CN111143782A - Authority management method and device of application software, server and storage medium - Google Patents

Authority management method and device of application software, server and storage medium Download PDF

Info

Publication number
CN111143782A
CN111143782A CN201911088450.XA CN201911088450A CN111143782A CN 111143782 A CN111143782 A CN 111143782A CN 201911088450 A CN201911088450 A CN 201911088450A CN 111143782 A CN111143782 A CN 111143782A
Authority
CN
China
Prior art keywords
authority
file
application software
default
permission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911088450.XA
Other languages
Chinese (zh)
Other versions
CN111143782B (en
Inventor
刘均
李河金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN201911088450.XA priority Critical patent/CN111143782B/en
Publication of CN111143782A publication Critical patent/CN111143782A/en
Application granted granted Critical
Publication of CN111143782B publication Critical patent/CN111143782B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/622Layer-2 addresses, e.g. medium access control [MAC] addresses

Abstract

The application discloses a method, a device, a server and a storage medium for managing the authority of application software, wherein the method is applied to the server and comprises the following steps: acquiring MAC address information of terminal equipment provided with application software; inquiring whether a special authority file corresponding to the MAC address information exists in a database, wherein the special authority file is an authorization file corresponding to the application software generated according to the record information after the record information of the application software is received by the server; if the special permission file corresponding to the MAC address information does not exist in the database, controlling the terminal equipment to configure corresponding default permission for the application software according to a preset default permission file; and if the special authority file corresponding to the MAC address information exists in the database, controlling the terminal equipment to configure corresponding special authority for the application software according to the special authority file.

Description

Authority management method and device of application software, server and storage medium
Technical Field
The present application relates to the field of rights management technologies, and in particular, to a method, an apparatus, a server, and a storage medium for rights management of application software.
Background
Today, terminal devices such as mobile phones, notebook computers, tablets and the like become necessary components of partial human lives, various application software capable of helping users to process various files, product designs or data becomes a pet of the users.
The application software provider can obtain corresponding rewards for the software developed by the application software provider, and in many application scenarios, the application software provider needs to control the use permission of the application software user. For example, to achieve the purpose of charging, the user may try for a certain period of time, and after the trial period, the user needs to pay to use the fee, or use higher-level functions after paying the fee. Currently, most software products require special hardware (such as a "dongle") to authorize the application software, so that the corresponding application software provided by a manufacturer can be run by having the dongle. If a complex encryption strategy is adopted, although the purpose of authority control can be achieved, the software operation efficiency is reduced.
Therefore, how to manage the application authority of the application software more conveniently is a topic that those skilled in the art are studying.
Disclosure of Invention
The application mainly aims to provide an application software authority management method, an application software authority management device, a server and a storage medium, and aims to provide a convenient and efficient application software authority management method.
In order to achieve the above object, the present application provides a method for managing rights of application software, which is applied to a server, and the method includes:
acquiring Media Access Control (MAC) address information of terminal equipment provided with application software;
inquiring whether a special authority file corresponding to the MAC address information exists in a database, wherein the special authority file is an authorization file corresponding to the application software generated according to the record information after the record information of the application software is received by the server;
if the special permission file corresponding to the MAC address information does not exist in the database, controlling the terminal equipment to configure corresponding default permission for the application software according to a preset default permission file;
and if the special authority file corresponding to the MAC address information exists in the database, controlling the terminal equipment to configure corresponding special authority for the application software according to the special authority file.
Preferably, the controlling the terminal device to configure the corresponding default permission for the application software according to the preset default permission file specifically includes:
calling a preset default authority file and generating default authority information according to the default authority file;
and sending the default permission information to the terminal equipment so that the terminal equipment configures corresponding default permission for the application software according to the default permission information.
Preferably, the invoking a preset default permission file and generating default permission information according to the default permission file specifically include:
calling a preset default authority file and judging whether the terminal equipment has the authority to operate the application software according to the MAC address information and the default authority file;
and if the terminal equipment has the authority to operate the application software, generating the default authority information according to the default authority file.
Preferably, the controlling the terminal device to configure the corresponding special permission for the application software according to the special permission file specifically includes:
calling the special authority file and generating special authority information according to the special authority file;
and sending the special permission information to the terminal equipment so that the terminal equipment configures corresponding special permission for the application software according to the special permission information.
Preferably, the invoking the special authority file and generating special authority information according to the special authority file specifically include:
calling the special authority file and acquiring the authority level of the application software running on the terminal equipment according to the MAC address information and the special authority file;
and generating the special authority information corresponding to the authority level according to the special authority file and the authority level.
The application further provides an authority management device of application software, which is applied to a server, and the authority management device comprises:
the address acquisition module is used for acquiring the MAC address information of the terminal equipment provided with the application software;
the file query module is used for querying whether a special authority file corresponding to the MAC address information exists in a database, wherein the special authority file is an authorization file corresponding to the application software generated according to the record information after the server receives the record information of the application software;
the default permission module is used for controlling the terminal equipment to configure corresponding default permission for the application software according to a preset default permission file if the special permission file corresponding to the MAC address information does not exist in the database;
and the special permission module is used for controlling the terminal equipment to configure corresponding special permission for the application software according to the special permission file if the special permission file corresponding to the MAC address information exists in the database.
Preferably, the default permission module is further configured to:
calling a preset default authority file and generating default authority information according to the default authority file;
and sending the default permission information to the terminal equipment so that the terminal equipment configures corresponding default permission for the application software according to the default permission information.
Preferably, the default permission module is further configured to:
calling a preset default authority file and judging whether the terminal equipment has the authority to operate the application software according to the MAC address information and the default authority file;
and if the terminal equipment has the authority to operate the application software, generating the default authority information according to the default authority file.
Preferably, the dedicated rights module is further configured to:
calling the special authority file and generating special authority information according to the special authority file;
and sending the special permission information to the terminal equipment so that the terminal equipment configures corresponding special permission for the application software according to the special permission information.
Preferably, the dedicated rights module is further configured to:
calling the special authority file and acquiring the authority level of the application software running on the terminal equipment according to the MAC address information and the special authority file;
and generating the special authority information corresponding to the authority level according to the special authority file and the authority level.
The present application further provides a server, comprising:
a memory for storing a computer executable rights management program; and
and the processor is used for calling the authority management program stored in the memory to execute the authority management method.
The application also provides a storage medium, wherein the storage medium stores a computer-executable authority management program, and the processor can execute the authority management method when calling the authority management program.
The authority management method is applied to a server, and the method comprises the steps of obtaining MAC address information of terminal equipment provided with application software; inquiring whether a special authority file corresponding to the MAC address information exists in a database, wherein the special authority file is an authorization file corresponding to the application software generated according to the record information after the record information of the application software is received by the server; if the special permission file corresponding to the MAC address information does not exist in the database, controlling the terminal equipment to configure corresponding default permission for the application software according to the default permission file; and if the special authority file corresponding to the MAC address information exists in the database, controlling the terminal equipment to configure corresponding special authority for the application software according to the special authority file. After the application software is installed in the terminal equipment, the binding filing information of the terminal equipment and the application software is sent to the server, the server establishes a special permission file for the corresponding terminal equipment through the MAC address of the terminal equipment, so that the corresponding special permission can be configured for the application software installed in the terminal equipment by controlling the corresponding terminal equipment, and meanwhile, when the terminal equipment which is not filed uses the application software, the server calls the default permission file to control the application software which is operated by the terminal equipment which is not filed to be configured with the default permission, so that the purpose of configuring different permissions for the application software through different terminal equipment installed by the application software is achieved.
Drawings
FIG. 1 is a framework diagram of a rights management system for application software provided herein;
FIG. 2 is a flowchart illustrating steps of a method for managing rights of application software provided by the present application;
FIG. 3A is a flowchart illustrating sub-steps of step S3 in FIG. 2;
FIG. 3B is a flowchart illustrating sub-steps of step S31 in FIG. 3A;
FIG. 4A is a flowchart illustrating sub-steps of step S4 in FIG. 2;
FIG. 4B is a flowchart illustrating sub-steps of step S41 in FIG. 4A;
fig. 5 is a block diagram illustrating a structure of a rights management apparatus for application software according to an embodiment of the present application;
fig. 6 is a block diagram of a server according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims of the present application and in the drawings described above, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the descriptions in this application referring to "first", "second", etc. are for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present application.
The application provides a method, a device, a server and a storage medium for managing the authority of application software, wherein the method is applied to the server and is realized by acquiring MAC address information of terminal equipment provided with the application software; inquiring whether a special authority file corresponding to the MAC address information exists in a database, wherein the special authority file is an authorization file corresponding to the application software generated according to the record information after the record information of the application software is received by the server; if the special permission file corresponding to the MAC address information does not exist in the database, controlling the terminal equipment to configure corresponding default permission for the application software according to the default permission file; and if the special authority file corresponding to the MAC address information exists in the database, controlling the terminal equipment to configure corresponding special authority for the application software according to the special authority file. After the application software is installed in the terminal equipment, the binding filing information of the terminal equipment and the application software is sent to the server, the server establishes a special permission file for the corresponding terminal equipment through the MAC address of the terminal equipment, so that the corresponding special permission can be configured for the application software installed in the terminal equipment by controlling the corresponding terminal equipment, and meanwhile, when the terminal equipment which is not filed uses the application software, the server calls the default permission file to control the application software which is operated by the terminal equipment which is not filed to be configured with the default permission, so that the purpose of configuring different permissions for the application software through different terminal equipment installed by the application software is achieved.
Referring to fig. 1, fig. 1 is a rights management system 100 for application software provided by the present application, where the rights management system 100 for application software includes a server 10 and a terminal device 20 communicatively connected to the server 10, where a database is disposed in the server 10, and the database stores a default rights file and a dedicated rights file, where the default rights file, that is, the default rights file, is a default rights file that an application software provider pre-sets in the server 10 for controlling the terminal device 20 so that the application software installed in the terminal device 20 grants a default right. The dedicated permission file, that is, the dedicated license file, is an authorization file corresponding to the application software generated according to the record information after the server 10 receives the record information of the application software, where the record information is generated after a user purchases the corresponding permission of the application software and fills in the corresponding identity tag of the application software and the MAC address information of the terminal device where the application software is installed.
The license file is a configuration file or field editable at the server, and specifically, the license file may be a simple field, such as "0 x 00" or "0 x 01", for simply controlling whether the application software can run. Or a series of complex field combinations for controlling different rights of the application software.
The registration information may be transmitted to the server 10 through the terminal device 20 that installs the application software, or may be transmitted to the server 10 through a third party terminal device. After receiving the filing information, the server 10 binds the MAC address corresponding to the terminal device 20 and the application authority that the terminal device 20 should have according to the filing information to generate a corresponding dedicated authority file, that is, a corresponding dedicated license file, and stores the dedicated license file in the database. Therefore, when the application software runs in the terminal device 20, the server 10 controls the purpose of configuring different authorities for the corresponding application software for different terminal devices installed by the application software according to the special authority file and the default authority file of the database, thereby realizing the management of different authorities of the application software.
Referring to fig. 2, fig. 2 provides a method for managing the authority of application software, which is applied to a server 10, and the method for managing the authority of application software includes:
step S1: and acquiring the MAC address information of the terminal equipment provided with the application software.
The terminal device 20 is installed with application software, which may be product flat design software, product three-dimensional design software, drawing software, or file or data processing software, and is not limited herein.
After the application software is started, the application software obtains Media Access Control (MAC) address information of the current terminal device 20, and uploads the MAC address information to the server 10 in communication connection with the terminal device 20 through the terminal device 20, so as to query whether the server 10 has a dedicated rights file, that is, a dedicated license file, corresponding to the terminal device 20.
Step S2: and inquiring whether a special authority file corresponding to the MAC address information exists in a database, wherein the special authority file is an authorization file corresponding to the application software generated according to the record information after the record information of the application software is received by the server.
For example, when the application software is released, a default license file, that is, a default permission file, is preset on the server 10, and is used to perform unified management on the terminal device 20 that uses the application software for the first time.
When the user needs further rights to use the application software, a corresponding fee is paid to purchase the corresponding rights. In this embodiment, an example will be described in which a user purchases a corresponding right through the terminal device 20 that installs application software.
After a user purchases the usage right of the application software through the terminal device 20 for payment, the terminal device 20 generates an identity tag of the application software and an MAC address information entry form of the terminal device 20 in which the application software is installed, and after the user completes the filling of the MAC address information of the terminal device 20 in which the identity tag of the application software is installed and triggers a completion instruction through an input device such as a keyboard, a mouse, a touch screen, and the like, the terminal device 20 generates corresponding filing information according to the application software right purchased by the user, the identity tag of the application software, and the MAC address information, and sends the corresponding filing information to the server 10, so that the server 10 generates a dedicated right file corresponding to the terminal device 20 according to the filing information sent by the terminal device 20.
Both the default rights file and the dedicated rights file are stored in a database.
Step S3: and if the special permission file corresponding to the MAC address information does not exist in the database, controlling the terminal equipment to configure corresponding default permission for the application software according to a preset default permission file.
Referring to fig. 3A, the controlling the terminal device to configure the corresponding default permission for the application software according to the preset default permission file specifically includes:
step S31: calling a preset default authority file and generating default authority information according to the default authority file;
as shown in fig. 3B, the invoking a preset default permission file and generating default permission information according to the default permission file specifically includes:
step S311: calling a preset default authority file and judging whether the terminal equipment has the authority to operate the application software according to the MAC address information and the default authority file;
step S312: and if the terminal equipment has the authority to operate the application software, generating the default authority information according to the default authority file.
Step S313: and if the terminal equipment does not have the authority to operate the application software, ending the process.
Step S32: and sending the default permission information to the terminal equipment so that the terminal equipment configures corresponding default permission for the application software according to the default permission information.
For example, the server 10 does not query a dedicated permission file, that is, a dedicated license file, corresponding to the MAC address information in the database according to the MAC address information of the terminal device 20, and then calls a preset default permission file, that is, a default license file, where the default permission file may set an initial permission for the application software, for example, the trial period of the application software is 30 days.
The server 10 determines whether the terminal device 20 has the authority to run the application software according to the default authority file, and generates a corresponding tag, and if the terminal device 20 has the authority to run, generates a corresponding tag that can be run, such as "1"; if the operation is not authorized, a corresponding non-operable label is generated, such as '0'.
If the server 10 determines that the terminal device 20 has the authority to run the application software, the default authority information is generated according to the default authority file and is sent to the terminal device 20, so that the terminal device 20 configures the default authority for the application software after receiving the default authority information.
If the server 10 determines that the terminal device 20 does not have the authority to run the application software, the terminal device 20 does not receive the authority information, cannot configure the authority for the application software, cannot run the application software on the terminal device 20, and the process is ended.
Step S4: and if the special authority file corresponding to the MAC address information exists in the database, controlling the terminal equipment to configure corresponding special authority for the application software according to the special authority file.
Referring to fig. 4A, in some embodiments, the controlling the terminal device to configure the corresponding dedicated permission for the application software according to the dedicated permission file specifically includes:
step S41: and calling the special authority file and generating special authority information according to the special authority file.
As shown in fig. 4B, the invoking the special permission file and generating special permission information according to the special permission file specifically includes:
step S411: calling the special authority file and acquiring the authority level of the application software running on the terminal equipment according to the MAC address information and the special authority file;
step S412: and generating the special authority information corresponding to the authority level according to the special authority file and the authority level.
Step S42: and sending the special permission information to the terminal equipment so that the terminal equipment configures corresponding special permission for the application software according to the special permission information.
Exemplarily, if the server 10 queries a dedicated permission file, that is, a dedicated license file, corresponding to the MAC address information in a database according to the MAC address information of the terminal device 20, calls the dedicated permission file corresponding to the MAC address information, obtains a permission level of the application software running on the terminal device 20 according to the MAC address information and the dedicated permission file, generates the dedicated permission information corresponding to the permission level according to the dedicated permission file and the permission level, and sends the dedicated permission information to the terminal device 20, so that the terminal device 20 configures a corresponding dedicated permission for the application software according to the dedicated permission information.
As shown in fig. 1, it is assumed that the authority corresponding to the terminal device 20 whose MAC address information is MAC1 is the default authority. The authority corresponding to the terminal device 20 whose MAC address information is MAC2 is authority level 1, and the server 10 generates a corresponding dedicated authority file a according to MAC 2. The authority corresponding to the terminal device 20 whose MAC address information is MAC3 is authority level 2, and the server 10 generates a corresponding dedicated authority file B according to MAC 3.
If the MAC address information of the terminal device 20 received by the server 10 is MAC2, a dedicated permission file a is queried according to the MAC address information, the permission level of the application software running on the terminal device 20 is acquired through the dedicated permission file a and is permission level 1, then corresponding dedicated permission information is generated according to the dedicated permission file a and the permission level 1 and is sent to the terminal device 20, after receiving the dedicated permission information, the terminal device 20 configures the corresponding permission level 1 for the application software installed on the terminal device 20 whose MAC address information is MAC2, and thus management of permission of the application software installed in the terminal device 20 is achieved.
Referring to fig. 5, the present application further provides an application software rights management apparatus 101, which is applied to a server 10, where the application software rights management apparatus 101 includes:
an address acquisition module 1011 configured to acquire MAC address information of a terminal device in which application software is installed;
a file query module 1012, configured to query, in a database, whether a special permission file corresponding to the MAC address information exists, where the special permission file is an authorization file corresponding to the application software generated according to the record information after the server receives the record information of the application software;
a default permission module 1013, configured to, if there is no dedicated permission file corresponding to the MAC address information in the database, control the terminal device to configure a corresponding default permission for the application software according to a preset default permission file;
and the special permission module 1014 is configured to, if the special permission file corresponding to the MAC address information exists in the database, control the terminal device to configure a corresponding special permission for the application software according to the special permission file.
In some embodiments, the default permission module 1013 is further configured to:
calling a preset default authority file and generating default authority information according to the default authority file;
and sending the default permission information to the terminal equipment so that the terminal equipment configures corresponding default permission for the application software according to the default permission information.
In some embodiments, the default permission module 1013 is further configured to:
calling a preset default authority file and judging whether the terminal equipment has the authority to operate the application software according to the MAC address information and the default authority file;
and if the terminal equipment has the authority to operate the application software, generating the default authority information according to the default authority file.
In some embodiments, the exclusive rights module 1014 is further operable to:
calling the special authority file and generating special authority information according to the special authority file;
and sending the special permission information to the terminal equipment so that the terminal equipment configures corresponding special permission for the application software according to the special permission information.
In some embodiments, the exclusive rights module 1014 is further operable to:
calling the special authority file and acquiring the authority level of the application software running on the terminal equipment according to the MAC address information and the special authority file;
and generating the special authority information corresponding to the authority level according to the special authority file and the authority level.
Referring to fig. 6, the present application further provides a server 30, where the server 30 includes a memory 302 and a processor 303, where the memory 302 is communicatively connected to the processor 303.
The memory 302 includes at least one type of readable storage medium, which includes flash memory, hard disk, multi-media card, card-type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, and the like. The memory 302 may be an internal storage unit of the server 30 in some embodiments, such as a hard disk of the server 30. The memory 302 may also be an external storage device of the server 30 in other embodiments, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), etc. provided on the server 30. The memory 302 may be used not only to store the application program and various data installed in the server 30, such as codes of a computer-readable program, but also to temporarily store data that has been output or will be output, that is, the first memory may be used as a storage medium storing a rights management program of application software executable by a computer.
The processor 303 may be a Central Processing Unit (CPU), a controller, a microcontroller, a microprocessor or other data Processing chip in some embodiments, and the processor 303 may call a rights management program of the application software stored in the memory 302 to implement the following method steps:
acquiring MAC address information of terminal equipment provided with application software;
inquiring whether a special authority file corresponding to the MAC address information exists in a database, wherein the special authority file is an authorization file corresponding to the application software generated according to the record information after the record information of the application software is received by the server;
if the special permission file corresponding to the MAC address information does not exist in the database, controlling the terminal equipment to configure corresponding default permission for the application software according to a preset default permission file;
and if the special authority file corresponding to the MAC address information exists in the database, controlling the terminal equipment to configure corresponding special authority for the application software according to the special authority file.
In some embodiments, the processor 303 is further configured to implement the following method steps:
calling a preset default authority file and generating default authority information according to the default authority file;
and sending the default permission information to the terminal equipment so that the terminal equipment configures corresponding default permission for the application software according to the default permission information.
In some embodiments, the processor 303 is further configured to implement the following method steps:
calling a preset default authority file and judging whether the terminal equipment has the authority to operate the application software according to the MAC address information and the default authority file;
and if the terminal equipment has the authority to operate the application software, generating the default authority information according to the default authority file.
In some embodiments, the processor 303 is further configured to implement the following method steps:
calling the special authority file and generating special authority information according to the special authority file;
and sending the special permission information to the terminal equipment so that the terminal equipment configures corresponding special permission for the application software according to the special permission information.
In some embodiments, the processor 303 is further configured to implement the following method steps:
calling the special authority file and acquiring the authority level of the application software running on the terminal equipment according to the MAC address information and the special authority file;
and generating the special authority information corresponding to the authority level according to the special authority file and the authority level.
The application also provides a storage medium, which can be applied to a server, wherein the storage medium stores a computer-executable authority management program of application software, and when the processor calls the authority management program of the application software, the processor can execute the following steps of the authority management method of the application software:
acquiring MAC address information of terminal equipment provided with application software;
inquiring whether a special authority file corresponding to the MAC address information exists in a database, wherein the special authority file is an authorization file corresponding to the application software generated according to the record information after the record information of the application software is received by the server;
if the special permission file corresponding to the MAC address information does not exist in the database, controlling the terminal equipment to configure corresponding default permission for the application software according to a preset default permission file;
and if the special authority file corresponding to the MAC address information exists in the database, controlling the terminal equipment to configure corresponding special authority for the application software according to the special authority file.
In some embodiments, the processor is further configured to implement the following method steps:
calling a preset default authority file and generating default authority information according to the default authority file;
and sending the default permission information to the terminal equipment so that the terminal equipment configures corresponding default permission for the application software according to the default permission information.
In some embodiments, the processor is further configured to implement the following method steps:
calling a preset default authority file and judging whether the terminal equipment has the authority to operate the application software according to the MAC address information and the default authority file;
and if the terminal equipment has the authority to operate the application software, generating the default authority information according to the default authority file.
In some embodiments, the processor is further configured to implement the following method steps:
calling the special authority file and generating special authority information according to the special authority file;
and sending the special permission information to the terminal equipment so that the terminal equipment configures corresponding special permission for the application software according to the special permission information.
In some embodiments, the processor is further configured to implement the following method steps:
calling the special authority file and acquiring the authority level of the application software running on the terminal equipment according to the MAC address information and the special authority file;
and generating the special authority information corresponding to the authority level according to the special authority file and the authority level.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (10)

1. A method for managing authority of application software is applied to a server, and is characterized in that the method comprises the following steps:
acquiring Media Access Control (MAC) address information of terminal equipment provided with application software;
inquiring whether a special authority file corresponding to the MAC address information exists in a database, wherein the special authority file is an authorization file corresponding to the application software generated according to the record information after the record information of the application software is received by the server;
if the special permission file corresponding to the MAC address information does not exist in the database, controlling the terminal equipment to configure corresponding default permission for the application software according to a preset default permission file;
and if the special authority file corresponding to the MAC address information exists in the database, controlling the terminal equipment to configure corresponding special authority for the application software according to the special authority file.
2. The method of claim 1, wherein the controlling the terminal device to configure the corresponding default permission for the application software according to the preset default permission file specifically comprises:
calling a preset default authority file and generating default authority information according to the default authority file;
and sending the default permission information to the terminal equipment so that the terminal equipment configures corresponding default permission for the application software according to the default permission information.
3. The method of claim 2, wherein the invoking a preset default permission file and generating default permission information according to the default permission file specifically comprises:
calling a preset default authority file and judging whether the terminal equipment has the authority to operate the application software according to the MAC address information and the default authority file;
and if the terminal equipment has the authority to operate the application software, generating the default authority information according to the default authority file.
4. The method of claim 1, wherein the controlling the terminal device to configure the corresponding dedicated permission for the application software according to the dedicated permission file specifically comprises:
calling the special authority file and generating special authority information according to the special authority file;
and sending the special permission information to the terminal equipment so that the terminal equipment configures corresponding special permission for the application software according to the special permission information.
5. The method of claim 4, wherein the invoking the dedicated rights file and generating the dedicated rights information according to the dedicated rights file specifically comprises:
calling the special authority file and acquiring the authority level of the application software running on the terminal equipment according to the MAC address information and the special authority file;
and generating the special authority information corresponding to the authority level according to the special authority file and the authority level.
6. An authority management device of application software, applied to a server, the authority management device comprising:
the address acquisition module is used for acquiring the MAC address information of the terminal equipment provided with the application software;
the file query module is used for querying whether a special authority file corresponding to the MAC address information exists in a database, wherein the special authority file is an authorization file corresponding to the application software generated according to the record information after the server receives the record information of the application software;
the default permission module is used for controlling the terminal equipment to configure corresponding default permission for the application software according to a preset default permission file if the special permission file corresponding to the MAC address information does not exist in the database;
and the special permission module is used for controlling the terminal equipment to configure corresponding special permission for the application software according to the special permission file if the special permission file corresponding to the MAC address information exists in the database.
7. The rights management apparatus of claim 6, wherein the default rights module is further to:
calling a preset default authority file and generating default authority information according to the default authority file;
and sending the default permission information to the terminal equipment so that the terminal equipment configures corresponding default permission for the application software according to the default permission information.
8. The rights management apparatus of claim 7, wherein the default rights module is further to:
calling a preset default authority file and judging whether the terminal equipment has the authority to operate the application software according to the MAC address information and the default authority file;
and if the terminal equipment has the authority to operate the application software, generating the default authority information according to the default authority file.
9. A server, characterized in that the server comprises:
a memory for storing a computer executable rights management program; and
a processor for invoking a rights management program stored in the memory to perform the rights management method of any of claims 1-5.
10. A storage medium storing a computer-executable rights management program, wherein a processor executes the rights management method according to any one of claims 1 to 5 when the processor calls the rights management program.
CN201911088450.XA 2019-11-08 2019-11-08 Application software authority management method and device, server and storage medium Active CN111143782B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911088450.XA CN111143782B (en) 2019-11-08 2019-11-08 Application software authority management method and device, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911088450.XA CN111143782B (en) 2019-11-08 2019-11-08 Application software authority management method and device, server and storage medium

Publications (2)

Publication Number Publication Date
CN111143782A true CN111143782A (en) 2020-05-12
CN111143782B CN111143782B (en) 2023-02-28

Family

ID=70517054

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911088450.XA Active CN111143782B (en) 2019-11-08 2019-11-08 Application software authority management method and device, server and storage medium

Country Status (1)

Country Link
CN (1) CN111143782B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112966226A (en) * 2021-03-05 2021-06-15 山东英信计算机技术有限公司 License authorization method, device, equipment and readable medium for application software
CN113806786A (en) * 2021-11-18 2021-12-17 北京持安科技有限公司 Software authorization management method, system, equipment and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101527734A (en) * 2009-04-16 2009-09-09 广州市易票联电子商务有限公司 Method for obtaining target address as well as method, device and system for controlling user privilege
US20100322260A1 (en) * 2009-06-18 2010-12-23 Alaxala Networks Corporation Switch, network system and traffic movement method
CN102611681A (en) * 2011-11-25 2012-07-25 无锡华御信息技术有限公司 Enterprise and public institution information leakage preventing method based on cloud architecture
US20130198864A1 (en) * 2012-01-27 2013-08-01 Microsoft Corporation Licensing for services
CN104065531A (en) * 2014-06-16 2014-09-24 国家电网公司 Switch port monitoring system
CN104751025A (en) * 2013-12-30 2015-07-01 杭州华三通信技术有限公司 License control method and License control device
CN106059802A (en) * 2016-05-25 2016-10-26 杭州华三通信技术有限公司 Terminal access authentication method and device
CN108520177A (en) * 2018-04-11 2018-09-11 厦门美图移动科技有限公司 Application software management method, device, mobile terminal and readable storage medium storing program for executing
CN108664786A (en) * 2018-04-24 2018-10-16 Oppo广东移动通信有限公司 Authority configuring method, mobile terminal, server and the storage medium of application program
CN108664771A (en) * 2017-03-28 2018-10-16 鸿富锦精密电子(天津)有限公司 Security system for software and method
CN108833268A (en) * 2018-06-19 2018-11-16 重庆邮电大学 A kind of control system and operation method of family wireless Sensor Network variable description equipment

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101527734A (en) * 2009-04-16 2009-09-09 广州市易票联电子商务有限公司 Method for obtaining target address as well as method, device and system for controlling user privilege
US20100322260A1 (en) * 2009-06-18 2010-12-23 Alaxala Networks Corporation Switch, network system and traffic movement method
CN102611681A (en) * 2011-11-25 2012-07-25 无锡华御信息技术有限公司 Enterprise and public institution information leakage preventing method based on cloud architecture
US20130198864A1 (en) * 2012-01-27 2013-08-01 Microsoft Corporation Licensing for services
CN104751025A (en) * 2013-12-30 2015-07-01 杭州华三通信技术有限公司 License control method and License control device
CN104065531A (en) * 2014-06-16 2014-09-24 国家电网公司 Switch port monitoring system
CN106059802A (en) * 2016-05-25 2016-10-26 杭州华三通信技术有限公司 Terminal access authentication method and device
CN108664771A (en) * 2017-03-28 2018-10-16 鸿富锦精密电子(天津)有限公司 Security system for software and method
CN108520177A (en) * 2018-04-11 2018-09-11 厦门美图移动科技有限公司 Application software management method, device, mobile terminal and readable storage medium storing program for executing
CN108664786A (en) * 2018-04-24 2018-10-16 Oppo广东移动通信有限公司 Authority configuring method, mobile terminal, server and the storage medium of application program
CN108833268A (en) * 2018-06-19 2018-11-16 重庆邮电大学 A kind of control system and operation method of family wireless Sensor Network variable description equipment

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
BENJAMIN VENELLE等: "Security Enhanced Java: Mandatory Access Control for the Java Virtual Machine", 《16TH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT/COMPONENT/SERVICE-ORIENTED REAL-TIME DISTRIBUTED COMPUTING (ISORC 2013)》 *
刘智等: "一种面向PDM系统基于权限位的访问控制方法", 《计算机工程与科学》 *
苏朋程等: "一种分级权限管理方案的实现", 《信息技术与信息化》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112966226A (en) * 2021-03-05 2021-06-15 山东英信计算机技术有限公司 License authorization method, device, equipment and readable medium for application software
CN113806786A (en) * 2021-11-18 2021-12-17 北京持安科技有限公司 Software authorization management method, system, equipment and storage medium
CN113806786B (en) * 2021-11-18 2022-03-18 北京持安科技有限公司 Software authorization management method, system, equipment and storage medium

Also Published As

Publication number Publication date
CN111143782B (en) 2023-02-28

Similar Documents

Publication Publication Date Title
US8942672B2 (en) Mobile integrated distribution and transaction system and method for NFC services, and a mobile electronic device thereof
JP5867635B2 (en) Tag management system, tag management method, information providing system, information providing method, and devices used therefor
CN109241700B (en) Licensing system for computer systems and server systems and methods therefor
CN109460373A (en) A kind of data sharing method, terminal device and storage medium
WO2005124560A1 (en) Information management device and information management method
CN111143782B (en) Application software authority management method and device, server and storage medium
JP6923582B2 (en) Information processing equipment, information processing methods, and programs
CN107871062A (en) A kind of application permission control method, device and terminal
CN107506637A (en) Information displaying method and device, terminal and readable storage medium storing program for executing
CN112511653A (en) Service authority activation method, configuration method and registration method of Internet of things equipment
CN109271211A (en) Method, apparatus of attending to anything else, equipment and the medium of application program
CN110619221B (en) Virtual authorization method, device, terminal equipment and storage medium
EP2232402B1 (en) Method for moving rights object and method for managing rights of issuing rights object and system thereof
CN113434766B (en) Subscription information pushing method and device, storage medium and electronic device
CN113115435B (en) Activation processing method, device, equipment and storage medium
CN108140074A (en) Specific feature permission is applied in management
CN112437079B (en) Intranet access method and device
CN112434347B (en) Rental business processing method, device, equipment and system
CN113626787A (en) Equipment fingerprint generation method and related equipment
CN105868603A (en) Configuration data based fingerprinting for access to a resource
CN103984884A (en) Method and system for licensing software
EP3017394A2 (en) A moblie integrated distribution and transaction system and method for nfc services, and a mobile electronic device thereof
CN116755842B (en) Identity verification system deployment method, device, equipment and storage medium
CN112235784B (en) vSIM-based code number management method, device and equipment
US20230246836A1 (en) Method for cryptographically linking a physical object that has an NFC tag associated therewith to a digital version of the physical object using an NFT

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant