, shown in Figure 5, which further includes:Registration module 51, for receiving transmitted by client During registration request, the quantity for the object for being identified and being managed according to the target software carried in registration request carries out client The function authorization registration of target software and the authorization registration of management number of objects;Wherein, Tw is being noted no more than client The term of validity Tv of the authorization obtained after volume.
Optionally, shown in Figure 5, which further includes:Detection module 52, for receiving the industry of client transmission When business performs request, detection business performs the current residual quantity that the target software carried in request identifies corresponding authorization Whether meet business and perform the license request quantity carried in request;Authorization module 53, in the current residual of authorization It, will be with target software mark pair according to license request quantity when quantity meets the license request quantity carried in business execution request The target software answered licenses to client use, so that client is based on target software and manages object, and the number of managed object Amount is consistent with the license request quantity.
Optionally, detection module 52 are specifically used for:Detection has with whether the corresponding authorization of target software mark is in The effect phase;
When detection is in the term of validity with the corresponding authorization of target software mark, working as effective authorization is detected Whether preceding volume residual is not less than license request quantity;
If the current residual quantity of effective authorization is not less than license request quantity, with target software mark pair The current residual quantity for the authorization answered meets license request quantity.
Optionally, shown in Figure 5, which further includes:Invalid module 54 is permitted for being authorized every preset time detection Whether the term of validity can be in;It is and when detecting that authorization is not at the term of validity, authorization is invalid.
The device for the control authorization that the embodiment of the present application is provided when controlling authorization, is The authorization for licensing to client sets a time window, which is used to authorize the authorization that client obtains The control of recycling namely the Service controll end of target software authorization are using target software to multiple objects to client authorization When being managed, when reaching at the time point of the length for the time point interval time window obtained the arthorization with client, recycling The authorization that client obtains both provides the function of authorizing release to client, ensures authorization not by a visitor Family end occupies always, and ensures in time window, and the authorization not obtained to client recycles, and makes other clients at this Identical authorization can not be obtained in time window, is merely able to realize the extensive of software by increasing the quantity of authorization Concurrently use, so that the interests between enterprise and software supplier more balance, it can be real under more application scenarios Now to the reasonable control of target software authorization.
As shown in fig. 6, the structure diagram of the device of the control authorization provided by another embodiment of the application, it should Device is mounted on the Service controll end of target software, and the device 60 of the control authorization includes:Processor 61,62 and of memory Bus 63, the storage of memory 62 executes instruction, logical by bus 63 between processor 61 and memory 62 when device is run Believe, what is stored in the execution memory 62 of processor 61 executes instruction as follows:
Time difference between the time point Th that monitoring current point in time and client are obtained the arthorization;Wherein, client The authorization of acquisition includes function authorization and management number of objects authorization;Management number of objects refers to client's end group In the quantity for the object that target software is managed;
When the time difference being not less than the length Tw of preset time window, the authorization obtained to client authorizes back It receives;Wherein, the initial time of preset time window is Th, and the termination time is Th+Tw.
Optionally, processor 61 is additionally operable to:When receiving the registration request transmitted by client, according in registration request The quantity of the target software mark of carrying and the object of management, the function authorization that target software is carried out to client are registered With the registration of management number of objects authorization wherein, Tw is no more than the term of validity for the authorization that client obtains after registration Tv。
Optionally, processor 61 is additionally operable to:When the business for receiving client transmission performs request, detection business performs Whether the current residual quantity of the corresponding authorization of target software mark carried in request, which meets in business execution request, is taken The license request quantity of band;
If the current residual quantity of authorization, which meets business, performs the license request quantity carried in request, basis License request quantity will license to client use with the corresponding target software of target software mark, so that client is based on target Software manages object, and the quantity of managed object is consistent with the license request quantity.
Optionally, processor 61 is specifically used for:Whether detection is with the corresponding authorization of target software mark in effective Phase;
When detection is in the term of validity with the corresponding authorization of target software mark, working as effective authorization is detected Whether preceding volume residual is not less than license request quantity;
If the current residual quantity of effective authorization is not less than license request quantity, with target software mark pair The current residual quantity for the authorization answered meets license request quantity.
Optionally, processor 61 is additionally operable to:Whether the term of validity is in every preset time detection authorization;
It is if detecting that authorization is not at the term of validity, authorization is invalid.
The computer program product of the method and device for the control authorization that the embodiment of the present application is provided, including storage The computer readable storage medium of program code, the instruction that program code includes can be used for performing in previous methods embodiments Method, specific implementation can be found in embodiment of the method, and details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description With the specific work process of device, the corresponding process in preceding method embodiment is may be referred to, details are not described herein.
If function is realized in the form of SFU software functional unit and is independent production marketing or in use, can store In a computer read/write memory medium.Based on such understanding, the technical solution of the application is substantially in other words to existing The part for having part that technology contributes or the technical solution can be embodied in the form of software product, the computer Software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be personal meter Calculation machine, Service controll end or the network equipment etc.) perform each embodiment method of the application all or part of step.It is and preceding The storage medium stated includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory The various media that can store program code such as (RAM, Random Access Memory), magnetic disc or CD.
The above is only the specific embodiment of the application, but the protection domain of the application is not limited thereto, any In the technical scope that those familiar with the art discloses in the application, change or replacement can be readily occurred in, should all be contained It covers within the protection domain of the application.Therefore, the protection domain of the application described should be subject to the protection scope in claims.

Claims (10)

1. a kind of method for controlling authorization, the Service controll end applied to target software, which is characterized in that this method bag It includes:
Time difference between the time point Th that monitoring current point in time and client are obtained the arthorization;Wherein, the client The authorization of acquisition includes function authorization and management number of objects authorization;The management number of objects refers to client The quantity for the object that end group is managed in the target software;
When the time difference being not less than the length Tw of preset time window, the authorization obtained to the client authorizes Recycling;Wherein, the initial time of the preset time window is Th, and the termination time is Th+Tw.
2. according to the method described in claim 1, it is characterized in that, the method further includes:
When receiving the registration request transmitted by client, according to carried in the registration request target software mark and Object is registered and managed to the quantity of the object of the management, the function authorization that the target software is carried out to the client Quantity authorization is registered;
Wherein, Tw is no more than the term of validity Tv for the authorization that client obtains after registration.
3. method according to claim 1 or 2, which is characterized in that the method further includes:
When the business for receiving client transmission performs request, detection business performs the target software mark pair carried in request Whether the current residual quantity for the authorization answered, which meets business, performs the license request quantity carried in request;
If the current residual quantity of the authorization, which meets the business, performs the license request number carried in request Amount, then will license to the client with the corresponding target software of target software mark according to the license request quantity makes With so that the client is based on the target software and manages object, and the quantity of managed object and the license request number Amount is consistent.
4. according to the method described in claim 3, it is characterized in that, the detection business performs the target carried in request Whether the current residual quantity of the corresponding authorization of software identification, which meets the business, performs the license request carried in request Quantity specifically includes:
Whether detection is in term of validity Tv with the corresponding authorization of target software mark;
When detection is in term of validity Tv with the corresponding authorization of target software mark, the effective mandate of detection is permitted Can current residual quantity whether be not less than the license request quantity;
If the current residual quantity of the effective authorization is not less than the license request quantity, soft with the target The current residual quantity that part identifies corresponding authorization meets the license request quantity.
5. according to the method described in claim 1, it is characterized in that, this method further includes:
Detect whether the authorization is in term of validity Tv every preset time;
It is if detecting that the authorization is not at the term of validity Tv, the authorization is invalid.
6. a kind of device for controlling authorization, the Service controll end applied to target software, which is characterized in that the device bag It includes:
Monitoring modular, for the time difference for monitoring current point in time between time point Th that client is obtained the arthorization;Its In, the authorization that the client obtains includes function authorization and management number of objects authorization;The management pair As quantity refers to the quantity for the object that client managed based on the target software;
Recycling module is authorized, in length Tw of the time difference not less than preset time window, being obtained to the client Authorization carry out mandate recycling;Wherein, the initial time of the preset time window is Th, and the termination time is Th+Tw.
7. device according to claim 6, which is characterized in that the device further includes:Registration module, for receiving visitor During registration request transmitted by the end of family, according to the target software mark and the object of the management carried in the registration request Quantity, the function authorization that the target software is carried out to the client registers and management number of objects authorization note Volume;
Wherein, Tw is no more than the term of validity Tv for the authorization that client obtains after registration.
8. device according to claim 6, which is characterized in that the device further includes:
Detection module, when being asked for being performed in the business for receiving client transmission, detection business performs what is carried in request Whether the current residual quantity that target software identifies corresponding authorization meets the license request carried in business execution request Quantity;
Authorization module, described in meeting during the business execution is asked and carrying in the current residual quantity of the authorization During license request quantity, institute will be licensed to the corresponding target software of target software mark according to the license request quantity State client use so that the client be based on the target software manage object, and the quantity of managed object with it is described License request quantity is consistent.
9. device according to claim 8, which is characterized in that the detection module is specifically used for:Detection and the target Whether the corresponding authorization of software identification is in the term of validity;
When detection is in the term of validity with the corresponding authorization of target software mark, the effective authorization is detected Current residual quantity whether be not less than the license request quantity;
If the current residual quantity of the effective authorization is not less than the license request quantity, soft with the target The current residual quantity that part identifies corresponding authorization meets the license request quantity.
10. device according to claim 6, which is characterized in that the device further includes:Invalid module, for every default Whether authorization described in time detecting is in the term of validity;And detecting that the authorization is not at the term of validity When, the authorization is invalid.
CN201810027013.6A 2018-01-11 2018-01-11 Method and device for controlling authorization permission Active CN108111534B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810027013.6A CN108111534B (en) 2018-01-11 2018-01-11 Method and device for controlling authorization permission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810027013.6A CN108111534B (en) 2018-01-11 2018-01-11 Method and device for controlling authorization permission

Publications (2)

Publication Number Publication Date
CN108111534A true CN108111534A (en) 2018-06-01
CN108111534B CN108111534B (en) 2021-02-05

Family

ID=62219656

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810027013.6A Active CN108111534B (en) 2018-01-11 2018-01-11 Method and device for controlling authorization permission

Country Status (1)

Country Link
CN (1) CN108111534B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111625778A (en) * 2020-04-14 2020-09-04 华帝股份有限公司 Method and system for distributing and recovering software license
CN116760829A (en) * 2023-08-17 2023-09-15 中移(苏州)软件技术有限公司 Disaster recovery resource licensing method, device, equipment and readable storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101281569A (en) * 2008-05-14 2008-10-08 北京深思洛克数据保护中心 Method for using network edition software protecting equipment to control software client terminal quantity
US20110202433A1 (en) * 2010-02-16 2011-08-18 Akira Yokoyama License management system, license management method, and computer program product
US8566461B1 (en) * 2004-06-09 2013-10-22 Digital River, Inc. Managed access to media services
CN104239782A (en) * 2013-06-06 2014-12-24 广达电脑股份有限公司 Authorization platform
CN106355052A (en) * 2016-11-03 2017-01-25 广东浪潮大数据研究有限公司 Authorization centralized management method, device and system
CN107092813A (en) * 2016-02-18 2017-08-25 中华电信股份有限公司 Authorization control method and system suitable for digital copyright management
CN107122630A (en) * 2017-04-26 2017-09-01 新华三技术有限公司 device authorization management method and device
CN107395374A (en) * 2016-05-16 2017-11-24 中兴通讯股份有限公司 Transmit control method, the apparatus and system of strategy

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8566461B1 (en) * 2004-06-09 2013-10-22 Digital River, Inc. Managed access to media services
CN101281569A (en) * 2008-05-14 2008-10-08 北京深思洛克数据保护中心 Method for using network edition software protecting equipment to control software client terminal quantity
US20110202433A1 (en) * 2010-02-16 2011-08-18 Akira Yokoyama License management system, license management method, and computer program product
CN104239782A (en) * 2013-06-06 2014-12-24 广达电脑股份有限公司 Authorization platform
CN107092813A (en) * 2016-02-18 2017-08-25 中华电信股份有限公司 Authorization control method and system suitable for digital copyright management
CN107395374A (en) * 2016-05-16 2017-11-24 中兴通讯股份有限公司 Transmit control method, the apparatus and system of strategy
CN106355052A (en) * 2016-11-03 2017-01-25 广东浪潮大数据研究有限公司 Authorization centralized management method, device and system
CN107122630A (en) * 2017-04-26 2017-09-01 新华三技术有限公司 device authorization management method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111625778A (en) * 2020-04-14 2020-09-04 华帝股份有限公司 Method and system for distributing and recovering software license
CN116760829A (en) * 2023-08-17 2023-09-15 中移(苏州)软件技术有限公司 Disaster recovery resource licensing method, device, equipment and readable storage medium

Also Published As

Publication number Publication date
CN108111534B (en) 2021-02-05

Similar Documents

Publication Publication Date Title
CN108494703A (en) A kind of access frequency control method, device and storage medium
US8739170B1 (en) Managing requests for computing capacity
US20170132597A1 (en) System and method for managing application access
US9846899B1 (en) Dynamic software licensing
US9703934B1 (en) Usage license
CN106980537B (en) The method and system of cloud host is deleted in cloud computing environment
CN108897628A (en) A kind of implementation method of distributed lock, device and electronic equipment
CN109101787A (en) A kind of method and device carrying out credit appraisal to copyright user based on block chain
CN105939362A (en) User account management method and device
CN1996834A (en) Method and apparatus for acquiring domain information and domain-related data
CN102624677A (en) Method and server for monitoring network user behavior
CN103297412A (en) Thin client system, and server, method and program for connection management
US20120192285A1 (en) Software License Serving In A Massively Parallel Processing Environment
CN106897150B (en) Resource quota management method based on permission chain
CN113285804A (en) Encryption and decryption method, device, equipment and storage medium for disk data of virtual machine
CN104301257B (en) A kind of resource allocation methods, device and equipment
CN103685351B (en) A kind of dispatching method and equipment of buffer service node based on cloud computing platform
CN105868973B (en) Event resource processing method and device
CN108111534A (en) A kind of method and device for controlling authorization
CN104639650A (en) Fine granularity distributive interface access control method and device
WO2009109119A1 (en) License controlling method and managing device
CN109992566A (en) A kind of file access method, device, equipment and readable storage medium storing program for executing
CN110162397A (en) Resource allocation methods, apparatus and system
US9065825B2 (en) Method and system for license management
CN115396209B (en) Access authorization method, device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant