CN108111534A - A kind of method and device for controlling authorization - Google Patents
A kind of method and device for controlling authorization Download PDFInfo
- Publication number
- CN108111534A CN108111534A CN201810027013.6A CN201810027013A CN108111534A CN 108111534 A CN108111534 A CN 108111534A CN 201810027013 A CN201810027013 A CN 201810027013A CN 108111534 A CN108111534 A CN 108111534A
- Authority
- CN
- China
- Prior art keywords
- authorization
- client
- target software
- request
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
This application involves Software Protection Technique fields; a kind of more particularly to method and device for controlling authorization; to set a time window to license to the authorization of client; after the time point Th to obtain the arthorization with client; it is separated by the authorization that the time point recycling client of the length Tw not less than time window obtains, rationally to be controlled the authorization of software under plurality of application scenes.This method is applied to the Service controll end of target software, including:Time difference between the time point Th that monitoring current point in time and client are obtained the arthorization;The authorization that client obtains includes function authorization and management number of objects authorization;Management number of objects refers to the quantity for the object that client is managed based on target software;When the time difference being not less than the length Tw of preset time window, the authorization obtained to client carries out mandate recycling;Wherein, the initial time of preset time window is Th, and the termination time is Th+Tw.
Description
Technical field
This application involves technical field of software copyright protection more particularly to a kind of methods and dress for controlling authorization
It puts.
Background technology
With the continuous development of computer technology, further flourishing, software copyright protection and the authorization of software industry
Also increasingly paid attention to be subject to software enterprise.For enterprise-level management software, the concurrent large-scale application of software
So that the reasonability of soft ware authorization license method and method becomes the key issue of soft ware authorization.Since the authorization of software needs
It buys, if authorization is too harsh, user does not approve;If authorization is too loose, the work of the owner of software copyright
Making achievement cannot protect.
The authorization scheme of current enterprise grade management software includes two kinds of function mandate and management number of objects mandate.Work(
It can authorize, i.e., it just can be using all or part of function of the software after carrying out software registration using the equipment of software;Pipe
Manage number of objects mandate, i.e., on the basis of function mandate, authorized client can synchronization management object most
Big quantity.
When authorization is carried out, client is permitted first in the function mandate of Service controll end registration target software
Can, it is obtaining the function authorization of target software and then is registering the quantity authorization of the target software so that service control
End processed client-based can be asked, and authorized client is based on target software and manages multiple objects.
When client need using target software when, first to Service controll end send it is corresponding with the software to orthicon
Reason request;Service controll end first has to judge the type of authorization requests namely judges that this is awarded after Object Management group request is received
Power request is request function mandate or number of requests mandate.If request function mandate, the current visitor of Service controll end detection
Whether family end has the function of corresponding target software authorization, if active client has the function of that corresponding target software is awarded
Power license, and the function authorization within effective time, then authorized client uses above-mentioned target software;If existing customer
Holding function authorization or active client without corresponding target software has the function of that corresponding target software mandate is permitted
Can, but the function authorization then refuses client and uses above-mentioned target software not within effective time.If number of requests
Authorization is then detecting there is target software authorization, and base of the function authorization within effective time
On plinth, the quantity authorization whether client has registered the software is also detected;Detecting the client registers software
Quantity authorization when, then the quantity authorization of the software based on client registers, currently allocated authorization
And the current residual quantity of unappropriated authorization, the Object Management group request of client is responded.
For different enterprise-level management softwares, since different software has different frequency of usage, not at the same level
Other oncurrent processing ability, it is higher that the control method of above-mentioned authorization is only suitable for being applied to frequency of usage, and concurrent processing energy
In the relatively low authorization management of power, actual application scenarios are limited.
The content of the invention
The embodiment of the present application provides a kind of method for controlling authorization, to be realized under plurality of application scenes to software
Authorization reasonable control.
In a first aspect, a kind of method for controlling authorization is provided, applied to the Service controll end of target software, this method
Including:
Time difference between the time point Tx that monitoring current point in time and client are obtained the arthorization;Wherein, the visitor
The authorization that family end obtains includes function authorization and management number of objects authorization;The management number of objects refers to
The quantity for the object that client is managed based on the target software;
When the time difference being not less than the length Tw of preset time window, the authorization that the client obtains is carried out
Authorize recycling;Wherein, the initial time of the preset time window is Tx, and the termination time is Tx+Tw.
Second aspect provides a kind of device for controlling authorization, applied to the Service controll end of target software, the device
Including:
Monitoring modular, for the time for monitoring current point in time between time point Tx that client is obtained the arthorization
Difference;Wherein, the authorization that the client obtains includes function authorization and management number of objects authorization;The pipe
Reason number of objects refers to the quantity for the object that client is managed based on the target software;
Authorize recycling module, for the time difference be not less than preset time window length Tw when, to the client
The authorization of acquisition carries out mandate recycling;Wherein, the initial time of the preset time window is Tx, and the termination time is Tx+Tw.
The embodiment of the present application sets one when controlling authorization, to license to the authorization of client
Time window, the time window are used to that the authorization that client obtains to be carried out to authorize the control of recycling namely target software mandate
It is awarded when being managed to client authorization using target software to multiple objects with client at the Service controll end of license
When weighing the time point arrival of the time point interval time window of license, the authorization of recycling client acquisition was both carried to client
It has supplied to authorize the function of discharging, has ensured that authorization is not occupied always by a client, and ensured in time window, not to visitor
The authorization that family end obtains is recycled, and makes other clients that can not obtain identical authorization in the time window, only
It can realize that the large-scale concurrent of software uses by increasing the quantity of authorization, so that enterprise and software supplier
Between interests more balance, the reasonable control to target software authorization can be realized under more application scenarios.
Description of the drawings
It, below will be to the application in order to clearly illustrate the embodiment of the present application or technical solution of the prior art
Required attached drawing does simple introduction in embodiment or description of the prior art.It should be evident that the accompanying drawings in the following description
Only some embodiments described in the application, for those of ordinary skill in the art, can also be according to these attached drawings
Obtain other attached drawings.
Fig. 1 is the method flow schematic diagram for the control authorization that the embodiment of the present application proposes;
Fig. 2 is in the method for the control authorization that the embodiment of the present application proposes, detection business performs what is carried in request
Whether the current residual quantity that target software identifies corresponding authorization meets the license request carried in business execution request
The method flow diagram of quantity;
Fig. 3 is the method flow schematic diagram for another control authorization that the embodiment of the present application proposes;
Fig. 4 is a kind of structure diagram of the device for control authorization that the embodiment of the present application proposes;
Fig. 5 is a kind of structure diagram of the device for control authorization that the embodiment of the present application proposes;
Fig. 6 is a kind of structure diagram of the device for control authorization that the embodiment of the present application proposes.
Specific embodiment
The application scenarios that the control method of existing authorization is suitble to are limited.
Such as server dress machine management system (target software i.e. in the embodiment of the present application), service is installed
The server (client i.e. in the embodiment of the present application) of device dress machine management system needs to realize to multiple host in the same time
The installation management of (object i.e. in the embodiment of the present application), therefore it is required that being equipped with the server of server dress machine management system
Oncurrent processing ability with higher level namely be equipped with server dress machine management system server can obtain it is more
Quantity authorization.If server dress machine management system provides the release function of authorization, filled using the server
The enterprise of machine management system can use one to authorize and server dress machine management system is installed on all servers, this
It is very unfavorable for software supplier;If server dress machine management system does not provide the release work(of permission
Can, it is soft since server dress machine management system generally only needs to install the frequency once or installed on the server than relatively low
The authorization of part is occupied always by a server, this is very unfavorable for enterprise.It installs and manages for server
For reason system, permission also needs to the frequency of usage and oncurrent processing ability in view of software function, therefore in order to take
The Equilibrium of Interests between enterprise and software supplier is obtained, software is not only needed to provide the releasability of authorization, but also cannot nothing
Limitation allows enterprise that same authorization can be used to complete the installation that server on Servers-all fills machine management system.
In another example for configuration management system (target software i.e. in the embodiment of the present application), it may have with server
Fill the similar feature of machine management system, by the object of configuration management system configuration management once received pipe to management equipment (i.e.
Client in the application) after, management equipment can carry out repeated multiple times configuration to object and operate, and can be simultaneously to multiple
Pipe object of receiving carries out concurrently configuration operation.In order to obtain the Equilibrium of Interests between enterprise and software supplier, it is necessary to comprehensive mark
The frequency of usage and oncurrent processing ability of software carry out the management of authorization.
Application scheme is when authorization is controlled, when setting one to license to the authorization of client
Between window, the time window be used for client obtain authorization carry out authorize recycling control so that enterprise and software
Interests between provider more balance, and the reasonable control to target software authorization can be realized under more application scenarios
System.
It is below in conjunction with the accompanying drawings and specific real to enable the above-mentioned purpose of the application, feature and advantage more obvious understandable
Mode is applied to be further described in detail the application.
As shown in Figure 1, the method flow schematic diagram of the control authorization proposed for the embodiment of the present application.The application is implemented
In example, it is responsible for performing the Service controll end that the main body for controlling authorization process is target software, this method comprises the following steps:
S101:When receiving the registration request transmitted by client, according to the target software mark carried in registration request
Know and number of objects mandate is registered and managed to the number of objects of management, the function authorization that target software is carried out to client
Allowed registration.
In the embodiment of the present application, the Service controll end of target software, for carrying out pipe to the authorization of target software
Reason.Service controll end is the authorization management equipment that software supplier provides to enterprise, is applied not only to client executing
Authorization is registered, and the distribution for being additionally operable to carry out client authorization controls.That is, when enterprise is carried out based on target software
Before business operation, client will be from the Service controll end registering functional authorization and management number of objects authorization;When
When enterprise is based on target software progress business operation, the client-based request in Service controll end is permitted to client distribution authorization
It can.
Client can be based on target software and manage multiple objects, and the object that client can manage at certain moment is most
Big quantity is by client in the quantity registered during the registration of quantity authorization.Herein it should be noted that in the application
Client for a virtual identity, be not bundled on any physical machine or virtual machine, such as two in enterprise
Platform physical machine uses identical client identity (such as same set of account number cipher registered at Service controll end) to Service controll
End sends request, and in the case that two physical machines meet authorization distribution conditions, two physical machines can obtain service
The authorization of control terminal distribution.
When client wants will be managed multiple objects using target software, generation registration request is first had to,
It is carried in the registration request thinks the corresponding target software mark of target software to be used and the number of objects of its desired management
It measures, and the registration request of generation is sent to the Service controll end of target software.
After the Service controll termination of target software receives the registration request transmitted by client, it can be based in registration request
The target software mark of carrying carries out the function authorization registration of target software, meanwhile, based on the pipe carried in registration request
The quantity of the object of reason, be managed number of objects authorization registration so that client can be based on target software management with
The object of number of objects authorization corresponding number.
In an alternative embodiment, Service controll end to client carry out target software function authorization registration and
After managing the registration of number of objects authorization, can record the entry-into-force time point Ts of authorization registration, authorization it is effective when
Between Tv, then authorization out-of-service time point Te meet:
Te=Ts+Tv, then the term of validity of authorization is Ts between Te.Therefore Service controll end can be every preset time
Detect whether authorization is in term of validity Ts between Te;If detecting that authorization is not at the term of validity, will award
Power license is invalid.
S102:When the business for receiving client transmission performs request, detection business performs the target carried in request
Whether the current residual quantity of the corresponding authorization of software identification, which meets business, performs the license request quantity carried in request.
When specific implementation, function authorization and management number of objects authorization perform simultaneously.Authorization
Current residual quantity refer to that Service controll end is not distributed to client, and the quantity of the authorization in effective status.Often
When Service controll end by authorization be distributed to client or by authorization from effective status be converted into failure state or
Person's Service controll end has carried out the authorization for being distributed to client to authorize recycling, all can to the volume residual of authorization into
Row update.
When client needs to perform business based on target software, during realizing to the control of object, the business of firstly generating is held
Row request carries target software mark and license request quantity in the business performs request.Wherein, license request number
Amount, refers to client when this is in the business of execution, the quantity for the object to be controlled.And the license request quantity be less than or
Person is equal to the quantity of the authorization of registration.
It is shown in Figure 2, when the business that Service controll termination is received transmitted by client performs request, can be based on following
Whether the current residual quantity that step detection business performs the corresponding authorization of target software mark carried in request meets
Business performs the license request quantity carried in request:
S201:Whether detection is in the term of validity with the corresponding authorization of target software mark.
When specific implementation, Service controll end is after the business transmitted by client that receives performs request, first
It is identified and obtained and the corresponding authorization of target software mark according to target software;Then detect whether current point in time is in institute
The term of validity of the authorization of acquisition, if detecting that current point in time is in the term of validity of acquired authorization, with
Target software identifies corresponding authorization and is in the term of validity.
Herein, it should be noted that the registration that client can repeatedly be sent in different time points to Service controll end please
It asks.Since the time point of each registed authorization license is all different, out-of-service time of the authorization registered every time is not caused also not
Together;Every time when identifying acquisition with the target software corresponding authorization of mark according to target software, client may be obtained
The authorization repeatedly registered;Due to the out-of-service time of authorization registered each time and the number of objects of management not phase
With, it is necessary to be made whether effectively to detect respectively to the acquired authorization repeatedly registered.
S202:When detection is in the term of validity with the corresponding authorization of target software mark, detects effective authorize and permitted
Can current residual quantity whether be not less than license request quantity.
S203:If the current residual quantity of effective authorization is not less than license request quantity, with target software
The current residual quantity for identifying corresponding authorization meets license request quantity.
When specific implementation, since client to Service controll end requires that this, in the business of execution, to be controlled
The quantity of the object of system, therefore in Service controll end, the current residual quantity for not being distributed to effective authorization of client should
When the current residual quantity not less than the license request quantity required by client, the then corresponding authorization of target software mark
Meet license request quantity.
S103:If the current residual quantity of authorization, which meets business, performs the license request quantity carried in request,
Then client will be licensed to the corresponding target software of target software mark according to license request quantity to use, so that client's end group
Object is managed in target software, and the quantity of managed object is consistent with license request quantity.
When specific implementation, will target software mandate corresponding with target software mark according to license request quantity
To client in use, being the authorization to client distribution and license request quantity corresponding number.When client receives
During the response that Service controll end is permitted to its distribution authorization, based on the authorization of Service controll end distribution, target software is used
Management and the object of license request quantity corresponding number.
Method shown in Figure 3, that the application example also provides another control authorization, this method include:
S301:Time difference between the time point Th that monitoring current point in time and client are obtained the arthorization.Wherein, it is objective
The authorization that family end obtains includes function authorization and management number of objects authorization;Management number of objects refers to client
The quantity for the object that end group is managed in the target software.
S302:When the time difference being not less than the length Tw of preset time window, the authorization obtained to client is awarded
Power recycling;Wherein, the initial time of preset time window is Th, and the termination time is Th+Tw.
When specific implementation, the time between the time point that current point in time and client are obtained the arthorization is monitored
There are many modes of difference.
In a kind of alternative embodiment, an authorization is often distributed in Service controll end to client, and Service controll end is all
Can one timer be set for the authorization distributed;Timer is since the time point that client is obtained the arthorization from zero
Timing, at some time point, between the time point that the timing of timer is the time point and client is obtained the arthorization
Time difference.
In another alternative embodiment, an authorization, Service controll end are often distributed in Service controll end to client
The time point that client is obtained the arthorization, and the time point that the client recorded is obtained the arthorization will be recorded, with
The authorization of distribution, which corresponds to, to be preserved.At regular intervals, Service controll end can all calculate a current point in time with being recorded
Time point for obtaining the arthorization of client between time difference.
For example, the length of preset time window is Tw;The total quantity of the authorization of client registers is Nt;In authorization
Certain moment Tx after the entry-into-force time point Ts of registration, client initiate business to Service controll end and perform request, which holds
The license request quantity carried in row request is Nx;Ti (i=1,2 ... ..., n, Tx-Tw within Tx-Tw to Tx periods
≤ Ti < Tx) moment, client initiates other business to Service controll end and performs request, and what is carried in other service requests asks
Seeking licensed number, then the current residual quantity Nv at Tx moment meets for Nt:Nv=Nt- (N1+N2+ ...+Nn), and Nv >=0.
Certain moment Tx, client initiates business to Service controll end and performs request, and the business performs what is carried in request
Request licensed number is Nx, and Nx≤Nt, and after the length Tw by preset time window, authorization Nx can be by service control terminal
It withdraws.
When monitoring that the time difference is equal to the length of default time window, the authorization obtained to client authorizes
Recycling.
Herein, it should be noted that S301 will be held after the license of client distribution authorization every time at Service controll end
Row, until this time divides after the authorization that client singly distributes carries out mandate withdrawal by service control terminal, with this time to client
The monitoring of hair authorization corresponding time difference can just terminate.Therefore SS301 and S103 is actually what can be performed parallel, and
Without stringent priority execution sequence.
The application example is when authorization is controlled, when setting one to license to the authorization of client
Between window, the time window be used for client obtain authorization carry out authorize recycling control namely target software mandate permitted
Can Service controll end when being managed to client authorization using target software to multiple objects, authorized with client
When the length of time point of the time point interval time window of license reaches, the authorization of recycling client acquisition, both to client
The function of authorizing release is provided, ensures that authorization is not occupied always by a client, and is ensured in time window, it is not right
The authorization that client obtains is recycled, and makes other clients that can not obtain identical authorization in the time window,
It is merely able to realize that the large-scale concurrent of software uses by increasing the quantity of authorization, so that enterprise and software provide
Interests between business more balance, and the reasonable control to target software authorization can be realized under more application scenarios.
Based on same inventive concept, control corresponding with the method for control authorization is additionally provided in the embodiment of the present application
The device of authorization, since the principle that the device in the embodiment of the present application solves the problems, such as and the above-mentioned control of the embodiment of the present application are awarded
The method for weighing license is similar, therefore the implementation of device may refer to the implementation of method, and overlaps will not be repeated.
As shown in figure 4, the structure diagram of the device of the control authorization provided by the embodiment of the present application, including:
Monitoring modular 41, for the time difference for monitoring current point in time between time point Th that client is obtained the arthorization;Wherein,
The authorization that client obtains includes function authorization and management number of objects authorization;Management number of objects refers to visitor
The quantity for the object that family end group is managed in target software;
Recycling module 42 is authorized, for the mandate in length Tw of the time difference not less than time window, obtained to client
License carries out mandate recycling;Wherein, the initial time of preset time window is Th, and the termination time is Th+Tw.
Optionally, shown in Figure 5, which further includes:Registration module 51, for receiving transmitted by client
During registration request, the quantity for the object for being identified and being managed according to the target software carried in registration request carries out client
The function authorization registration of target software and the authorization registration of management number of objects;Wherein, Tw is being noted no more than client
The term of validity Tv of the authorization obtained after volume.
Optionally, shown in Figure 5, which further includes:Detection module 52, for receiving the industry of client transmission
When business performs request, detection business performs the current residual quantity that the target software carried in request identifies corresponding authorization
Whether meet business and perform the license request quantity carried in request;Authorization module 53, in the current residual of authorization
It, will be with target software mark pair according to license request quantity when quantity meets the license request quantity carried in business execution request
The target software answered licenses to client use, so that client is based on target software and manages object, and the number of managed object
Amount is consistent with the license request quantity.
Optionally, detection module 52 are specifically used for:Detection has with whether the corresponding authorization of target software mark is in
The effect phase;
When detection is in the term of validity with the corresponding authorization of target software mark, working as effective authorization is detected
Whether preceding volume residual is not less than license request quantity;
If the current residual quantity of effective authorization is not less than license request quantity, with target software mark pair
The current residual quantity for the authorization answered meets license request quantity.
Optionally, shown in Figure 5, which further includes:Invalid module 54 is permitted for being authorized every preset time detection
Whether the term of validity can be in;It is and when detecting that authorization is not at the term of validity, authorization is invalid.
The device for the control authorization that the embodiment of the present application is provided when controlling authorization, is
The authorization for licensing to client sets a time window, which is used to authorize the authorization that client obtains
The control of recycling namely the Service controll end of target software authorization are using target software to multiple objects to client authorization
When being managed, when reaching at the time point of the length for the time point interval time window obtained the arthorization with client, recycling
The authorization that client obtains both provides the function of authorizing release to client, ensures authorization not by a visitor
Family end occupies always, and ensures in time window, and the authorization not obtained to client recycles, and makes other clients at this
Identical authorization can not be obtained in time window, is merely able to realize the extensive of software by increasing the quantity of authorization
Concurrently use, so that the interests between enterprise and software supplier more balance, it can be real under more application scenarios
Now to the reasonable control of target software authorization.
As shown in fig. 6, the structure diagram of the device of the control authorization provided by another embodiment of the application, it should
Device is mounted on the Service controll end of target software, and the device 60 of the control authorization includes:Processor 61,62 and of memory
Bus 63, the storage of memory 62 executes instruction, logical by bus 63 between processor 61 and memory 62 when device is run
Believe, what is stored in the execution memory 62 of processor 61 executes instruction as follows:
Time difference between the time point Th that monitoring current point in time and client are obtained the arthorization;Wherein, client
The authorization of acquisition includes function authorization and management number of objects authorization;Management number of objects refers to client's end group
In the quantity for the object that target software is managed;
When the time difference being not less than the length Tw of preset time window, the authorization obtained to client authorizes back
It receives;Wherein, the initial time of preset time window is Th, and the termination time is Th+Tw.
Optionally, processor 61 is additionally operable to:When receiving the registration request transmitted by client, according in registration request
The quantity of the target software mark of carrying and the object of management, the function authorization that target software is carried out to client are registered
With the registration of management number of objects authorization wherein, Tw is no more than the term of validity for the authorization that client obtains after registration
Tv。
Optionally, processor 61 is additionally operable to:When the business for receiving client transmission performs request, detection business performs
Whether the current residual quantity of the corresponding authorization of target software mark carried in request, which meets in business execution request, is taken
The license request quantity of band;
If the current residual quantity of authorization, which meets business, performs the license request quantity carried in request, basis
License request quantity will license to client use with the corresponding target software of target software mark, so that client is based on target
Software manages object, and the quantity of managed object is consistent with the license request quantity.
Optionally, processor 61 is specifically used for:Whether detection is with the corresponding authorization of target software mark in effective
Phase;
When detection is in the term of validity with the corresponding authorization of target software mark, working as effective authorization is detected
Whether preceding volume residual is not less than license request quantity;
If the current residual quantity of effective authorization is not less than license request quantity, with target software mark pair
The current residual quantity for the authorization answered meets license request quantity.
Optionally, processor 61 is additionally operable to:Whether the term of validity is in every preset time detection authorization;
It is if detecting that authorization is not at the term of validity, authorization is invalid.
The computer program product of the method and device for the control authorization that the embodiment of the present application is provided, including storage
The computer readable storage medium of program code, the instruction that program code includes can be used for performing in previous methods embodiments
Method, specific implementation can be found in embodiment of the method, and details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description
With the specific work process of device, the corresponding process in preceding method embodiment is may be referred to, details are not described herein.
If function is realized in the form of SFU software functional unit and is independent production marketing or in use, can store
In a computer read/write memory medium.Based on such understanding, the technical solution of the application is substantially in other words to existing
The part for having part that technology contributes or the technical solution can be embodied in the form of software product, the computer
Software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be personal meter
Calculation machine, Service controll end or the network equipment etc.) perform each embodiment method of the application all or part of step.It is and preceding
The storage medium stated includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory
The various media that can store program code such as (RAM, Random Access Memory), magnetic disc or CD.
The above is only the specific embodiment of the application, but the protection domain of the application is not limited thereto, any
In the technical scope that those familiar with the art discloses in the application, change or replacement can be readily occurred in, should all be contained
It covers within the protection domain of the application.Therefore, the protection domain of the application described should be subject to the protection scope in claims.
Claims (10)
1. a kind of method for controlling authorization, the Service controll end applied to target software, which is characterized in that this method bag
It includes:
Time difference between the time point Th that monitoring current point in time and client are obtained the arthorization;Wherein, the client
The authorization of acquisition includes function authorization and management number of objects authorization;The management number of objects refers to client
The quantity for the object that end group is managed in the target software;
When the time difference being not less than the length Tw of preset time window, the authorization obtained to the client authorizes
Recycling;Wherein, the initial time of the preset time window is Th, and the termination time is Th+Tw.
2. according to the method described in claim 1, it is characterized in that, the method further includes:
When receiving the registration request transmitted by client, according to carried in the registration request target software mark and
Object is registered and managed to the quantity of the object of the management, the function authorization that the target software is carried out to the client
Quantity authorization is registered;
Wherein, Tw is no more than the term of validity Tv for the authorization that client obtains after registration.
3. method according to claim 1 or 2, which is characterized in that the method further includes:
When the business for receiving client transmission performs request, detection business performs the target software mark pair carried in request
Whether the current residual quantity for the authorization answered, which meets business, performs the license request quantity carried in request;
If the current residual quantity of the authorization, which meets the business, performs the license request number carried in request
Amount, then will license to the client with the corresponding target software of target software mark according to the license request quantity makes
With so that the client is based on the target software and manages object, and the quantity of managed object and the license request number
Amount is consistent.
4. according to the method described in claim 3, it is characterized in that, the detection business performs the target carried in request
Whether the current residual quantity of the corresponding authorization of software identification, which meets the business, performs the license request carried in request
Quantity specifically includes:
Whether detection is in term of validity Tv with the corresponding authorization of target software mark;
When detection is in term of validity Tv with the corresponding authorization of target software mark, the effective mandate of detection is permitted
Can current residual quantity whether be not less than the license request quantity;
If the current residual quantity of the effective authorization is not less than the license request quantity, soft with the target
The current residual quantity that part identifies corresponding authorization meets the license request quantity.
5. according to the method described in claim 1, it is characterized in that, this method further includes:
Detect whether the authorization is in term of validity Tv every preset time;
It is if detecting that the authorization is not at the term of validity Tv, the authorization is invalid.
6. a kind of device for controlling authorization, the Service controll end applied to target software, which is characterized in that the device bag
It includes:
Monitoring modular, for the time difference for monitoring current point in time between time point Th that client is obtained the arthorization;Its
In, the authorization that the client obtains includes function authorization and management number of objects authorization;The management pair
As quantity refers to the quantity for the object that client managed based on the target software;
Recycling module is authorized, in length Tw of the time difference not less than preset time window, being obtained to the client
Authorization carry out mandate recycling;Wherein, the initial time of the preset time window is Th, and the termination time is Th+Tw.
7. device according to claim 6, which is characterized in that the device further includes:Registration module, for receiving visitor
During registration request transmitted by the end of family, according to the target software mark and the object of the management carried in the registration request
Quantity, the function authorization that the target software is carried out to the client registers and management number of objects authorization note
Volume;
Wherein, Tw is no more than the term of validity Tv for the authorization that client obtains after registration.
8. device according to claim 6, which is characterized in that the device further includes:
Detection module, when being asked for being performed in the business for receiving client transmission, detection business performs what is carried in request
Whether the current residual quantity that target software identifies corresponding authorization meets the license request carried in business execution request
Quantity;
Authorization module, described in meeting during the business execution is asked and carrying in the current residual quantity of the authorization
During license request quantity, institute will be licensed to the corresponding target software of target software mark according to the license request quantity
State client use so that the client be based on the target software manage object, and the quantity of managed object with it is described
License request quantity is consistent.
9. device according to claim 8, which is characterized in that the detection module is specifically used for:Detection and the target
Whether the corresponding authorization of software identification is in the term of validity;
When detection is in the term of validity with the corresponding authorization of target software mark, the effective authorization is detected
Current residual quantity whether be not less than the license request quantity;
If the current residual quantity of the effective authorization is not less than the license request quantity, soft with the target
The current residual quantity that part identifies corresponding authorization meets the license request quantity.
10. device according to claim 6, which is characterized in that the device further includes:Invalid module, for every default
Whether authorization described in time detecting is in the term of validity;And detecting that the authorization is not at the term of validity
When, the authorization is invalid.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810027013.6A CN108111534B (en) | 2018-01-11 | 2018-01-11 | Method and device for controlling authorization permission |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810027013.6A CN108111534B (en) | 2018-01-11 | 2018-01-11 | Method and device for controlling authorization permission |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108111534A true CN108111534A (en) | 2018-06-01 |
CN108111534B CN108111534B (en) | 2021-02-05 |
Family
ID=62219656
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810027013.6A Active CN108111534B (en) | 2018-01-11 | 2018-01-11 | Method and device for controlling authorization permission |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108111534B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111625778A (en) * | 2020-04-14 | 2020-09-04 | 华帝股份有限公司 | Method and system for distributing and recovering software license |
CN116760829A (en) * | 2023-08-17 | 2023-09-15 | 中移(苏州)软件技术有限公司 | Disaster recovery resource licensing method, device, equipment and readable storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101281569A (en) * | 2008-05-14 | 2008-10-08 | 北京深思洛克数据保护中心 | Method for using network edition software protecting equipment to control software client terminal quantity |
US20110202433A1 (en) * | 2010-02-16 | 2011-08-18 | Akira Yokoyama | License management system, license management method, and computer program product |
US8566461B1 (en) * | 2004-06-09 | 2013-10-22 | Digital River, Inc. | Managed access to media services |
CN104239782A (en) * | 2013-06-06 | 2014-12-24 | 广达电脑股份有限公司 | Authorization platform |
CN106355052A (en) * | 2016-11-03 | 2017-01-25 | 广东浪潮大数据研究有限公司 | Authorization centralized management method, device and system |
CN107092813A (en) * | 2016-02-18 | 2017-08-25 | 中华电信股份有限公司 | Authorization control method and system suitable for digital copyright management |
CN107122630A (en) * | 2017-04-26 | 2017-09-01 | 新华三技术有限公司 | device authorization management method and device |
CN107395374A (en) * | 2016-05-16 | 2017-11-24 | 中兴通讯股份有限公司 | Transmit control method, the apparatus and system of strategy |
-
2018
- 2018-01-11 CN CN201810027013.6A patent/CN108111534B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8566461B1 (en) * | 2004-06-09 | 2013-10-22 | Digital River, Inc. | Managed access to media services |
CN101281569A (en) * | 2008-05-14 | 2008-10-08 | 北京深思洛克数据保护中心 | Method for using network edition software protecting equipment to control software client terminal quantity |
US20110202433A1 (en) * | 2010-02-16 | 2011-08-18 | Akira Yokoyama | License management system, license management method, and computer program product |
CN104239782A (en) * | 2013-06-06 | 2014-12-24 | 广达电脑股份有限公司 | Authorization platform |
CN107092813A (en) * | 2016-02-18 | 2017-08-25 | 中华电信股份有限公司 | Authorization control method and system suitable for digital copyright management |
CN107395374A (en) * | 2016-05-16 | 2017-11-24 | 中兴通讯股份有限公司 | Transmit control method, the apparatus and system of strategy |
CN106355052A (en) * | 2016-11-03 | 2017-01-25 | 广东浪潮大数据研究有限公司 | Authorization centralized management method, device and system |
CN107122630A (en) * | 2017-04-26 | 2017-09-01 | 新华三技术有限公司 | device authorization management method and device |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111625778A (en) * | 2020-04-14 | 2020-09-04 | 华帝股份有限公司 | Method and system for distributing and recovering software license |
CN116760829A (en) * | 2023-08-17 | 2023-09-15 | 中移(苏州)软件技术有限公司 | Disaster recovery resource licensing method, device, equipment and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108111534B (en) | 2021-02-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108494703A (en) | A kind of access frequency control method, device and storage medium | |
US8739170B1 (en) | Managing requests for computing capacity | |
US20170132597A1 (en) | System and method for managing application access | |
US9846899B1 (en) | Dynamic software licensing | |
US9703934B1 (en) | Usage license | |
CN106980537B (en) | The method and system of cloud host is deleted in cloud computing environment | |
CN108897628A (en) | A kind of implementation method of distributed lock, device and electronic equipment | |
CN109101787A (en) | A kind of method and device carrying out credit appraisal to copyright user based on block chain | |
CN105939362A (en) | User account management method and device | |
CN1996834A (en) | Method and apparatus for acquiring domain information and domain-related data | |
CN102624677A (en) | Method and server for monitoring network user behavior | |
CN103297412A (en) | Thin client system, and server, method and program for connection management | |
US20120192285A1 (en) | Software License Serving In A Massively Parallel Processing Environment | |
CN106897150B (en) | Resource quota management method based on permission chain | |
CN113285804A (en) | Encryption and decryption method, device, equipment and storage medium for disk data of virtual machine | |
CN104301257B (en) | A kind of resource allocation methods, device and equipment | |
CN103685351B (en) | A kind of dispatching method and equipment of buffer service node based on cloud computing platform | |
CN105868973B (en) | Event resource processing method and device | |
CN108111534A (en) | A kind of method and device for controlling authorization | |
CN104639650A (en) | Fine granularity distributive interface access control method and device | |
WO2009109119A1 (en) | License controlling method and managing device | |
CN109992566A (en) | A kind of file access method, device, equipment and readable storage medium storing program for executing | |
CN110162397A (en) | Resource allocation methods, apparatus and system | |
US9065825B2 (en) | Method and system for license management | |
CN115396209B (en) | Access authorization method, device, electronic equipment and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |