CN111143782A - Authority management method and device of application software, server and storage medium - Google Patents
Authority management method and device of application software, server and storage medium Download PDFInfo
- Publication number
- CN111143782A CN111143782A CN201911088450.XA CN201911088450A CN111143782A CN 111143782 A CN111143782 A CN 111143782A CN 201911088450 A CN201911088450 A CN 201911088450A CN 111143782 A CN111143782 A CN 111143782A
- Authority
- CN
- China
- Prior art keywords
- authority
- file
- application software
- default
- permission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000007726 management method Methods 0.000 title claims description 28
- 238000000034 method Methods 0.000 claims abstract description 34
- 238000013475 authorization Methods 0.000 claims abstract description 12
- 101100244969 Arabidopsis thaliana PRL1 gene Proteins 0.000 description 3
- 102100039558 Galectin-3 Human genes 0.000 description 3
- 101100454448 Homo sapiens LGALS3 gene Proteins 0.000 description 3
- 101150051246 MAC2 gene Proteins 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 2
- 101100059544 Arabidopsis thaliana CDC5 gene Proteins 0.000 description 1
- 101150115300 MAC1 gene Proteins 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000008094 contradictory effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/618—Details of network addresses
- H04L2101/622—Layer-2 addresses, e.g. medium access control [MAC] addresses
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The application discloses a method, a device, a server and a storage medium for managing the authority of application software, wherein the method is applied to the server and comprises the following steps: acquiring MAC address information of terminal equipment provided with application software; inquiring whether a special authority file corresponding to the MAC address information exists in a database, wherein the special authority file is an authorization file corresponding to the application software generated according to the record information after the record information of the application software is received by the server; if the special permission file corresponding to the MAC address information does not exist in the database, controlling the terminal equipment to configure corresponding default permission for the application software according to a preset default permission file; and if the special authority file corresponding to the MAC address information exists in the database, controlling the terminal equipment to configure corresponding special authority for the application software according to the special authority file.
Description
Technical Field
The present application relates to the field of rights management technologies, and in particular, to a method, an apparatus, a server, and a storage medium for rights management of application software.
Background
Today, terminal devices such as mobile phones, notebook computers, tablets and the like become necessary components of partial human lives, various application software capable of helping users to process various files, product designs or data becomes a pet of the users.
The application software provider can obtain corresponding rewards for the software developed by the application software provider, and in many application scenarios, the application software provider needs to control the use permission of the application software user. For example, to achieve the purpose of charging, the user may try for a certain period of time, and after the trial period, the user needs to pay to use the fee, or use higher-level functions after paying the fee. Currently, most software products require special hardware (such as a "dongle") to authorize the application software, so that the corresponding application software provided by a manufacturer can be run by having the dongle. If a complex encryption strategy is adopted, although the purpose of authority control can be achieved, the software operation efficiency is reduced.
Therefore, how to manage the application authority of the application software more conveniently is a topic that those skilled in the art are studying.
Disclosure of Invention
The application mainly aims to provide an application software authority management method, an application software authority management device, a server and a storage medium, and aims to provide a convenient and efficient application software authority management method.
In order to achieve the above object, the present application provides a method for managing rights of application software, which is applied to a server, and the method includes:
acquiring Media Access Control (MAC) address information of terminal equipment provided with application software;
inquiring whether a special authority file corresponding to the MAC address information exists in a database, wherein the special authority file is an authorization file corresponding to the application software generated according to the record information after the record information of the application software is received by the server;
if the special permission file corresponding to the MAC address information does not exist in the database, controlling the terminal equipment to configure corresponding default permission for the application software according to a preset default permission file;
and if the special authority file corresponding to the MAC address information exists in the database, controlling the terminal equipment to configure corresponding special authority for the application software according to the special authority file.
Preferably, the controlling the terminal device to configure the corresponding default permission for the application software according to the preset default permission file specifically includes:
calling a preset default authority file and generating default authority information according to the default authority file;
and sending the default permission information to the terminal equipment so that the terminal equipment configures corresponding default permission for the application software according to the default permission information.
Preferably, the invoking a preset default permission file and generating default permission information according to the default permission file specifically include:
calling a preset default authority file and judging whether the terminal equipment has the authority to operate the application software according to the MAC address information and the default authority file;
and if the terminal equipment has the authority to operate the application software, generating the default authority information according to the default authority file.
Preferably, the controlling the terminal device to configure the corresponding special permission for the application software according to the special permission file specifically includes:
calling the special authority file and generating special authority information according to the special authority file;
and sending the special permission information to the terminal equipment so that the terminal equipment configures corresponding special permission for the application software according to the special permission information.
Preferably, the invoking the special authority file and generating special authority information according to the special authority file specifically include:
calling the special authority file and acquiring the authority level of the application software running on the terminal equipment according to the MAC address information and the special authority file;
and generating the special authority information corresponding to the authority level according to the special authority file and the authority level.
The application further provides an authority management device of application software, which is applied to a server, and the authority management device comprises:
the address acquisition module is used for acquiring the MAC address information of the terminal equipment provided with the application software;
the file query module is used for querying whether a special authority file corresponding to the MAC address information exists in a database, wherein the special authority file is an authorization file corresponding to the application software generated according to the record information after the server receives the record information of the application software;
the default permission module is used for controlling the terminal equipment to configure corresponding default permission for the application software according to a preset default permission file if the special permission file corresponding to the MAC address information does not exist in the database;
and the special permission module is used for controlling the terminal equipment to configure corresponding special permission for the application software according to the special permission file if the special permission file corresponding to the MAC address information exists in the database.
Preferably, the default permission module is further configured to:
calling a preset default authority file and generating default authority information according to the default authority file;
and sending the default permission information to the terminal equipment so that the terminal equipment configures corresponding default permission for the application software according to the default permission information.
Preferably, the default permission module is further configured to:
calling a preset default authority file and judging whether the terminal equipment has the authority to operate the application software according to the MAC address information and the default authority file;
and if the terminal equipment has the authority to operate the application software, generating the default authority information according to the default authority file.
Preferably, the dedicated rights module is further configured to:
calling the special authority file and generating special authority information according to the special authority file;
and sending the special permission information to the terminal equipment so that the terminal equipment configures corresponding special permission for the application software according to the special permission information.
Preferably, the dedicated rights module is further configured to:
calling the special authority file and acquiring the authority level of the application software running on the terminal equipment according to the MAC address information and the special authority file;
and generating the special authority information corresponding to the authority level according to the special authority file and the authority level.
The present application further provides a server, comprising:
a memory for storing a computer executable rights management program; and
and the processor is used for calling the authority management program stored in the memory to execute the authority management method.
The application also provides a storage medium, wherein the storage medium stores a computer-executable authority management program, and the processor can execute the authority management method when calling the authority management program.
The authority management method is applied to a server, and the method comprises the steps of obtaining MAC address information of terminal equipment provided with application software; inquiring whether a special authority file corresponding to the MAC address information exists in a database, wherein the special authority file is an authorization file corresponding to the application software generated according to the record information after the record information of the application software is received by the server; if the special permission file corresponding to the MAC address information does not exist in the database, controlling the terminal equipment to configure corresponding default permission for the application software according to the default permission file; and if the special authority file corresponding to the MAC address information exists in the database, controlling the terminal equipment to configure corresponding special authority for the application software according to the special authority file. After the application software is installed in the terminal equipment, the binding filing information of the terminal equipment and the application software is sent to the server, the server establishes a special permission file for the corresponding terminal equipment through the MAC address of the terminal equipment, so that the corresponding special permission can be configured for the application software installed in the terminal equipment by controlling the corresponding terminal equipment, and meanwhile, when the terminal equipment which is not filed uses the application software, the server calls the default permission file to control the application software which is operated by the terminal equipment which is not filed to be configured with the default permission, so that the purpose of configuring different permissions for the application software through different terminal equipment installed by the application software is achieved.
Drawings
FIG. 1 is a framework diagram of a rights management system for application software provided herein;
FIG. 2 is a flowchart illustrating steps of a method for managing rights of application software provided by the present application;
FIG. 3A is a flowchart illustrating sub-steps of step S3 in FIG. 2;
FIG. 3B is a flowchart illustrating sub-steps of step S31 in FIG. 3A;
FIG. 4A is a flowchart illustrating sub-steps of step S4 in FIG. 2;
FIG. 4B is a flowchart illustrating sub-steps of step S41 in FIG. 4A;
fig. 5 is a block diagram illustrating a structure of a rights management apparatus for application software according to an embodiment of the present application;
fig. 6 is a block diagram of a server according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims of the present application and in the drawings described above, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the descriptions in this application referring to "first", "second", etc. are for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present application.
The application provides a method, a device, a server and a storage medium for managing the authority of application software, wherein the method is applied to the server and is realized by acquiring MAC address information of terminal equipment provided with the application software; inquiring whether a special authority file corresponding to the MAC address information exists in a database, wherein the special authority file is an authorization file corresponding to the application software generated according to the record information after the record information of the application software is received by the server; if the special permission file corresponding to the MAC address information does not exist in the database, controlling the terminal equipment to configure corresponding default permission for the application software according to the default permission file; and if the special authority file corresponding to the MAC address information exists in the database, controlling the terminal equipment to configure corresponding special authority for the application software according to the special authority file. After the application software is installed in the terminal equipment, the binding filing information of the terminal equipment and the application software is sent to the server, the server establishes a special permission file for the corresponding terminal equipment through the MAC address of the terminal equipment, so that the corresponding special permission can be configured for the application software installed in the terminal equipment by controlling the corresponding terminal equipment, and meanwhile, when the terminal equipment which is not filed uses the application software, the server calls the default permission file to control the application software which is operated by the terminal equipment which is not filed to be configured with the default permission, so that the purpose of configuring different permissions for the application software through different terminal equipment installed by the application software is achieved.
Referring to fig. 1, fig. 1 is a rights management system 100 for application software provided by the present application, where the rights management system 100 for application software includes a server 10 and a terminal device 20 communicatively connected to the server 10, where a database is disposed in the server 10, and the database stores a default rights file and a dedicated rights file, where the default rights file, that is, the default rights file, is a default rights file that an application software provider pre-sets in the server 10 for controlling the terminal device 20 so that the application software installed in the terminal device 20 grants a default right. The dedicated permission file, that is, the dedicated license file, is an authorization file corresponding to the application software generated according to the record information after the server 10 receives the record information of the application software, where the record information is generated after a user purchases the corresponding permission of the application software and fills in the corresponding identity tag of the application software and the MAC address information of the terminal device where the application software is installed.
The license file is a configuration file or field editable at the server, and specifically, the license file may be a simple field, such as "0 x 00" or "0 x 01", for simply controlling whether the application software can run. Or a series of complex field combinations for controlling different rights of the application software.
The registration information may be transmitted to the server 10 through the terminal device 20 that installs the application software, or may be transmitted to the server 10 through a third party terminal device. After receiving the filing information, the server 10 binds the MAC address corresponding to the terminal device 20 and the application authority that the terminal device 20 should have according to the filing information to generate a corresponding dedicated authority file, that is, a corresponding dedicated license file, and stores the dedicated license file in the database. Therefore, when the application software runs in the terminal device 20, the server 10 controls the purpose of configuring different authorities for the corresponding application software for different terminal devices installed by the application software according to the special authority file and the default authority file of the database, thereby realizing the management of different authorities of the application software.
Referring to fig. 2, fig. 2 provides a method for managing the authority of application software, which is applied to a server 10, and the method for managing the authority of application software includes:
step S1: and acquiring the MAC address information of the terminal equipment provided with the application software.
The terminal device 20 is installed with application software, which may be product flat design software, product three-dimensional design software, drawing software, or file or data processing software, and is not limited herein.
After the application software is started, the application software obtains Media Access Control (MAC) address information of the current terminal device 20, and uploads the MAC address information to the server 10 in communication connection with the terminal device 20 through the terminal device 20, so as to query whether the server 10 has a dedicated rights file, that is, a dedicated license file, corresponding to the terminal device 20.
Step S2: and inquiring whether a special authority file corresponding to the MAC address information exists in a database, wherein the special authority file is an authorization file corresponding to the application software generated according to the record information after the record information of the application software is received by the server.
For example, when the application software is released, a default license file, that is, a default permission file, is preset on the server 10, and is used to perform unified management on the terminal device 20 that uses the application software for the first time.
When the user needs further rights to use the application software, a corresponding fee is paid to purchase the corresponding rights. In this embodiment, an example will be described in which a user purchases a corresponding right through the terminal device 20 that installs application software.
After a user purchases the usage right of the application software through the terminal device 20 for payment, the terminal device 20 generates an identity tag of the application software and an MAC address information entry form of the terminal device 20 in which the application software is installed, and after the user completes the filling of the MAC address information of the terminal device 20 in which the identity tag of the application software is installed and triggers a completion instruction through an input device such as a keyboard, a mouse, a touch screen, and the like, the terminal device 20 generates corresponding filing information according to the application software right purchased by the user, the identity tag of the application software, and the MAC address information, and sends the corresponding filing information to the server 10, so that the server 10 generates a dedicated right file corresponding to the terminal device 20 according to the filing information sent by the terminal device 20.
Both the default rights file and the dedicated rights file are stored in a database.
Step S3: and if the special permission file corresponding to the MAC address information does not exist in the database, controlling the terminal equipment to configure corresponding default permission for the application software according to a preset default permission file.
Referring to fig. 3A, the controlling the terminal device to configure the corresponding default permission for the application software according to the preset default permission file specifically includes:
step S31: calling a preset default authority file and generating default authority information according to the default authority file;
as shown in fig. 3B, the invoking a preset default permission file and generating default permission information according to the default permission file specifically includes:
step S311: calling a preset default authority file and judging whether the terminal equipment has the authority to operate the application software according to the MAC address information and the default authority file;
step S312: and if the terminal equipment has the authority to operate the application software, generating the default authority information according to the default authority file.
Step S313: and if the terminal equipment does not have the authority to operate the application software, ending the process.
Step S32: and sending the default permission information to the terminal equipment so that the terminal equipment configures corresponding default permission for the application software according to the default permission information.
For example, the server 10 does not query a dedicated permission file, that is, a dedicated license file, corresponding to the MAC address information in the database according to the MAC address information of the terminal device 20, and then calls a preset default permission file, that is, a default license file, where the default permission file may set an initial permission for the application software, for example, the trial period of the application software is 30 days.
The server 10 determines whether the terminal device 20 has the authority to run the application software according to the default authority file, and generates a corresponding tag, and if the terminal device 20 has the authority to run, generates a corresponding tag that can be run, such as "1"; if the operation is not authorized, a corresponding non-operable label is generated, such as '0'.
If the server 10 determines that the terminal device 20 has the authority to run the application software, the default authority information is generated according to the default authority file and is sent to the terminal device 20, so that the terminal device 20 configures the default authority for the application software after receiving the default authority information.
If the server 10 determines that the terminal device 20 does not have the authority to run the application software, the terminal device 20 does not receive the authority information, cannot configure the authority for the application software, cannot run the application software on the terminal device 20, and the process is ended.
Step S4: and if the special authority file corresponding to the MAC address information exists in the database, controlling the terminal equipment to configure corresponding special authority for the application software according to the special authority file.
Referring to fig. 4A, in some embodiments, the controlling the terminal device to configure the corresponding dedicated permission for the application software according to the dedicated permission file specifically includes:
step S41: and calling the special authority file and generating special authority information according to the special authority file.
As shown in fig. 4B, the invoking the special permission file and generating special permission information according to the special permission file specifically includes:
step S411: calling the special authority file and acquiring the authority level of the application software running on the terminal equipment according to the MAC address information and the special authority file;
step S412: and generating the special authority information corresponding to the authority level according to the special authority file and the authority level.
Step S42: and sending the special permission information to the terminal equipment so that the terminal equipment configures corresponding special permission for the application software according to the special permission information.
Exemplarily, if the server 10 queries a dedicated permission file, that is, a dedicated license file, corresponding to the MAC address information in a database according to the MAC address information of the terminal device 20, calls the dedicated permission file corresponding to the MAC address information, obtains a permission level of the application software running on the terminal device 20 according to the MAC address information and the dedicated permission file, generates the dedicated permission information corresponding to the permission level according to the dedicated permission file and the permission level, and sends the dedicated permission information to the terminal device 20, so that the terminal device 20 configures a corresponding dedicated permission for the application software according to the dedicated permission information.
As shown in fig. 1, it is assumed that the authority corresponding to the terminal device 20 whose MAC address information is MAC1 is the default authority. The authority corresponding to the terminal device 20 whose MAC address information is MAC2 is authority level 1, and the server 10 generates a corresponding dedicated authority file a according to MAC 2. The authority corresponding to the terminal device 20 whose MAC address information is MAC3 is authority level 2, and the server 10 generates a corresponding dedicated authority file B according to MAC 3.
If the MAC address information of the terminal device 20 received by the server 10 is MAC2, a dedicated permission file a is queried according to the MAC address information, the permission level of the application software running on the terminal device 20 is acquired through the dedicated permission file a and is permission level 1, then corresponding dedicated permission information is generated according to the dedicated permission file a and the permission level 1 and is sent to the terminal device 20, after receiving the dedicated permission information, the terminal device 20 configures the corresponding permission level 1 for the application software installed on the terminal device 20 whose MAC address information is MAC2, and thus management of permission of the application software installed in the terminal device 20 is achieved.
Referring to fig. 5, the present application further provides an application software rights management apparatus 101, which is applied to a server 10, where the application software rights management apparatus 101 includes:
an address acquisition module 1011 configured to acquire MAC address information of a terminal device in which application software is installed;
a file query module 1012, configured to query, in a database, whether a special permission file corresponding to the MAC address information exists, where the special permission file is an authorization file corresponding to the application software generated according to the record information after the server receives the record information of the application software;
a default permission module 1013, configured to, if there is no dedicated permission file corresponding to the MAC address information in the database, control the terminal device to configure a corresponding default permission for the application software according to a preset default permission file;
and the special permission module 1014 is configured to, if the special permission file corresponding to the MAC address information exists in the database, control the terminal device to configure a corresponding special permission for the application software according to the special permission file.
In some embodiments, the default permission module 1013 is further configured to:
calling a preset default authority file and generating default authority information according to the default authority file;
and sending the default permission information to the terminal equipment so that the terminal equipment configures corresponding default permission for the application software according to the default permission information.
In some embodiments, the default permission module 1013 is further configured to:
calling a preset default authority file and judging whether the terminal equipment has the authority to operate the application software according to the MAC address information and the default authority file;
and if the terminal equipment has the authority to operate the application software, generating the default authority information according to the default authority file.
In some embodiments, the exclusive rights module 1014 is further operable to:
calling the special authority file and generating special authority information according to the special authority file;
and sending the special permission information to the terminal equipment so that the terminal equipment configures corresponding special permission for the application software according to the special permission information.
In some embodiments, the exclusive rights module 1014 is further operable to:
calling the special authority file and acquiring the authority level of the application software running on the terminal equipment according to the MAC address information and the special authority file;
and generating the special authority information corresponding to the authority level according to the special authority file and the authority level.
Referring to fig. 6, the present application further provides a server 30, where the server 30 includes a memory 302 and a processor 303, where the memory 302 is communicatively connected to the processor 303.
The memory 302 includes at least one type of readable storage medium, which includes flash memory, hard disk, multi-media card, card-type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, and the like. The memory 302 may be an internal storage unit of the server 30 in some embodiments, such as a hard disk of the server 30. The memory 302 may also be an external storage device of the server 30 in other embodiments, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), etc. provided on the server 30. The memory 302 may be used not only to store the application program and various data installed in the server 30, such as codes of a computer-readable program, but also to temporarily store data that has been output or will be output, that is, the first memory may be used as a storage medium storing a rights management program of application software executable by a computer.
The processor 303 may be a Central Processing Unit (CPU), a controller, a microcontroller, a microprocessor or other data Processing chip in some embodiments, and the processor 303 may call a rights management program of the application software stored in the memory 302 to implement the following method steps:
acquiring MAC address information of terminal equipment provided with application software;
inquiring whether a special authority file corresponding to the MAC address information exists in a database, wherein the special authority file is an authorization file corresponding to the application software generated according to the record information after the record information of the application software is received by the server;
if the special permission file corresponding to the MAC address information does not exist in the database, controlling the terminal equipment to configure corresponding default permission for the application software according to a preset default permission file;
and if the special authority file corresponding to the MAC address information exists in the database, controlling the terminal equipment to configure corresponding special authority for the application software according to the special authority file.
In some embodiments, the processor 303 is further configured to implement the following method steps:
calling a preset default authority file and generating default authority information according to the default authority file;
and sending the default permission information to the terminal equipment so that the terminal equipment configures corresponding default permission for the application software according to the default permission information.
In some embodiments, the processor 303 is further configured to implement the following method steps:
calling a preset default authority file and judging whether the terminal equipment has the authority to operate the application software according to the MAC address information and the default authority file;
and if the terminal equipment has the authority to operate the application software, generating the default authority information according to the default authority file.
In some embodiments, the processor 303 is further configured to implement the following method steps:
calling the special authority file and generating special authority information according to the special authority file;
and sending the special permission information to the terminal equipment so that the terminal equipment configures corresponding special permission for the application software according to the special permission information.
In some embodiments, the processor 303 is further configured to implement the following method steps:
calling the special authority file and acquiring the authority level of the application software running on the terminal equipment according to the MAC address information and the special authority file;
and generating the special authority information corresponding to the authority level according to the special authority file and the authority level.
The application also provides a storage medium, which can be applied to a server, wherein the storage medium stores a computer-executable authority management program of application software, and when the processor calls the authority management program of the application software, the processor can execute the following steps of the authority management method of the application software:
acquiring MAC address information of terminal equipment provided with application software;
inquiring whether a special authority file corresponding to the MAC address information exists in a database, wherein the special authority file is an authorization file corresponding to the application software generated according to the record information after the record information of the application software is received by the server;
if the special permission file corresponding to the MAC address information does not exist in the database, controlling the terminal equipment to configure corresponding default permission for the application software according to a preset default permission file;
and if the special authority file corresponding to the MAC address information exists in the database, controlling the terminal equipment to configure corresponding special authority for the application software according to the special authority file.
In some embodiments, the processor is further configured to implement the following method steps:
calling a preset default authority file and generating default authority information according to the default authority file;
and sending the default permission information to the terminal equipment so that the terminal equipment configures corresponding default permission for the application software according to the default permission information.
In some embodiments, the processor is further configured to implement the following method steps:
calling a preset default authority file and judging whether the terminal equipment has the authority to operate the application software according to the MAC address information and the default authority file;
and if the terminal equipment has the authority to operate the application software, generating the default authority information according to the default authority file.
In some embodiments, the processor is further configured to implement the following method steps:
calling the special authority file and generating special authority information according to the special authority file;
and sending the special permission information to the terminal equipment so that the terminal equipment configures corresponding special permission for the application software according to the special permission information.
In some embodiments, the processor is further configured to implement the following method steps:
calling the special authority file and acquiring the authority level of the application software running on the terminal equipment according to the MAC address information and the special authority file;
and generating the special authority information corresponding to the authority level according to the special authority file and the authority level.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.
Claims (10)
1. A method for managing authority of application software is applied to a server, and is characterized in that the method comprises the following steps:
acquiring Media Access Control (MAC) address information of terminal equipment provided with application software;
inquiring whether a special authority file corresponding to the MAC address information exists in a database, wherein the special authority file is an authorization file corresponding to the application software generated according to the record information after the record information of the application software is received by the server;
if the special permission file corresponding to the MAC address information does not exist in the database, controlling the terminal equipment to configure corresponding default permission for the application software according to a preset default permission file;
and if the special authority file corresponding to the MAC address information exists in the database, controlling the terminal equipment to configure corresponding special authority for the application software according to the special authority file.
2. The method of claim 1, wherein the controlling the terminal device to configure the corresponding default permission for the application software according to the preset default permission file specifically comprises:
calling a preset default authority file and generating default authority information according to the default authority file;
and sending the default permission information to the terminal equipment so that the terminal equipment configures corresponding default permission for the application software according to the default permission information.
3. The method of claim 2, wherein the invoking a preset default permission file and generating default permission information according to the default permission file specifically comprises:
calling a preset default authority file and judging whether the terminal equipment has the authority to operate the application software according to the MAC address information and the default authority file;
and if the terminal equipment has the authority to operate the application software, generating the default authority information according to the default authority file.
4. The method of claim 1, wherein the controlling the terminal device to configure the corresponding dedicated permission for the application software according to the dedicated permission file specifically comprises:
calling the special authority file and generating special authority information according to the special authority file;
and sending the special permission information to the terminal equipment so that the terminal equipment configures corresponding special permission for the application software according to the special permission information.
5. The method of claim 4, wherein the invoking the dedicated rights file and generating the dedicated rights information according to the dedicated rights file specifically comprises:
calling the special authority file and acquiring the authority level of the application software running on the terminal equipment according to the MAC address information and the special authority file;
and generating the special authority information corresponding to the authority level according to the special authority file and the authority level.
6. An authority management device of application software, applied to a server, the authority management device comprising:
the address acquisition module is used for acquiring the MAC address information of the terminal equipment provided with the application software;
the file query module is used for querying whether a special authority file corresponding to the MAC address information exists in a database, wherein the special authority file is an authorization file corresponding to the application software generated according to the record information after the server receives the record information of the application software;
the default permission module is used for controlling the terminal equipment to configure corresponding default permission for the application software according to a preset default permission file if the special permission file corresponding to the MAC address information does not exist in the database;
and the special permission module is used for controlling the terminal equipment to configure corresponding special permission for the application software according to the special permission file if the special permission file corresponding to the MAC address information exists in the database.
7. The rights management apparatus of claim 6, wherein the default rights module is further to:
calling a preset default authority file and generating default authority information according to the default authority file;
and sending the default permission information to the terminal equipment so that the terminal equipment configures corresponding default permission for the application software according to the default permission information.
8. The rights management apparatus of claim 7, wherein the default rights module is further to:
calling a preset default authority file and judging whether the terminal equipment has the authority to operate the application software according to the MAC address information and the default authority file;
and if the terminal equipment has the authority to operate the application software, generating the default authority information according to the default authority file.
9. A server, characterized in that the server comprises:
a memory for storing a computer executable rights management program; and
a processor for invoking a rights management program stored in the memory to perform the rights management method of any of claims 1-5.
10. A storage medium storing a computer-executable rights management program, wherein a processor executes the rights management method according to any one of claims 1 to 5 when the processor calls the rights management program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911088450.XA CN111143782B (en) | 2019-11-08 | 2019-11-08 | Application software authority management method and device, server and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911088450.XA CN111143782B (en) | 2019-11-08 | 2019-11-08 | Application software authority management method and device, server and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111143782A true CN111143782A (en) | 2020-05-12 |
CN111143782B CN111143782B (en) | 2023-02-28 |
Family
ID=70517054
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911088450.XA Active CN111143782B (en) | 2019-11-08 | 2019-11-08 | Application software authority management method and device, server and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111143782B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112966226A (en) * | 2021-03-05 | 2021-06-15 | 山东英信计算机技术有限公司 | License authorization method, device, equipment and readable medium for application software |
CN113806786A (en) * | 2021-11-18 | 2021-12-17 | 北京持安科技有限公司 | Software authorization management method, system, equipment and storage medium |
CN114036491A (en) * | 2021-11-25 | 2022-02-11 | 京东方科技集团股份有限公司 | Software management method, system and storage medium |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101527734A (en) * | 2009-04-16 | 2009-09-09 | 广州市易票联电子商务有限公司 | Method for obtaining target address as well as method, device and system for controlling user privilege |
US20100322260A1 (en) * | 2009-06-18 | 2010-12-23 | Alaxala Networks Corporation | Switch, network system and traffic movement method |
CN102611681A (en) * | 2011-11-25 | 2012-07-25 | 无锡华御信息技术有限公司 | Enterprise and public institution information leakage preventing method based on cloud architecture |
US20130198864A1 (en) * | 2012-01-27 | 2013-08-01 | Microsoft Corporation | Licensing for services |
CN104065531A (en) * | 2014-06-16 | 2014-09-24 | 国家电网公司 | Switch port monitoring system |
CN104751025A (en) * | 2013-12-30 | 2015-07-01 | 杭州华三通信技术有限公司 | License control method and License control device |
CN106059802A (en) * | 2016-05-25 | 2016-10-26 | 杭州华三通信技术有限公司 | Terminal access authentication method and device |
CN108520177A (en) * | 2018-04-11 | 2018-09-11 | 厦门美图移动科技有限公司 | Application software management method and device, mobile terminal and readable storage medium |
CN108664786A (en) * | 2018-04-24 | 2018-10-16 | Oppo广东移动通信有限公司 | Authority configuring method, mobile terminal, server and the storage medium of application program |
CN108664771A (en) * | 2017-03-28 | 2018-10-16 | 鸿富锦精密电子(天津)有限公司 | Security system for software and method |
CN108833268A (en) * | 2018-06-19 | 2018-11-16 | 重庆邮电大学 | A kind of control system and operation method of family wireless Sensor Network variable description equipment |
-
2019
- 2019-11-08 CN CN201911088450.XA patent/CN111143782B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101527734A (en) * | 2009-04-16 | 2009-09-09 | 广州市易票联电子商务有限公司 | Method for obtaining target address as well as method, device and system for controlling user privilege |
US20100322260A1 (en) * | 2009-06-18 | 2010-12-23 | Alaxala Networks Corporation | Switch, network system and traffic movement method |
CN102611681A (en) * | 2011-11-25 | 2012-07-25 | 无锡华御信息技术有限公司 | Enterprise and public institution information leakage preventing method based on cloud architecture |
US20130198864A1 (en) * | 2012-01-27 | 2013-08-01 | Microsoft Corporation | Licensing for services |
CN104751025A (en) * | 2013-12-30 | 2015-07-01 | 杭州华三通信技术有限公司 | License control method and License control device |
CN104065531A (en) * | 2014-06-16 | 2014-09-24 | 国家电网公司 | Switch port monitoring system |
CN106059802A (en) * | 2016-05-25 | 2016-10-26 | 杭州华三通信技术有限公司 | Terminal access authentication method and device |
CN108664771A (en) * | 2017-03-28 | 2018-10-16 | 鸿富锦精密电子(天津)有限公司 | Security system for software and method |
CN108520177A (en) * | 2018-04-11 | 2018-09-11 | 厦门美图移动科技有限公司 | Application software management method and device, mobile terminal and readable storage medium |
CN108664786A (en) * | 2018-04-24 | 2018-10-16 | Oppo广东移动通信有限公司 | Authority configuring method, mobile terminal, server and the storage medium of application program |
CN108833268A (en) * | 2018-06-19 | 2018-11-16 | 重庆邮电大学 | A kind of control system and operation method of family wireless Sensor Network variable description equipment |
Non-Patent Citations (3)
Title |
---|
BENJAMIN VENELLE等: "Security Enhanced Java: Mandatory Access Control for the Java Virtual Machine", 《16TH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT/COMPONENT/SERVICE-ORIENTED REAL-TIME DISTRIBUTED COMPUTING (ISORC 2013)》 * |
刘智等: "一种面向PDM系统基于权限位的访问控制方法", 《计算机工程与科学》 * |
苏朋程等: "一种分级权限管理方案的实现", 《信息技术与信息化》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112966226A (en) * | 2021-03-05 | 2021-06-15 | 山东英信计算机技术有限公司 | License authorization method, device, equipment and readable medium for application software |
CN113806786A (en) * | 2021-11-18 | 2021-12-17 | 北京持安科技有限公司 | Software authorization management method, system, equipment and storage medium |
CN113806786B (en) * | 2021-11-18 | 2022-03-18 | 北京持安科技有限公司 | Software authorization management method, system, equipment and storage medium |
CN114036491A (en) * | 2021-11-25 | 2022-02-11 | 京东方科技集团股份有限公司 | Software management method, system and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN111143782B (en) | 2023-02-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111143782B (en) | Application software authority management method and device, server and storage medium | |
JP5867635B2 (en) | Tag management system, tag management method, information providing system, information providing method, and devices used therefor | |
US8942672B2 (en) | Mobile integrated distribution and transaction system and method for NFC services, and a mobile electronic device thereof | |
CN109241700B (en) | Licensing system for computer systems and server systems and methods therefor | |
CN109460373A (en) | A kind of data sharing method, terminal device and storage medium | |
WO2005124560A1 (en) | Information management device and information management method | |
CN112511653B (en) | Service authority activation method, configuration method and registration method of Internet of things equipment | |
JP6923582B2 (en) | Information processing equipment, information processing methods, and programs | |
CN107506637A (en) | Information displaying method and device, terminal and readable storage medium storing program for executing | |
CN107871062A (en) | A kind of application permission control method, device and terminal | |
CN109271211A (en) | Method, apparatus of attending to anything else, equipment and the medium of application program | |
CN113434766B (en) | Subscription information pushing method and device, storage medium and electronic device | |
CN110619221A (en) | Virtual authorization method, device, terminal equipment and storage medium | |
US20090165143A1 (en) | Method for moving rights object and method for managing rights of issuing rights object and system thereof | |
CN108140074A (en) | Specific feature permission is applied in management | |
CN112990783A (en) | Material allocation method, system, equipment and medium | |
CN113115435A (en) | Activation processing method, device, equipment and storage medium | |
CN112437079B (en) | Intranet access method and device | |
EP3017394A2 (en) | A moblie integrated distribution and transaction system and method for nfc services, and a mobile electronic device thereof | |
CN113626787A (en) | Equipment fingerprint generation method and related equipment | |
CN111736859B (en) | Version updating method of operating system, server and terminal | |
CN111008394A (en) | Vehicle data management method, device, terminal equipment, server and storage medium | |
CN106991336B (en) | File management method and device | |
CN103984884A (en) | Method and system for licensing software | |
KR20150101833A (en) | The software license authentication apparatus and the method of using the portable terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |