CN109508517B - Selective activation method and equipment for software function module - Google Patents

Selective activation method and equipment for software function module Download PDF

Info

Publication number
CN109508517B
CN109508517B CN201811266591.1A CN201811266591A CN109508517B CN 109508517 B CN109508517 B CN 109508517B CN 201811266591 A CN201811266591 A CN 201811266591A CN 109508517 B CN109508517 B CN 109508517B
Authority
CN
China
Prior art keywords
character string
activated
code
function module
software function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811266591.1A
Other languages
Chinese (zh)
Other versions
CN109508517A (en
Inventor
闻嘉昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Sipuling Technology Co Ltd
Original Assignee
Wuhan Sipuling Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Sipuling Technology Co Ltd filed Critical Wuhan Sipuling Technology Co Ltd
Priority to CN201811266591.1A priority Critical patent/CN109508517B/en
Publication of CN109508517A publication Critical patent/CN109508517A/en
Application granted granted Critical
Publication of CN109508517B publication Critical patent/CN109508517B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the invention provides a method and equipment for selectively activating a software functional module. Wherein the method comprises the following steps: acquiring a software function module to be activated, combining a PID number and an ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code; and analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code. According to the selective activation method and device for the software function module, the PID number and the ID number of the software function module to be activated are combined, the SN code is obtained through encryption, the SN code is analyzed, the PID code is matched with the PID code of the software function module to be activated, the authorization code is finally obtained, and the software function module can be selectively activated.

Description

Selective activation method and equipment for software function module
Technical Field
The embodiment of the invention relates to the technical field of computers, in particular to a method and equipment for selectively activating a software function module.
Background
The security policy visualization analysis platform system realizes the network topology display of the network under the security domain infrastructure through the analysis and calculation of the network routing configuration, the address conversion policy and the access control policy, and enables the network security policy to be visible, controllable and manageable. With the perfect function of the security policy visualization platform, the whole platform is developing towards modularization, and the function of the software visualization platform can be modularly customized according to the requirement of a user. The current authorization control is based on the SN code generated by the system for installing the security policy visualization platform.
In the current activation mode of the policy visualization platform, software activation authentication is mainly performed by using a computer MAC address as source data to perform calculation and encryption to obtain an SN (serial number) code. However, in the Linux system, the MAC address can be set, and although the same MAC address in the same lan can cause confusion of computer network communication, deploying data visualization platforms in different network environments does not have the problem of MAC address conflict, and the same SN code can be generated by the same MAC address, so that the way of generating the SN code by using MAC is easily forged, and authorization on a single machine can be used on multiple instruments. With the function development of the security policy visualization platform, the platform is developed from the former fixed function platform into an elastic customizable function platform, and a customer can install all the functions for trial use, but can select a required module for purchase activation according to the use scene of the customer when purchasing activation, so that the cost is saved. However, when the client activates the software, the SN code generated based on the MAC address does not correctly reflect the function installed by the client, and thus, the client can only authorize the function as a whole, and cannot authorize the function accurately according to the module. Therefore, a method capable of selectively activating required software function modules is found, and particularly, the method can be applied to not only a policy visualization analysis platform system but also other software platform systems, so that the technical problem to be solved in the art is solved.
Disclosure of Invention
In view of the foregoing problems in the prior art, embodiments of the present invention provide a method and an apparatus for selectively activating a software function module.
In a first aspect, an embodiment of the present invention provides a method for selectively activating a software functional module, including: acquiring a software function module to be activated, combining a PID number and an ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code; and analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code.
Further, the combining the PID number and the ID number of the software functional module to be activated to obtain a splicing character string includes: storing the ID number in two bytes, storing the PID number in four bytes, using the two bytes storing the ID number as a header, storing the four-byte tail of the PID number, and splicing to obtain a hexadecimal character string; and the hexadecimal character string is the splicing character string.
Further, the encrypting the splicing character string to obtain the SN code includes: encrypting the splicing character string by adopting a BASE64 method to obtain an encrypted splicing character string, and encrypting the encrypted splicing character string again by adopting an AES method to obtain an SN code; and the format of the encrypted splicing character string is fixed to a psk mode.
Further, the analyzing the SN code to obtain an authorization code includes: decoding the SN code by adopting an AES method to obtain a decoded character string, decoding the decoded character string again by adopting a BASE64 method to obtain a character string to be detected, if the character string to be detected is a hexadecimal number and the byte length is six, and the first two bytes of the character string to be detected are the software function module ID, obtaining the tail four bytes of the character string to be detected, and if the tail four bytes are consistent with the PID of the corresponding software function module to be activated, generating the authorization code.
Further, the method for selectively activating the software functional module further includes: assigning the PID of the software functional module which does not need to be activated to a fixed numerical value; wherein the fixed value is used to identify that the software function module does not require activation.
Further, the method for selectively activating the software functional module further includes: and if the character string to be detected is not a hexadecimal number or the byte length is not six, determining that the software function module represented by the character string to be detected does not need to be activated.
Further, the method for selectively activating the software functional module further includes: and if the two bytes at the head of the character string to be detected are not the software function module ID, determining that the software function module represented by the character string to be detected does not need to be activated.
In a second aspect, an embodiment of the present invention provides a device for selectively activating a software function module, including:
the SN code acquisition module is used for acquiring a software function module to be activated, combining the PID number and the ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code;
and the authorization code acquisition module is used for analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code.
In a third aspect, an embodiment of the present invention provides an electronic device, including:
at least one processor; and
at least one memory communicatively coupled to the processor, wherein:
the memory stores program instructions executable by the processor, the processor invoking the program instructions to perform the method for selective activation of software functional modules provided by any of the various possible implementations of the first aspect.
In a fourth aspect, embodiments of the present invention provide a non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform a method for selective activation of software functional modules provided in any of a variety of possible implementations of the first aspect.
According to the selective activation method and device for the software function module, the PID number and the ID number of the software function module to be activated are combined, the SN code is obtained through encryption, the SN code is analyzed, the PID code is matched with the PID code of the software function module to be activated, the authorization code is finally obtained, and the software function module can be selectively activated.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, a brief description will be given below to the drawings required for the description of the embodiments or the prior art, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flowchart of a method for selectively activating software function modules according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of a selective activation device for software function modules according to an embodiment of the present invention;
fig. 3 is a schematic physical structure diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention. In addition, technical features of various embodiments or individual embodiments provided by the invention can be arbitrarily combined with each other to form a feasible technical solution, but must be realized by a person skilled in the art, and when the technical solution combination is contradictory or cannot be realized, the technical solution combination is not considered to exist and is not within the protection scope of the present invention.
The embodiment of the invention provides a selective activation method of a software function module, and referring to fig. 1, the method comprises the following steps:
101. acquiring a software function module to be activated, combining a PID number and an ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code;
102. and analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code.
On the basis of the foregoing embodiment, the method for selectively activating a software function module according to the embodiment of the present invention, which combines the PID number and the ID number of the software function module to be activated to obtain a spliced character string, includes: storing the ID number in two bytes, storing the PID number in four bytes, using the two bytes storing the ID number as a header, storing the four-byte tail of the PID number, and splicing to obtain a hexadecimal character string; and the hexadecimal character string is the splicing character string.
On the basis of the foregoing embodiment, the method for selectively activating a software function module according to the embodiment of the present invention, where encrypting the concatenated string to obtain the SN code, includes: encrypting the splicing character string by adopting a BASE64 method to obtain an encrypted splicing character string, and encrypting the encrypted splicing character string again by adopting an AES method to obtain an SN code; and the format of the encrypted splicing character string is fixed to a psk mode.
On the basis of the foregoing embodiment, the method for selectively activating a software function module provided in the embodiment of the present invention, where the analyzing the SN code to obtain an authorization code, includes: decoding the SN code by adopting an AES method to obtain a decoded character string, decoding the decoded character string again by adopting a BASE64 method to obtain a character string to be detected, if the character string to be detected is a hexadecimal number and the byte length is six (for a long character string, whether the byte length is a multiple of six can also be detected), and the first two bytes of the character string to be detected are software function module IDs (if the character string to be detected does not belong to the category of the software function module IDs, an illegal character string is determined, and processing is not carried out), obtaining the tail four bytes of the character string to be detected, and if the tail four bytes are consistent with the PIDs of the corresponding software function modules needing to be activated, generating the authorization code.
On the basis of the above embodiment, the method for selectively activating a software function module provided in the embodiment of the present invention further includes: assigning the PID of the software functional module which does not need to be activated to a fixed numerical value; wherein the fixed value is used to identify that the software function module does not require activation. Specifically, the fixed value assigned by the PID of the software function module that does not need to be activated may be "8000" in hexadecimal. It can be seen that "if the tail four bytes are consistent with the corresponding PID of the software functional module to be activated" mentioned in the foregoing embodiment, the values of the PIDs cannot include the hexadecimal number "8000" and the error identification hexadecimal number "8000F". When the PID value of a software functional module is "8000" or "8000F" as a hexadecimal number, the software functional module is considered to belong to a software functional module that does not need to be activated.
On the basis of the above embodiment, the method for selectively activating a software function module provided in the embodiment of the present invention further includes: and if the character string to be detected is not a hexadecimal number or the byte length is not six, determining that the software function module represented by the character string to be detected does not need to be activated.
On the basis of the above embodiment, the method for selectively activating a software function module provided in the embodiment of the present invention further includes: and if the two bytes at the head of the character string to be detected are not the software function module ID, determining that the software function module represented by the character string to be detected does not need to be activated.
It should be noted that the method provided by the embodiments of the present invention may be applied to a policy visualization analysis platform system.
According to the selective activation method of the software function module, the PID number and the ID number of the software function module to be activated are combined, the SN code is obtained through encryption, the SN code is analyzed, the PID code is matched with the PID code of the software function module to be activated, the authorization code is finally obtained, and the software function module can be selectively activated.
The implementation basis of the various embodiments of the present invention is realized by programmed processing performed by a device having a processor function. Therefore, in engineering practice, the technical solutions and functions thereof of the embodiments of the present invention can be packaged into various modules. Based on this reality, on the basis of the above embodiments, embodiments of the present invention provide a software functional module selective activation apparatus, which is configured to execute the software functional module selective activation method in the above method embodiments. Referring to fig. 2, the apparatus includes:
an SN code obtaining module 201, configured to obtain a software function module to be activated, combine a PID number and an ID number of the software function module to be activated to obtain a spliced character string, and encrypt the spliced character string to obtain an SN code;
and an authorization code obtaining module 202, configured to parse the SN code to obtain an authorization code, and activate the software function module to be activated by using the authorization code.
According to the selective activation device for the software function module, provided by the embodiment of the invention, the SN code acquisition module and the authorization code acquisition module are adopted, the PID number and the ID number of the software function module to be activated are combined, the SN code is obtained through encryption, the SN code is analyzed, the PID code is matched with the PID code of the software function module to be activated, the authorization code is finally obtained, and the software function module can be selectively activated.
The method of the embodiment of the invention is realized by depending on the electronic equipment, so that the related electronic equipment is necessarily introduced. To this end, an embodiment of the present invention provides an electronic apparatus, as shown in fig. 3, including: at least one processor (processor)301, a communication Interface (Communications Interface)304, at least one memory (memory)302 and a communication bus 303, wherein the at least one processor 301, the communication Interface 304 and the at least one memory 302 are configured to communicate with each other via the communication bus 303. The at least one processor 301 may call logic instructions in the at least one memory 302 to perform the following method: acquiring a software function module to be activated, combining a PID number and an ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code; and analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code.
Furthermore, the logic instructions in the at least one memory 302 may be implemented in software functional units and stored in a computer readable storage medium when sold or used as a stand-alone product. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. Examples include: acquiring a software function module to be activated, combining a PID number and an ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code; and analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (5)

1. A method for selectively activating software functional modules, comprising:
acquiring a software function module to be activated, combining a PID number and an ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code;
analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code;
combining the PID number and the ID number of the software functional module to be activated to obtain a splicing character string, wherein the splicing character string comprises:
storing the ID number in two bytes, storing the PID number in four bytes, using the two bytes storing the ID number as a header, storing the four-byte tail of the PID number, and splicing to obtain a hexadecimal character string; the hexadecimal character string is the splicing character string;
the encrypting the splicing character string to obtain the SN code comprises the following steps:
encrypting the splicing character string by adopting a BASE64 method to obtain an encrypted splicing character string, and encrypting the encrypted splicing character string again by adopting an AES method to obtain an SN code;
the analyzing the SN code to obtain an authorization code includes:
decoding the SN code by adopting an AES method to obtain a decoded character string, decoding the decoded character string again by adopting a BASE64 method to obtain a character string to be detected, if the character string to be detected is a hexadecimal number and the byte length is six, and the first two bytes of the character string to be detected are the ID of the software function module, obtaining the tail four bytes of the character string to be detected, and if the tail four bytes are consistent with the PID of the corresponding software function module to be activated, generating the authorization code;
the PID of the software functional module which does not need to be activated is given to a fixed numerical value, and the fixed numerical value is used for determining that the software functional module does not need to be activated;
if the character string to be detected is not a hexadecimal number or the byte length is not six, determining that the software function module represented by the character string to be detected does not need to be activated;
and if the two bytes at the head of the character string to be detected are not the software function module ID, determining that the software function module represented by the character string to be detected does not need to be activated.
2. The method of selective activation of software functional modules according to claim 1, wherein the format of the encrypted concatenation string is fixed to a psk mode.
3. A device for selectively activating software function modules, comprising:
the SN code acquisition module is used for acquiring a software function module to be activated, combining the PID number and the ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code;
the authorization code acquisition module is used for analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code;
combining the PID number and the ID number of the software functional module to be activated to obtain a splicing character string, wherein the splicing character string comprises:
storing the ID number in two bytes, storing the PID number in four bytes, using the two bytes storing the ID number as a header, storing the four-byte tail of the PID number, and splicing to obtain a hexadecimal character string; the hexadecimal character string is the splicing character string;
the encrypting the splicing character string to obtain the SN code comprises the following steps:
encrypting the splicing character string by adopting a BASE64 method to obtain an encrypted splicing character string, and encrypting the encrypted splicing character string again by adopting an AES method to obtain an SN code;
the analyzing the SN code to obtain an authorization code includes:
decoding the SN code by adopting an AES method to obtain a decoded character string, decoding the decoded character string again by adopting a BASE64 method to obtain a character string to be detected, if the character string to be detected is a hexadecimal number and the byte length is six, and the first two bytes of the character string to be detected are the ID of the software function module, obtaining the tail four bytes of the character string to be detected, and if the tail four bytes are consistent with the PID of the corresponding software function module to be activated, generating the authorization code;
the PID of the software functional module which does not need to be activated is given to a fixed numerical value, and the fixed numerical value is used for determining that the software functional module does not need to be activated;
if the character string to be detected is not a hexadecimal number or the byte length is not six, determining that the software function module represented by the character string to be detected does not need to be activated;
and if the two bytes at the head of the character string to be detected are not the software function module ID, determining that the software function module represented by the character string to be detected does not need to be activated.
4. An electronic device, comprising:
at least one processor, at least one memory, a communication interface, and a bus; wherein,
the processor, the memory and the communication interface complete mutual communication through the bus;
the memory stores program instructions executable by the processor, the processor calling the program instructions to perform the method of any of claims 1 to 2.
5. A non-transitory computer-readable storage medium storing computer instructions that cause a computer to perform the method of any one of claims 1-2.
CN201811266591.1A 2018-10-29 2018-10-29 Selective activation method and equipment for software function module Active CN109508517B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811266591.1A CN109508517B (en) 2018-10-29 2018-10-29 Selective activation method and equipment for software function module

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811266591.1A CN109508517B (en) 2018-10-29 2018-10-29 Selective activation method and equipment for software function module

Publications (2)

Publication Number Publication Date
CN109508517A CN109508517A (en) 2019-03-22
CN109508517B true CN109508517B (en) 2021-06-29

Family

ID=65747004

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811266591.1A Active CN109508517B (en) 2018-10-29 2018-10-29 Selective activation method and equipment for software function module

Country Status (1)

Country Link
CN (1) CN109508517B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101404052A (en) * 2008-05-04 2009-04-08 北京深思洛克软件技术股份有限公司 Method for remotely activating software
CN102842000A (en) * 2012-07-18 2012-12-26 攀枝花学院 Method for realizing common software registration system
CN104112084A (en) * 2013-04-16 2014-10-22 国际商业机器公司 Execution-based license discovery and optimization method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6993664B2 (en) * 2001-03-27 2006-01-31 Microsoft Corporation Method and system for licensing a software product
US7278131B2 (en) * 2003-03-03 2007-10-02 Microsoft Corporation Compact hardware identification for binding a software package to a computer system having tolerance for hardware changes
CN107679371A (en) * 2017-09-25 2018-02-09 用友网络科技股份有限公司 Software license control method, device, computer equipment and readable storage medium storing program for executing

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101404052A (en) * 2008-05-04 2009-04-08 北京深思洛克软件技术股份有限公司 Method for remotely activating software
CN102842000A (en) * 2012-07-18 2012-12-26 攀枝花学院 Method for realizing common software registration system
CN104112084A (en) * 2013-04-16 2014-10-22 国际商业机器公司 Execution-based license discovery and optimization method and device

Also Published As

Publication number Publication date
CN109508517A (en) 2019-03-22

Similar Documents

Publication Publication Date Title
CN106130733B (en) Update the methods, devices and systems of configuration
CN107395614A (en) Single-point logging method and system
CN106302453A (en) The processing method of data, Apparatus and system
US9838359B2 (en) Separation of IoT network thing identification data at a network edge device
CN108171088A (en) A kind of guard method of server hardware credibility and device based on BMC
CN108075888B (en) Dynamic URL generation method and device, storage medium and electronic equipment
CN107992771B (en) A kind of data desensitization method and device
US20150302202A1 (en) Program verification apparatus, program verification method, and program verification program
CN108055585B (en) Data processing method, set top box upgrading method, terminal and set top box
WO2017113789A1 (en) Electronic device remote repair method, device, repaired device, and system
CN103532985A (en) Communication method, equipment and system between virtual machines
CN111049897A (en) Method, device, equipment and medium for encrypted uploading and decrypted deployment of small program package
CN115668860A (en) Identifying creator of encrypted object
CN108418679B (en) Method and device for processing secret key under multiple data centers and electronic equipment
CN112751702A (en) Data configuration device for configuring data processing entities
CN114429267B (en) Air control method, system and device for copyright of digital work and storage medium
CN107577715B (en) SO file protection method and device
CN108737338A (en) A kind of authentication method and system
CN109508517B (en) Selective activation method and equipment for software function module
CN109743306A (en) A kind of account number safety appraisal procedure, system, equipment and medium
CN112926101A (en) Disk partition encryption method, system, device and computer readable medium
CN117118972A (en) Method, device, equipment and medium capable of recording file circulation process
JP6631133B2 (en) Information processing apparatus, information processing method, and program
CN109995534B (en) Method and device for carrying out security authentication on application program
CN113542187A (en) File uploading and downloading method and device, computer device and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant