CN109508517B - Selective activation method and equipment for software function module - Google Patents
Selective activation method and equipment for software function module Download PDFInfo
- Publication number
- CN109508517B CN109508517B CN201811266591.1A CN201811266591A CN109508517B CN 109508517 B CN109508517 B CN 109508517B CN 201811266591 A CN201811266591 A CN 201811266591A CN 109508517 B CN109508517 B CN 109508517B
- Authority
- CN
- China
- Prior art keywords
- character string
- activated
- code
- function module
- software function
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 53
- 230000004913 activation Effects 0.000 title claims abstract description 19
- 238000013475 authorization Methods 0.000 claims abstract description 36
- 230000003213 activating effect Effects 0.000 claims abstract description 26
- 230000006870 function Effects 0.000 claims description 87
- 238000004891 communication Methods 0.000 claims description 9
- 238000001824 photoionisation detection Methods 0.000 description 29
- 238000012800 visualization Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000008094 contradictory effect Effects 0.000 description 1
- 238000013079 data visualisation Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
Abstract
The embodiment of the invention provides a method and equipment for selectively activating a software functional module. Wherein the method comprises the following steps: acquiring a software function module to be activated, combining a PID number and an ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code; and analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code. According to the selective activation method and device for the software function module, the PID number and the ID number of the software function module to be activated are combined, the SN code is obtained through encryption, the SN code is analyzed, the PID code is matched with the PID code of the software function module to be activated, the authorization code is finally obtained, and the software function module can be selectively activated.
Description
Technical Field
The embodiment of the invention relates to the technical field of computers, in particular to a method and equipment for selectively activating a software function module.
Background
The security policy visualization analysis platform system realizes the network topology display of the network under the security domain infrastructure through the analysis and calculation of the network routing configuration, the address conversion policy and the access control policy, and enables the network security policy to be visible, controllable and manageable. With the perfect function of the security policy visualization platform, the whole platform is developing towards modularization, and the function of the software visualization platform can be modularly customized according to the requirement of a user. The current authorization control is based on the SN code generated by the system for installing the security policy visualization platform.
In the current activation mode of the policy visualization platform, software activation authentication is mainly performed by using a computer MAC address as source data to perform calculation and encryption to obtain an SN (serial number) code. However, in the Linux system, the MAC address can be set, and although the same MAC address in the same lan can cause confusion of computer network communication, deploying data visualization platforms in different network environments does not have the problem of MAC address conflict, and the same SN code can be generated by the same MAC address, so that the way of generating the SN code by using MAC is easily forged, and authorization on a single machine can be used on multiple instruments. With the function development of the security policy visualization platform, the platform is developed from the former fixed function platform into an elastic customizable function platform, and a customer can install all the functions for trial use, but can select a required module for purchase activation according to the use scene of the customer when purchasing activation, so that the cost is saved. However, when the client activates the software, the SN code generated based on the MAC address does not correctly reflect the function installed by the client, and thus, the client can only authorize the function as a whole, and cannot authorize the function accurately according to the module. Therefore, a method capable of selectively activating required software function modules is found, and particularly, the method can be applied to not only a policy visualization analysis platform system but also other software platform systems, so that the technical problem to be solved in the art is solved.
Disclosure of Invention
In view of the foregoing problems in the prior art, embodiments of the present invention provide a method and an apparatus for selectively activating a software function module.
In a first aspect, an embodiment of the present invention provides a method for selectively activating a software functional module, including: acquiring a software function module to be activated, combining a PID number and an ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code; and analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code.
Further, the combining the PID number and the ID number of the software functional module to be activated to obtain a splicing character string includes: storing the ID number in two bytes, storing the PID number in four bytes, using the two bytes storing the ID number as a header, storing the four-byte tail of the PID number, and splicing to obtain a hexadecimal character string; and the hexadecimal character string is the splicing character string.
Further, the encrypting the splicing character string to obtain the SN code includes: encrypting the splicing character string by adopting a BASE64 method to obtain an encrypted splicing character string, and encrypting the encrypted splicing character string again by adopting an AES method to obtain an SN code; and the format of the encrypted splicing character string is fixed to a psk mode.
Further, the analyzing the SN code to obtain an authorization code includes: decoding the SN code by adopting an AES method to obtain a decoded character string, decoding the decoded character string again by adopting a BASE64 method to obtain a character string to be detected, if the character string to be detected is a hexadecimal number and the byte length is six, and the first two bytes of the character string to be detected are the software function module ID, obtaining the tail four bytes of the character string to be detected, and if the tail four bytes are consistent with the PID of the corresponding software function module to be activated, generating the authorization code.
Further, the method for selectively activating the software functional module further includes: assigning the PID of the software functional module which does not need to be activated to a fixed numerical value; wherein the fixed value is used to identify that the software function module does not require activation.
Further, the method for selectively activating the software functional module further includes: and if the character string to be detected is not a hexadecimal number or the byte length is not six, determining that the software function module represented by the character string to be detected does not need to be activated.
Further, the method for selectively activating the software functional module further includes: and if the two bytes at the head of the character string to be detected are not the software function module ID, determining that the software function module represented by the character string to be detected does not need to be activated.
In a second aspect, an embodiment of the present invention provides a device for selectively activating a software function module, including:
the SN code acquisition module is used for acquiring a software function module to be activated, combining the PID number and the ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code;
and the authorization code acquisition module is used for analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code.
In a third aspect, an embodiment of the present invention provides an electronic device, including:
at least one processor; and
at least one memory communicatively coupled to the processor, wherein:
the memory stores program instructions executable by the processor, the processor invoking the program instructions to perform the method for selective activation of software functional modules provided by any of the various possible implementations of the first aspect.
In a fourth aspect, embodiments of the present invention provide a non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform a method for selective activation of software functional modules provided in any of a variety of possible implementations of the first aspect.
According to the selective activation method and device for the software function module, the PID number and the ID number of the software function module to be activated are combined, the SN code is obtained through encryption, the SN code is analyzed, the PID code is matched with the PID code of the software function module to be activated, the authorization code is finally obtained, and the software function module can be selectively activated.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, a brief description will be given below to the drawings required for the description of the embodiments or the prior art, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flowchart of a method for selectively activating software function modules according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of a selective activation device for software function modules according to an embodiment of the present invention;
fig. 3 is a schematic physical structure diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention. In addition, technical features of various embodiments or individual embodiments provided by the invention can be arbitrarily combined with each other to form a feasible technical solution, but must be realized by a person skilled in the art, and when the technical solution combination is contradictory or cannot be realized, the technical solution combination is not considered to exist and is not within the protection scope of the present invention.
The embodiment of the invention provides a selective activation method of a software function module, and referring to fig. 1, the method comprises the following steps:
101. acquiring a software function module to be activated, combining a PID number and an ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code;
102. and analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code.
On the basis of the foregoing embodiment, the method for selectively activating a software function module according to the embodiment of the present invention, which combines the PID number and the ID number of the software function module to be activated to obtain a spliced character string, includes: storing the ID number in two bytes, storing the PID number in four bytes, using the two bytes storing the ID number as a header, storing the four-byte tail of the PID number, and splicing to obtain a hexadecimal character string; and the hexadecimal character string is the splicing character string.
On the basis of the foregoing embodiment, the method for selectively activating a software function module according to the embodiment of the present invention, where encrypting the concatenated string to obtain the SN code, includes: encrypting the splicing character string by adopting a BASE64 method to obtain an encrypted splicing character string, and encrypting the encrypted splicing character string again by adopting an AES method to obtain an SN code; and the format of the encrypted splicing character string is fixed to a psk mode.
On the basis of the foregoing embodiment, the method for selectively activating a software function module provided in the embodiment of the present invention, where the analyzing the SN code to obtain an authorization code, includes: decoding the SN code by adopting an AES method to obtain a decoded character string, decoding the decoded character string again by adopting a BASE64 method to obtain a character string to be detected, if the character string to be detected is a hexadecimal number and the byte length is six (for a long character string, whether the byte length is a multiple of six can also be detected), and the first two bytes of the character string to be detected are software function module IDs (if the character string to be detected does not belong to the category of the software function module IDs, an illegal character string is determined, and processing is not carried out), obtaining the tail four bytes of the character string to be detected, and if the tail four bytes are consistent with the PIDs of the corresponding software function modules needing to be activated, generating the authorization code.
On the basis of the above embodiment, the method for selectively activating a software function module provided in the embodiment of the present invention further includes: assigning the PID of the software functional module which does not need to be activated to a fixed numerical value; wherein the fixed value is used to identify that the software function module does not require activation. Specifically, the fixed value assigned by the PID of the software function module that does not need to be activated may be "8000" in hexadecimal. It can be seen that "if the tail four bytes are consistent with the corresponding PID of the software functional module to be activated" mentioned in the foregoing embodiment, the values of the PIDs cannot include the hexadecimal number "8000" and the error identification hexadecimal number "8000F". When the PID value of a software functional module is "8000" or "8000F" as a hexadecimal number, the software functional module is considered to belong to a software functional module that does not need to be activated.
On the basis of the above embodiment, the method for selectively activating a software function module provided in the embodiment of the present invention further includes: and if the character string to be detected is not a hexadecimal number or the byte length is not six, determining that the software function module represented by the character string to be detected does not need to be activated.
On the basis of the above embodiment, the method for selectively activating a software function module provided in the embodiment of the present invention further includes: and if the two bytes at the head of the character string to be detected are not the software function module ID, determining that the software function module represented by the character string to be detected does not need to be activated.
It should be noted that the method provided by the embodiments of the present invention may be applied to a policy visualization analysis platform system.
According to the selective activation method of the software function module, the PID number and the ID number of the software function module to be activated are combined, the SN code is obtained through encryption, the SN code is analyzed, the PID code is matched with the PID code of the software function module to be activated, the authorization code is finally obtained, and the software function module can be selectively activated.
The implementation basis of the various embodiments of the present invention is realized by programmed processing performed by a device having a processor function. Therefore, in engineering practice, the technical solutions and functions thereof of the embodiments of the present invention can be packaged into various modules. Based on this reality, on the basis of the above embodiments, embodiments of the present invention provide a software functional module selective activation apparatus, which is configured to execute the software functional module selective activation method in the above method embodiments. Referring to fig. 2, the apparatus includes:
an SN code obtaining module 201, configured to obtain a software function module to be activated, combine a PID number and an ID number of the software function module to be activated to obtain a spliced character string, and encrypt the spliced character string to obtain an SN code;
and an authorization code obtaining module 202, configured to parse the SN code to obtain an authorization code, and activate the software function module to be activated by using the authorization code.
According to the selective activation device for the software function module, provided by the embodiment of the invention, the SN code acquisition module and the authorization code acquisition module are adopted, the PID number and the ID number of the software function module to be activated are combined, the SN code is obtained through encryption, the SN code is analyzed, the PID code is matched with the PID code of the software function module to be activated, the authorization code is finally obtained, and the software function module can be selectively activated.
The method of the embodiment of the invention is realized by depending on the electronic equipment, so that the related electronic equipment is necessarily introduced. To this end, an embodiment of the present invention provides an electronic apparatus, as shown in fig. 3, including: at least one processor (processor)301, a communication Interface (Communications Interface)304, at least one memory (memory)302 and a communication bus 303, wherein the at least one processor 301, the communication Interface 304 and the at least one memory 302 are configured to communicate with each other via the communication bus 303. The at least one processor 301 may call logic instructions in the at least one memory 302 to perform the following method: acquiring a software function module to be activated, combining a PID number and an ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code; and analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code.
Furthermore, the logic instructions in the at least one memory 302 may be implemented in software functional units and stored in a computer readable storage medium when sold or used as a stand-alone product. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. Examples include: acquiring a software function module to be activated, combining a PID number and an ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code; and analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (5)
1. A method for selectively activating software functional modules, comprising:
acquiring a software function module to be activated, combining a PID number and an ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code;
analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code;
combining the PID number and the ID number of the software functional module to be activated to obtain a splicing character string, wherein the splicing character string comprises:
storing the ID number in two bytes, storing the PID number in four bytes, using the two bytes storing the ID number as a header, storing the four-byte tail of the PID number, and splicing to obtain a hexadecimal character string; the hexadecimal character string is the splicing character string;
the encrypting the splicing character string to obtain the SN code comprises the following steps:
encrypting the splicing character string by adopting a BASE64 method to obtain an encrypted splicing character string, and encrypting the encrypted splicing character string again by adopting an AES method to obtain an SN code;
the analyzing the SN code to obtain an authorization code includes:
decoding the SN code by adopting an AES method to obtain a decoded character string, decoding the decoded character string again by adopting a BASE64 method to obtain a character string to be detected, if the character string to be detected is a hexadecimal number and the byte length is six, and the first two bytes of the character string to be detected are the ID of the software function module, obtaining the tail four bytes of the character string to be detected, and if the tail four bytes are consistent with the PID of the corresponding software function module to be activated, generating the authorization code;
the PID of the software functional module which does not need to be activated is given to a fixed numerical value, and the fixed numerical value is used for determining that the software functional module does not need to be activated;
if the character string to be detected is not a hexadecimal number or the byte length is not six, determining that the software function module represented by the character string to be detected does not need to be activated;
and if the two bytes at the head of the character string to be detected are not the software function module ID, determining that the software function module represented by the character string to be detected does not need to be activated.
2. The method of selective activation of software functional modules according to claim 1, wherein the format of the encrypted concatenation string is fixed to a psk mode.
3. A device for selectively activating software function modules, comprising:
the SN code acquisition module is used for acquiring a software function module to be activated, combining the PID number and the ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code;
the authorization code acquisition module is used for analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code;
combining the PID number and the ID number of the software functional module to be activated to obtain a splicing character string, wherein the splicing character string comprises:
storing the ID number in two bytes, storing the PID number in four bytes, using the two bytes storing the ID number as a header, storing the four-byte tail of the PID number, and splicing to obtain a hexadecimal character string; the hexadecimal character string is the splicing character string;
the encrypting the splicing character string to obtain the SN code comprises the following steps:
encrypting the splicing character string by adopting a BASE64 method to obtain an encrypted splicing character string, and encrypting the encrypted splicing character string again by adopting an AES method to obtain an SN code;
the analyzing the SN code to obtain an authorization code includes:
decoding the SN code by adopting an AES method to obtain a decoded character string, decoding the decoded character string again by adopting a BASE64 method to obtain a character string to be detected, if the character string to be detected is a hexadecimal number and the byte length is six, and the first two bytes of the character string to be detected are the ID of the software function module, obtaining the tail four bytes of the character string to be detected, and if the tail four bytes are consistent with the PID of the corresponding software function module to be activated, generating the authorization code;
the PID of the software functional module which does not need to be activated is given to a fixed numerical value, and the fixed numerical value is used for determining that the software functional module does not need to be activated;
if the character string to be detected is not a hexadecimal number or the byte length is not six, determining that the software function module represented by the character string to be detected does not need to be activated;
and if the two bytes at the head of the character string to be detected are not the software function module ID, determining that the software function module represented by the character string to be detected does not need to be activated.
4. An electronic device, comprising:
at least one processor, at least one memory, a communication interface, and a bus; wherein,
the processor, the memory and the communication interface complete mutual communication through the bus;
the memory stores program instructions executable by the processor, the processor calling the program instructions to perform the method of any of claims 1 to 2.
5. A non-transitory computer-readable storage medium storing computer instructions that cause a computer to perform the method of any one of claims 1-2.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811266591.1A CN109508517B (en) | 2018-10-29 | 2018-10-29 | Selective activation method and equipment for software function module |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811266591.1A CN109508517B (en) | 2018-10-29 | 2018-10-29 | Selective activation method and equipment for software function module |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109508517A CN109508517A (en) | 2019-03-22 |
CN109508517B true CN109508517B (en) | 2021-06-29 |
Family
ID=65747004
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811266591.1A Active CN109508517B (en) | 2018-10-29 | 2018-10-29 | Selective activation method and equipment for software function module |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109508517B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101404052A (en) * | 2008-05-04 | 2009-04-08 | 北京深思洛克软件技术股份有限公司 | Method for remotely activating software |
CN102842000A (en) * | 2012-07-18 | 2012-12-26 | 攀枝花学院 | Method for realizing common software registration system |
CN104112084A (en) * | 2013-04-16 | 2014-10-22 | 国际商业机器公司 | Execution-based license discovery and optimization method and device |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6993664B2 (en) * | 2001-03-27 | 2006-01-31 | Microsoft Corporation | Method and system for licensing a software product |
US7278131B2 (en) * | 2003-03-03 | 2007-10-02 | Microsoft Corporation | Compact hardware identification for binding a software package to a computer system having tolerance for hardware changes |
CN107679371A (en) * | 2017-09-25 | 2018-02-09 | 用友网络科技股份有限公司 | Software license control method, device, computer equipment and readable storage medium storing program for executing |
-
2018
- 2018-10-29 CN CN201811266591.1A patent/CN109508517B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101404052A (en) * | 2008-05-04 | 2009-04-08 | 北京深思洛克软件技术股份有限公司 | Method for remotely activating software |
CN102842000A (en) * | 2012-07-18 | 2012-12-26 | 攀枝花学院 | Method for realizing common software registration system |
CN104112084A (en) * | 2013-04-16 | 2014-10-22 | 国际商业机器公司 | Execution-based license discovery and optimization method and device |
Also Published As
Publication number | Publication date |
---|---|
CN109508517A (en) | 2019-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106130733B (en) | Update the methods, devices and systems of configuration | |
CN107395614A (en) | Single-point logging method and system | |
CN106302453A (en) | The processing method of data, Apparatus and system | |
US9838359B2 (en) | Separation of IoT network thing identification data at a network edge device | |
CN108171088A (en) | A kind of guard method of server hardware credibility and device based on BMC | |
CN108075888B (en) | Dynamic URL generation method and device, storage medium and electronic equipment | |
CN107992771B (en) | A kind of data desensitization method and device | |
US20150302202A1 (en) | Program verification apparatus, program verification method, and program verification program | |
CN108055585B (en) | Data processing method, set top box upgrading method, terminal and set top box | |
WO2017113789A1 (en) | Electronic device remote repair method, device, repaired device, and system | |
CN103532985A (en) | Communication method, equipment and system between virtual machines | |
CN111049897A (en) | Method, device, equipment and medium for encrypted uploading and decrypted deployment of small program package | |
CN115668860A (en) | Identifying creator of encrypted object | |
CN108418679B (en) | Method and device for processing secret key under multiple data centers and electronic equipment | |
CN112751702A (en) | Data configuration device for configuring data processing entities | |
CN114429267B (en) | Air control method, system and device for copyright of digital work and storage medium | |
CN107577715B (en) | SO file protection method and device | |
CN108737338A (en) | A kind of authentication method and system | |
CN109508517B (en) | Selective activation method and equipment for software function module | |
CN109743306A (en) | A kind of account number safety appraisal procedure, system, equipment and medium | |
CN112926101A (en) | Disk partition encryption method, system, device and computer readable medium | |
CN117118972A (en) | Method, device, equipment and medium capable of recording file circulation process | |
JP6631133B2 (en) | Information processing apparatus, information processing method, and program | |
CN109995534B (en) | Method and device for carrying out security authentication on application program | |
CN113542187A (en) | File uploading and downloading method and device, computer device and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |