CN112286553B - User lock upgrading method, device, system, electronic equipment and storage medium - Google Patents

User lock upgrading method, device, system, electronic equipment and storage medium Download PDF

Info

Publication number
CN112286553B
CN112286553B CN202011164104.8A CN202011164104A CN112286553B CN 112286553 B CN112286553 B CN 112286553B CN 202011164104 A CN202011164104 A CN 202011164104A CN 112286553 B CN112286553 B CN 112286553B
Authority
CN
China
Prior art keywords
user
lock
upgrading
license
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011164104.8A
Other languages
Chinese (zh)
Other versions
CN112286553A (en
Inventor
孙吉平
刘荣华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senseshield Technology Co Ltd
Original Assignee
Beijing Senseshield Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Senseshield Technology Co Ltd filed Critical Beijing Senseshield Technology Co Ltd
Priority to CN202011164104.8A priority Critical patent/CN112286553B/en
Publication of CN112286553A publication Critical patent/CN112286553A/en
Application granted granted Critical
Publication of CN112286553B publication Critical patent/CN112286553B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the invention discloses a method, a device and a system for upgrading a user lock, electronic equipment and a storage medium. The method comprises the following steps: receiving an upgrading request of a user lock sent by a user terminal; based on the upgrading request, at least one permission upgrading packet corresponding to the user lock is sent to the user terminal, so that the user terminal upgrades the user lock based on the at least one permission upgrading packet; wherein the at least one license upgrade package is generated by the server invoking a control lock corresponding to the user lock; the control lock is physically connected with the server, or the control lock is a control lock module integrated in the server. The effect of upgrading the user lock quickly and conveniently is achieved.

Description

User lock upgrading method, device, system, electronic equipment and storage medium
Technical Field
The embodiment of the invention relates to computer security technology, in particular to a method, a device and a system for upgrading a user lock, electronic equipment and a storage medium.
Background
Some software developers currently on the market employ hardware locks to protect the software products they develop when releasing formal software products. The hardware lock comprises a control lock and a user lock, wherein the control lock is mastered by a software developer and used for encrypting the software, issuing the license and issuing the license upgrading file, and the user lock is used for storing the license issued by the software developer. When the software developer provides the application software for the user, a user lock is also provided in a matching way for matching with the application software. The user downloads the encrypted software of the software developer from the terminal equipment, and can decrypt the encrypted software only by plugging the user lock, so that the software can be normally used. However, the license file in the user lock may fail, for example, some license files have a use period, and when the use period is exceeded, the user lock needs to be upgraded, and the software can be normally used. Thus, the issuance and upgrading of permissions for user locks is crucial to the user.
At present, the common way to upgrade the user lock is: controlling the lock to be at a software developer, and confirming user lock information to be upgraded by the software developer according to the sales record of the software developer and the communication of an end user, or requiring the end user to export local user lock information into a file through a tool and then delivering the file to the software developer; the software developer sends out a permission upgrading file through the control lock according to the obtained user lock information, and then delivers the permission upgrading file to the final user (through mails, instant communication tools and the like); and finally, the end user upgrades the received license upgrading file to the user lock through the local tool.
The upgrading mode of the user lock easily causes the problems of untimely issuance and long time consumption.
Disclosure of Invention
The embodiment of the invention provides a method, a device, a system, electronic equipment and a storage medium for upgrading a user lock, so as to realize the effect of quickly and conveniently upgrading the user lock.
In a first aspect, an embodiment of the present invention provides a method for upgrading a user lock, which is applied to a server, and the method includes:
receiving an upgrading request of a user lock sent by a user terminal;
based on the upgrading request, at least one permission upgrading packet corresponding to the user lock is sent to the user terminal, so that the user terminal upgrades the user lock based on the at least one permission upgrading packet; wherein the at least one license upgrade package is generated by the server invoking a control lock corresponding to the user lock; the control lock is physically connected with the server, or the control lock is a control lock module integrated in the server.
In a second aspect, an embodiment of the present invention provides a method for upgrading a user lock, which is applied to a user terminal, and the method includes:
sending an upgrading request of a user lock to a server, and receiving at least one permission upgrading packet corresponding to the user lock, which is sent by the server in response to the upgrading request; wherein the at least one license upgrade package is generated by the server invoking a control lock corresponding to the user lock; the control lock is physically connected with the server, or the control lock is a control lock module integrated in the server;
upgrading the user lock based on at least one license upgrade package.
In a third aspect, an embodiment of the present invention further provides an apparatus for upgrading a user lock, where the apparatus is disposed in a server, and the apparatus includes:
the upgrading request receiving module is used for receiving an upgrading request of the user lock sent by the user terminal;
the permission upgrading package sending module is used for sending at least one permission upgrading package corresponding to the user lock to the user terminal based on the upgrading request so that the user terminal upgrades the user lock based on the at least one permission upgrading package; wherein the at least one license upgrade package is generated by the server invoking a control lock corresponding to the user lock; the control lock is physically connected with the server, or the control lock is a control lock module integrated in the server.
In a fourth aspect, an embodiment of the present invention further provides an apparatus for upgrading a user lock, where the apparatus is disposed in a user terminal, and the apparatus includes:
the receiving and sending module is used for sending an upgrading request of the user lock to the server; receiving at least one permission upgrading packet corresponding to the user lock and sent by the server in response to the upgrading request; wherein the at least one license upgrade package is generated by the server invoking a control lock corresponding to the user lock; the control lock is physically connected with the server, or the control lock is a control lock module integrated in the server;
and the user lock upgrading module is used for upgrading the user lock based on at least one permission upgrading package.
In a fifth aspect, an embodiment of the present invention further provides a system for upgrading a user lock, where the system includes: a user terminal and a server;
the server is used for receiving an upgrading request of the user lock sent by the user terminal and sending at least one permission upgrading packet corresponding to the user lock to the user terminal based on the upgrading request; wherein the at least one license upgrade package is generated by the server invoking a control lock corresponding to the user lock; the control lock is physically connected with the server, or the control lock is a control lock module integrated in the server;
and the user terminal is in communication connection with the server and upgrades the user lock based on the received at least one permission upgrading packet.
In a sixth aspect, an embodiment of the present invention further provides an electronic device, where the electronic device includes:
one or more processors;
storage means for storing one or more programs;
when the one or more programs are executed by the one or more processors, the one or more processors implement the method for upgrading the user lock according to any of the embodiments of the present invention.
In a seventh aspect, an embodiment of the present invention further provides a storage medium containing computer-executable instructions, which when executed by a computer processor, are used to execute the method for upgrading a user lock according to any one of the embodiments of the present invention.
According to the technical scheme of the embodiment of the invention, the server receives the upgrading request of the user lock sent by the user terminal, and sends the at least one permission upgrading packet corresponding to the user lock to the user terminal based on the upgrading request, so that the user terminal can upgrade the user lock based on the at least one permission upgrading packet, the user lock can be upgraded quickly and conveniently, and the problems that the time consumption for upgrading the user lock is long and the upgrading efficiency is low in the prior art are solved.
Drawings
FIG. 1 is a flowchart of a method for upgrading a user lock according to a first embodiment of the present invention;
FIG. 2 is a flowchart of a method for upgrading a user lock according to a second embodiment of the present invention;
FIG. 3 is an interaction flow chart of a method for upgrading a user lock according to a second embodiment of the present invention;
FIG. 4 is an interaction flow chart of another method for upgrading a user lock according to a second embodiment of the present invention;
FIG. 5 is an interaction flow diagram of a method for upgrading a user lock in the prior art;
FIG. 6 is a flowchart of a method for upgrading a user lock according to a third embodiment of the present invention;
FIG. 7 is a flowchart of a method for upgrading a user lock according to a fourth embodiment of the present invention;
FIG. 8 is a schematic structural diagram of an apparatus for upgrading a user lock according to a fifth embodiment of the present invention;
FIG. 9 is a schematic structural diagram of an upgrading apparatus for a user lock according to a sixth embodiment of the present invention;
FIG. 10 is a schematic structural diagram of an upgrade system for a user lock in a seventh embodiment of the present invention;
fig. 11 is a schematic structural diagram of an electronic device in an eighth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a flowchart of a method for upgrading a user lock according to an embodiment of the present invention, where the embodiment of the present invention is applied to a server, and the method may be implemented by an upgrading apparatus for a user lock, where the upgrading apparatus for a user lock may be implemented by software and/or hardware, and the upgrading apparatus for a user lock may be configured on an electronic computing device, and specifically includes the following steps:
and S110, receiving an upgrading request of the user lock sent by the user terminal.
For example, the user terminal herein refers to a terminal on the software user side, and may be a terminal having software corresponding to a user lock, or a terminal without the software installed, which is not limited in this application. For example, the user terminal may be a mobile phone, a computer, a tablet, or the like.
The upgrade request may be a request to upgrade a license file in the user lock.
It should be noted that the software license file corresponding to the software, which is a kind of data certificate, is signed by the software author (i.e. software developer) and the user, and is used to specify and limit the right of the software user to use the software (or its source code). The user lock may serve as a carrier for the software license file. After a software user purchases software from a software developer, the software developer needs to deliver a user lock configured for the software user to the software user in addition to the software. The software user inserts the user lock into the terminal installed with the software, and the software can be normally used only if the license file in the user lock is valid. Specifically, part of the information of the software installed on the terminal is encrypted by the software developer, and the terminal can decrypt the software only by using the license file stored in the user lock and issued by the software developer, so that the software operates normally. When the license file in the user lock fails, the software cannot be used normally.
In one possible implementation, at least one license term is included in the license file. The license terms in the embodiments of the present application are used to define the conditions of use of the software. For example, the licensing terms may define a start time, an end time, a time span, a number of uses, a number of software concurrencies, and the like for the software. For example, if a certain license term limits the start time of the software, then the software will not be used earlier than the set time. Certain license terms limit the end time of the license beyond which the software will not be used properly. A certain licensing term limits the time span over which the software can be used normally after the first use, and beyond that it cannot be used normally. A certain license term limits the number of licensed uses and the software will not be used after the number of uses is exhausted. A license term limits the number of software concurrencies, i.e., the maximum number of software that can be launched simultaneously, at most only that number of software is allowed to access the user lock to decrypt the software at the same time. When any one of the license terms in the license file is not satisfied, the license file may be considered invalid. In this case, even if the user physically connects the user lock to the terminal on which the corresponding software is installed, the software cannot be normally used.
Illustratively, when the service life defined in the license file of the user lock corresponding to the software in the user terminal is exceeded, the software cannot be normally used. In this case, the software user may pay a fee to the software developer to extend the life of the software, requiring an upgrade to the license file of the user's lock. When the user lock needs to be upgraded, an upgrade request for upgrading the license file in the user lock can be sent to the server.
S120, based on the upgrading request, at least one permission upgrading packet corresponding to the user lock is sent to the user terminal, so that the user terminal can upgrade the user lock based on the at least one permission upgrading packet; the server calls a control lock corresponding to the user lock to generate at least one permission upgrading packet; the control lock is physically connected with the server, or the control lock is a control lock module integrated in the server.
Illustratively, the license upgrade package may be a compressed package that upgrades the license files in the user lock.
The server sends at least one permission upgrade package corresponding to the user lock to the user terminal according to an upgrade request of the user lock sent by the user terminal, the user terminal can download the at least one permission upgrade package, and the at least one permission upgrade package is analyzed by using a local upgrade tool installed in the user terminal, for example, decompression, decryption and the like can be performed. And the user terminal upgrades the user lock according to the analyzed license upgrade package and updates the software license in the user lock.
For example, the following briefly introduces one implementation manner of the server invoking the control lock to generate a corresponding license upgrade package for a specific user lock, and the user terminal upgrading by using the license upgrade package. During the production of the user locks, a developer certificate controlling the locks has been downloaded to each user lock, the developer certificate containing the developer public key. Each user lock also stores a user lock private key of the user lock. The control lock stores one or more user lock certificates corresponding to the user lock, and each user lock certificate contains the user lock public key. The control lock also has stored therein a developer private key.
When the control lock generates a corresponding license upgrade package for a particular user lock, it first generates a random key. And then, encrypting the plaintext of the license file by using the random key to obtain the ciphertext of the license file. And then, encrypting the random key by using the user lock public key in the user lock certificate to obtain a random key ciphertext. And signing the plaintext of the license file by adopting a private key of a developer to obtain signature data. The license upgrade package contains the license file ciphertext, the random key ciphertext, and the signature data.
When the corresponding user lock receives the license upgrade package, the user terminal or the user lock connected to the user terminal can decrypt the random key ciphertext by using the user lock private key to obtain the random key plaintext. And then, decrypting the ciphertext of the license file by using the random key to obtain the plaintext of the license file. And calculating the plaintext of the license file by adopting the developer public key in the developer certificate in the user lock, and comparing the calculation result with the signature data to verify the signature. The user lock private key can decrypt the random key ciphertext, and if the signature verification is passed, the permission file plaintext can be stored in the user lock to replace the original permission file in the user lock.
In the process of generating the license upgrade package and upgrading, the private key of the developer in the control lock is used for signing, the public key of the developer in the developer certificate in the user lock is used for de-signing, and whether the license upgrade package is issued by the control lock is verified, so that the source of the license upgrade package is effectively ensured. The random key ciphertext in the license upgrade package is obtained by encrypting the public key of the specific user lock, and only the private key of the user lock can be decrypted. Thus, the user lock can verify whether the permission upgrading package is issued by the control lock, so that one user lock can only upgrade the permission file issued by the control lock, but cannot upgrade the permission file issued by the control lock for other user locks. In this way, the uniqueness and correctness of the license upgrade package can be guaranteed.
After the upgrade is completed, the terminal installed with the software corresponding to the upgraded user lock can decrypt the software by using the upgraded user lock, so that the software can be normally used.
It should be noted that the terminal here may be a terminal installed with a local upgrade tool, and may also be another terminal installed with the software on the user side, which is not limited in this application.
By adopting the user lock upgrading method in the prior art, the problems of untimely issuance, delayed delivery time, long upgrading time consumption and low upgrading efficiency are easily caused, and the method is very inconvenient. The control lock issuing the permission is usually taken care of by a specially-assigned person at the software developer side, and the specially-assigned person is taken care of issuing the permission to the lock of the user. For example, for small and medium software developers, the control lock is usually held in a leader or finance hand, i.e., a person who is a specialist takes care of the person who issues the license. If the person is on the false or the end user is not issued a license in a timely manner, the software transaction time or license upgrade time is severely delayed.
According to the technical scheme of the embodiment of the invention, the server receives the upgrading request of the user lock sent by the user terminal, and sends the at least one permission upgrading packet corresponding to the user lock to the user terminal based on the upgrading request, so that the user terminal can upgrade the user lock based on the at least one permission upgrading packet, the user lock can be upgraded quickly and conveniently, and the problems that the time consumption for upgrading the user lock is long and the upgrading efficiency is low in the prior art are solved.
Example two
Fig. 2 is a flowchart of an upgrading method for a user lock according to a second embodiment of the present invention, where the second embodiment of the present invention may be combined with various alternatives in the foregoing embodiments. As shown in fig. 2, the method of the embodiment of the present invention specifically includes the following steps:
s210, receiving a user lock permission issuing request sent by the developer terminal.
Illustratively, the developer terminal refers to a terminal on the software developer side, and may be a terminal used by a manager on the software developer side to manage the user lock. For example, the terminal may be a terminal held by a business person on the developer side, for example, a mobile phone, a computer, or a tablet.
The license issuance request may be a request to issue a license file for a certain software for the user lock.
When the user lock needs to be upgraded, for example, an original license file in the user lock is invalid, and a software user purchases the right of use of software again from a software developer or purchases the right of use of a new module of the software, a service person on the software developer side can use a developer terminal to send a license issue request of the user lock to a server so as to request the server to call a control lock corresponding to the user lock, and generate a corresponding license upgrade package for the user lock.
The information of the user lock is included in the license issuance request, and may include, for example, an ID of the user lock, an ID of a user terminal where the user lock is located, a name of software corresponding to the user lock, and the like.
S220, calling a control lock corresponding to the user lock based on the permission issuing request, and generating at least one permission upgrading packet corresponding to the user lock.
Optionally, invoking a control lock corresponding to the user lock, and generating at least one permission upgrade package corresponding to the user lock may include the following two cases:
(1) when the server comprises the control lock module, the control lock module generates at least one permission upgrading packet corresponding to the user lock based on the permission issuing request.
It should be noted that each user lock corresponds to a control lock, the control lock is in the hands of the developer, and when the user lock needs to issue license upgrade, the developer can issue a license upgrade package to the user lock by using the control lock in the hands, so that the user lock can update and upgrade the license file in the user lock according to the license upgrade package, and upgrade and decrypt the software by using the updated and upgraded license file.
Referring to the interaction flowchart of the method for upgrading the user lock described in fig. 3, when the control lock is in the server, that is, the control lock is used as a functional module in the server, the server calls or accesses the control lock to enable the control lock to be based on generating at least one permission upgrading packet corresponding to the user lock. The server may be a local server or a cloud server.
(2) And when the control lock is independent of the server, the server calls the control lock to generate at least one permission upgrading packet corresponding to the user lock based on the permission issuing request.
Referring to fig. 4, an interaction flowchart of another method for upgrading a user lock is described, where when a control lock is independent of a server, that is, the control lock is a separate hardware device, the server receives a permission issuance request sent by a developer terminal, and accesses the control lock based on the received permission issuance request. And controlling the lock to generate at least one license upgrading packet corresponding to the user lock, and sending the at least one license upgrading packet to the server. The server sends at least one permission upgrading packet to the user terminal, and the user terminal can upgrade the permission upgrading packet to a user lock physically connected with the user terminal by using a local upgrading tool. The server and control lock, here, may be physically separate. For example, the server and the control lock can be isolated in a computer room separately, the server can be accessed by authorized users at any time, and the control lock can be called by the server at any time for issuing a license upgrade package. The key of the machine room is mastered by a special person or only a person with authority can enter the machine room. Therefore, the problems that the license file is not issued in time and the like are avoided, and the problem that the control lock is frequently transferred among different business personnel of a software developer and is easy to lose when the control lock is used for issuing the license file is also avoided.
And S230, receiving an upgrading request of the user lock sent by the user terminal.
In one implementation, the license upgrade package for the user lock may contain a corresponding lifetime indicating: with the license file in the license upgrade package, the software user can use the software for a normal period of time. Specifically, the user lock may include a service life in a license upgrade package at the last upgrade before the upgrade is currently needed, for example, there may be information of corresponding start time and end time of use in the license upgrade package, and the maximum number of times that the software can be used.
Optionally, the receiving of the request for upgrading the user lock sent by the user terminal may specifically be: determining a first preset period based on the service life corresponding to the license upgrading packet used by the last upgrading of the user lock; and receiving an upgrading request of the user lock sent by the user terminal based on a first preset period.
For example, the first preset period may be a period in which an upgrade request is transmitted. The first preset period may be determined according to the start time and the end time corresponding to the license upgrade package when the current upgrade is upgraded last time.
According to the determined first preset period, the user terminal can periodically send an upgrading request of the user lock to the server. The server periodically searches whether a license upgrade package of the user lock exists on the server according to the upgrade request, and if so, the license upgrade package is sent to the user terminal, so that the problems that the license upgrade package is overdue and is damaged due to automatic scanning of antivirus software in the prior art are solved.
In one implementation, each time the control lock issues a license upgrade package, the control lock may also issue a new license upgrade package periodically (e.g., according to the first preset period), so that when the user terminal periodically sends an upgrade request to the server, the control lock may periodically search whether the license upgrade package with the user lock exists according to the upgrade request. Such an implementation is particularly suitable for use in scenarios where periodic upgrades to user locks are required.
In another implementation manner, the user terminal may also detect whether the user inputs a preset operation on a local upgrade tool of the user terminal, and send an upgrade request to the server if the preset operation is detected. The preset operation here may be, for example, that the user clicks a control of "upgrade user lock" on a local upgrade tool of the user terminal, and after the user terminal detects the above operation of the user, the user terminal sends an upgrade request to the server in response to the above operation of the user on the user terminal.
The above-mentioned manner of sending the upgrade request by the user terminal may also be that the user terminal detects whether a user lock is inserted into the user terminal (i.e. a communication manner based on physical connection with the user lock is established), and if the user lock is detected to be inserted, whether the license file is invalid is determined according to the original license file stored in the user lock, and if the license file is invalid, the upgrade request is sent to the server.
The mode of sending the upgrade request by the user terminal may be selected according to the user requirement, which is not limited herein, and of course, the mode of sending the upgrade request by the user terminal may also not be limited to the above-mentioned several modes, and any mode of sending the upgrade request by the user terminal belongs to the protection scope of the embodiment of the present invention.
S240, based on the upgrading request, at least one permission upgrading packet corresponding to the user lock is sent to the user terminal, so that the user terminal can upgrade the user lock based on the at least one permission upgrading packet; the server calls a control lock corresponding to the user lock to generate at least one permission upgrading packet; the control lock is physically connected with the server, or the control lock is a control lock module integrated in the server.
Referring to fig. 5, it can be seen from fig. 5 that the control lock is physically connected to the developer terminal, the user lock is physically connected to the user terminal, when the user lock needs to be upgraded, the developer terminal receives at least one license upgrade package issued by the control lock to the user lock, a developer at the developer terminal delivers the at least one license upgrade package to a user at the user terminal, and then the user sends the at least one license upgrade package to the user terminal (or sends the at least one license upgrade package to the user terminal by a mail or the like through the developer terminal), and the user lock placed in the user terminal upgrades software based on a local upgrade tool in the user terminal by using the at least one license upgrade package in the user terminal.
By adopting the mode, for the license upgrade package delivered to the user by the developer, if the user does not upgrade in time, the overdue problem may exist, and when the user wants to upgrade, the user will encounter the problem of upgrade failure, so that the efficiency is low due to secondary communication; in addition, the license upgrade package received by the user via the network may cause the file to be tampered or damaged (e.g., automatically scanned or processed by the antivirus software) due to a problem of the use environment, resulting in an upgrade failure problem.
The upgrading method of the embodiment of the invention can utilize the control lock to issue at least one permission upgrading packet to the user lock according to the permission issuing request of the user lock sent by the developer terminal, so that the subsequent user lock can correspondingly upgrade the user lock according to the at least one permission upgrading packet, the upgrading efficiency of the user lock is improved, and the problems that the upgrading efficiency of the user lock is low, the permission upgrading packet is lost or arbitrarily distorted and the upgrading of the user lock is influenced in the prior art are solved.
EXAMPLE III
Fig. 6 is a flowchart of an upgrading method for a user lock according to a third embodiment of the present invention, and the third embodiment of the present invention may be combined with various alternatives in the foregoing embodiments.
As shown in fig. 6, the method of the embodiment of the present invention specifically includes the following steps:
s310, receiving a user lock permission issuing request sent by the developer terminal.
Illustratively, in the license issuance request includes: first identification information and second identification information.
The first identification information is used to uniquely identify the user on the software developer side, and may be, for example, an account number of a person on the software developer side.
The second identification information is used to uniquely identify a user lock, and may be, for example, information such as an ID and a number of the user lock, or hardware information of the user lock, or a combination thereof.
Alternatively, the user on the software developer side may log in with an account number and a password on any one terminal (hereinafter referred to as a developer terminal) on the software developer side. After successful login, the user of the developer terminal can send a permission issuing request to the server through the developer terminal.
S320, judging whether the user of the developer terminal has the permission issuing authority of the user lock or not based on the first identification information and the second identification information.
Each user lock may have one or more designated administrators (software developer side personnel). Different administrators may have different rights. For example, some administrators (such as software vendors on the software developer side) have the right to issue use licenses for the user locks they are responsible for maintaining; some managers (such as a software sales manager or a general manager on the software developer side) have the right to issue use licenses for all user locks, and the like. The server stores authority data including the corresponding relation between each manager and the user lock managed by the manager and the authority of the manager to the user lock. After receiving the first identification information and the second identification information, the server may determine, by using the stored permission data, whether the user on the software developer side indicated by the first identification information has a permission to issue a permission to the user lock indicated by the second identification information, that is, whether the user on the software developer side has a permission to invoke the control lock corresponding to the user lock to issue a permission file to the control lock.
In a possible implementation manner, only one super administrator is provided in an initialization state in a management platform system (which can be arranged on a server) of the user lock, and a default account number and a password are provided so as to manage the whole system. When the super administrator logs in the management platform system of the user lock, sub-administrators are added to the system, and the authority of issuing permission is distributed to the sub-administrators. For example, the sub-administrator a is assigned with the permission issuance permission of the user lock nos. 1 to 10, and the sub-administrator B is assigned with the permission issuance permission of the user lock nos. 11 to 20.
It should be noted that the permission issued can be functionally expanded according to the actual scene of the developer; the super administrator has all the authorities and can audit the operation records of all the sub-administrators.
Therefore, the authority of the hardware lock is set, and the problem of disordered authority management of the user lock in the prior art is solved. For example, for a large-scale software developer, there may be many control locks for issuing a license to a user lock, and different departments, different subsidiaries, and different agents all have control locks, and if one of the departments changes, a traceability problem of an upgrade package for issuing a license to a control lock may be caused.
S330, if the permission issuing authority exists, based on the permission issuing request, calling the control lock corresponding to the user lock, and generating at least one permission upgrading packet corresponding to the user lock.
And S340, receiving an upgrading request of the user lock sent by the user terminal.
And S350, based on the upgrading request, sequentially sending at least one license upgrading packet corresponding to the user lock to the user terminal according to a first preset sequence based on the serial number or the timestamp of the license upgrading packet, so that the user terminal utilizes the at least one license upgrading packet to upgrade the user lock based on a second preset sequence.
It should be appreciated that after the license upgrade package is generated, it may be stored on the server and transmitted to the user terminal after waiting for an upgrade request from the user terminal. There may be multiple license upgrade packages on the server for one user lock.
Illustratively, the license upgrade package includes: the serial number or timestamp of the license upgrade package, that is, each license upgrade package has its corresponding serial number or timestamp.
The sequence number here is used to indicate the sequence of the generation time of the license upgrade package, or to indicate the sequence of the use of the subsequent license upgrade packages, and this is not limited here, as long as a plurality of license upgrade packages can be sorted according to a certain rule.
The time stamp here is used to indicate the generation time of the license upgrade package.
The first preset order may be an order in which the at least one license upgrade package is transmitted to the user terminal, which is preset. The first preset sequence here may be, for example, that the license upgrade packets are sent to the user terminal from small to large, or that the license upgrade packets are sent to the user terminal according to the time stamps of the license upgrade packets in the sequence of the time stamps.
The second preset order may be an order in which the user terminal upgrades the software using the license upgrade packages, which is set in advance.
It should be noted that, the serial number or the timestamp of each license upgrade package may be set according to a subsequent use sequence of each license upgrade package and a sequence in which each license upgrade package is sent to the user terminal, and the use sequence of each license upgrade package is consistent with the sequence in which each license upgrade package is sent to the user terminal (that is, the first preset sequence is consistent with the second preset sequence). Therefore, each license upgrading packet can be directly sent to the user terminal subsequently according to the serial number or the timestamp of each license upgrading packet, and the software is upgraded by using each license upgrading packet according to the serial number or the timestamp of each license upgrading packet.
It should be noted that the first preset sequence and the second preset sequence may be different from each other or the same, and the first preset sequence and the second preset sequence, and the sequence number or the timestamp of each allowable upgrade packet may also be unrelated, which may all be set according to the user requirement, and this is not limited herein.
In another implementation, the step of S350 may be replaced with: in response to the upgrading request, searching a permission upgrading packet corresponding to the user lock to be upgraded; and if more than one license upgrading packet is found, sending the license upgrading packet with the latest generation time to the user terminal according to the serial number or the time stamp of the license upgrading packet.
In another implementation manner, if more than one license upgrade package is found, the server may also send the first license upgrade package to the user terminal according to the first preset sequence, so that the user terminal upgrades the user lock by using the license upgrade package. And after the user lock is upgraded successfully, the user terminal reports the user lock upgrading condition to the server. The user lock upgrade condition may indicate information such as a license upgrade package serial number, whether the upgrade was successful, upgrade time, upgrade location, and the like. And the server records the upgrading condition of the user lock into the issuing record so as to facilitate tracing. In addition, after judging that the first license upgrade package is upgraded successfully, the server sends the second license upgrade package in the first preset sequence to the user terminal. And by parity of reasoning, sending one by one and upgrading one by one.
Therefore, the problem that the upgrading is easy to fail when a plurality of licenses upgrade files in the prior art is solved. For example, in some application scenarios, a software user may need to upgrade a user lock multiple times a day or a short time. When using the prior art, a software user receives a plurality of license upgrade packages delivered from the software developer side. This requires the software user to manage and remember whether the license upgrade package has been upgraded, which may lead to upgrade failure in case of error. In some application scenarios, a software user has a plurality of user locks that need to be upgraded. When using the prior art, the software user will also receive a plurality of license upgrade packages delivered from the software developer side, and these license upgrade packages need to upgrade the user lock in a one-to-one correspondence. This is likely to cause the problem of failed upgrade due to the failure of one-to-one correspondence caused by the mistake of the software user. Also, in these application scenarios, the more upgrade packages that are licensed is more error prone. By adopting the technical scheme, the problems can be better solved, and the condition of upgrading failure is reduced.
It should be noted that each upgrade data in the user lock upgrade process may be recorded, and the upgrade data may be a user terminal, a user lock corresponding to the user terminal, an upgrade permission packet of the user lock, a serial number (or a timestamp) of the upgrade permission packet, issue time of the upgrade permission packet, whether the upgrade is successful, upgrade time, an upgrade location, and the like. When a user at a certain developer side wants to check the upgrading information of a certain user lock, the upgrading data of the user lock can be checked according to the identification information of the user lock and the like. The user at a certain developer side can view the upgrading data of all user locks managed by the user according to the authority data. Therefore, the problems that no history upgrading record of the user lock exists and the authority management is disordered in the prior art are solved.
Example four
Fig. 7 is a flowchart of an upgrading method for a user lock according to a fourth embodiment of the present invention, where the embodiment of the present invention is applied to a user terminal, and this embodiment may be applicable to a situation where a user lock is upgraded, and the method may be executed by an upgrading apparatus for a user lock, where the upgrading apparatus for a user lock may be implemented by software and/or hardware, and the upgrading apparatus for a user lock may be configured on an electronic computing device, and specifically includes the following steps:
s410, sending an upgrading request of the user lock to the server, and receiving at least one permission upgrading packet corresponding to the user lock and sent by the server in response to the upgrading request; the server calls a control lock corresponding to the user lock to generate at least one permission upgrading packet; the control lock is physically connected with the server, or the control lock is a control lock module integrated in the server.
It should be noted that the control lock may be physically connected to the server, or the control lock is a control lock module integrated in the server. And are not limited herein.
The method for sending the upgrade request of the user lock to the server by the user terminal may refer to the method described in the second embodiment, but is not limited to the method described in the second embodiment.
And S420, upgrading the user lock based on at least one permission upgrading package.
It should be noted that, for the steps executed by the server, the user terminal, and the developer terminal in the embodiment of the present invention, reference may be made to the contents in the first to third embodiments, which are not described herein again.
The user terminal sends an upgrading request of the user lock to the server and receives at least one permission upgrading packet which is sent by the server in response to the upgrading request and corresponds to the user lock; the server calls a control lock corresponding to the user lock to generate at least one permission upgrading packet; the control lock is physically connected with the server, or the control lock is a control lock module integrated in the server, and the user terminal updates the user lock based on the received at least one permission updating packet, so that the user lock can be quickly and conveniently updated, and the problems that in the prior art, the time consumption for updating the user lock is long, and the updating efficiency is low are solved.
It should be noted that the method for upgrading a user lock according to the embodiment of the present invention has the same functions and advantages as those of the above-described embodiment of the method for upgrading a user lock applied to a server.
EXAMPLE five
Fig. 8 is a schematic structural diagram of an upgrading apparatus for a user lock according to a fifth embodiment of the present invention, where the apparatus is disposed in a server, and as shown in fig. 8, the apparatus includes: an upgrade request receiving module 31 and a license upgrade package transmitting module 32.
The upgrading request receiving module 31 is configured to receive an upgrading request of a user lock sent by a user terminal;
a license upgrade package sending module 32, configured to send, based on the upgrade request, at least one license upgrade package corresponding to the user lock to the user terminal, so that the user terminal upgrades the user lock based on the at least one license upgrade package; wherein the at least one license upgrade package is generated by the server invoking a control lock corresponding to the user lock; the control lock is physically connected with the server, or the control lock is a control lock module integrated in the server.
On the basis of the technical scheme of the embodiment, the device further comprises:
the permission issuing request receiving module is used for receiving a permission issuing request of the user lock sent by the developer terminal;
and the permission upgrading package determining module is used for calling a control lock corresponding to the user lock based on the permission issuing request and generating at least one permission upgrading package corresponding to the user lock.
Optionally, the license issuance request includes: first identification information of a developer, and second identification information of the user lock.
On the basis of the technical scheme of the embodiment, the device further comprises:
the judging module is used for judging whether the user of the developer terminal has the permission issuing authority of the user lock or not based on the first identification information and the second identification information; and if the license issuing authority exists, executing the operation of calling a control lock corresponding to the user lock based on the license issuing request and generating at least one license upgrading packet corresponding to the user lock.
Optionally, the license upgrade package includes: a serial number or a timestamp of the license upgrade package.
On the basis of the technical solution of the foregoing embodiment, the license upgrade package sending module 32 is specifically configured to:
and based on the upgrading request, sequentially sending at least one permission upgrading packet corresponding to the user lock to the user terminal according to a first preset sequence based on the serial number or the timestamp of the permission upgrading packet, so that the user terminal utilizes the at least one permission upgrading packet to upgrade the user lock based on a second preset sequence.
Optionally, the license upgrade package further includes: and the service life corresponding to the permission upgrading packet.
On the basis of the technical solution of the foregoing embodiment, the upgrade request receiving module 31 is specifically configured to:
determining a first preset period based on the service life corresponding to the license upgrading packet used by the last upgrading of the user lock; and receiving an upgrading request of the user lock sent by the user terminal based on the first preset period.
The upgrading device of the user lock provided by the embodiment of the invention can execute the upgrading method of the user lock provided by any one of the first embodiment to the third embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method.
It should be noted that, in the upgrading apparatus for a user lock according to the embodiment of the present invention, each unit and each module included in the upgrading apparatus are only divided according to functional logic, but are not limited to the above division, as long as the corresponding function can be implemented; in addition, specific names of the functional units are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present invention.
EXAMPLE six
Fig. 9 is a schematic structural diagram of an upgrading apparatus for a user lock according to a sixth embodiment of the present invention, where the apparatus is disposed in a user terminal, and as shown in fig. 9, the apparatus includes: a transceiver module 41 and a user lock upgrade module 42.
The transceiver module 41 is configured to send an upgrade request of the user lock to the server; receiving at least one permission upgrading packet corresponding to the user lock and sent by the server in response to the upgrading request; wherein the at least one license upgrade package is generated by the server invoking a control lock corresponding to the user lock; the control lock is physically connected with the server, or the control lock is a control lock module integrated in the server;
and the user lock upgrading module 42 is used for upgrading the user lock based on at least one permission upgrading package.
The upgrading device of the user lock provided by the embodiment of the invention can execute the upgrading method of the user lock provided by the fourth embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method.
It should be noted that, in the upgrading apparatus for a user lock according to the embodiment of the present invention, each unit and each module included in the upgrading apparatus are only divided according to functional logic, but are not limited to the above division, as long as the corresponding function can be implemented; in addition, specific names of the functional units are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present invention.
EXAMPLE seven
Fig. 10 is a schematic structural diagram of an upgrade system for a user lock according to a seventh embodiment of the present invention, and as shown in fig. 10, the system includes: user terminal 51, server 52 and control lock 53.
The server 52 is configured to receive an upgrade request of a user lock sent by the user terminal 51, and send at least one license upgrade package corresponding to the user lock to the user terminal 51 based on the upgrade request, where the at least one license upgrade package is generated by invoking a control lock corresponding to the user lock by the server; the control lock is physically connected with the server, or the control lock is a control lock module integrated in the server;
when the control lock 53 is placed in the server 52 (as shown in fig. 10 (a)), the control lock 53 is configured to generate at least one license upgrade package corresponding to the user lock based on the received license issuance request;
when the control lock 53 is set independently of the server 52 (as shown in fig. 10 (b)), the control lock 53 is physically connected to the server 52, and the server 52 is configured to receive the permission issuance request and send the permission issuance request to the control lock 53; the control lock 53 generates at least one of the license upgrade packages corresponding to the user lock based on the received license issuance request, and transmits the at least one of the license upgrade packages to the server 52.
And the user terminal 51 is in communication connection with the server 52 and is used for upgrading the user lock based on the received at least one license upgrading packet.
On the basis of the above embodiment, the system further includes: a developer terminal 54 communicatively coupled to the server 52.
A developer terminal 54 for sending a permission issuance request of the user lock to the server 52;
the server 52 is further configured to invoke a control lock 53 corresponding to the user lock based on the received license issuance request, and generate at least one license upgrade package corresponding to the user lock.
The upgrading system of the user lock provided by the embodiment of the invention can execute the upgrading method of the user lock provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method.
Example eight
Fig. 11 is a schematic structural diagram of an electronic apparatus according to an eighth embodiment of the present invention, as shown in fig. 11, the electronic apparatus includes a processor 70, a memory 71, an input device 72, and an output device 73; the number of the processors 70 in the electronic device may be one or more, and one processor 70 is taken as an example in fig. 11; the processor 70, the memory 71, the input device 72 and the output device 73 in the electronic apparatus may be connected by a bus or other means, and the bus connection is exemplified in fig. 11.
The memory 71 serves as a computer-readable storage medium, and may be used for storing software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the upgrading method of the user lock in the embodiment of the present invention (for example, the upgrade request receiving module 31 and the license upgrade package transmitting module 32, and/or the transceiving module 41 and the user lock upgrading module). The processor 70 executes various functional applications and data processing of the electronic device by executing software programs, instructions and modules stored in the memory 71, that is, implements the above-described upgrading method for the user lock.
The memory 71 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal, and the like. Further, the memory 71 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, the memory 71 may further include memory located remotely from the processor 70, which may be connected to the electronic device through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 72 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function controls of the electronic apparatus. The output device 73 may include a display device such as a display screen.
Example nine
An embodiment of the present invention further provides a storage medium containing computer-executable instructions, which when executed by a computer processor, perform a method for upgrading a user lock.
Of course, the storage medium containing the computer-executable instructions provided by the embodiments of the present invention is not limited to the method operations described above, and may also perform related operations in the method for upgrading the user lock provided by any embodiment of the present invention.
From the above description of the embodiments, it is obvious for those skilled in the art that the present invention can be implemented by software and necessary general hardware, and certainly, can also be implemented by hardware, but the former is a better embodiment in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which can be stored in a computer-readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, and includes instructions for enabling a computer electronic device (which may be a personal computer, a server, or a network device) to execute the methods according to the embodiments of the present invention.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (11)

1. A method for upgrading a user lock is applied to a server and comprises the following steps:
receiving an upgrading request of a user lock sent by a user terminal;
based on the upgrading request, at least one permission upgrading packet corresponding to the user lock is sent to the user terminal, so that the user terminal upgrades the user lock based on the at least one permission upgrading packet; wherein the at least one license upgrade package is generated by the server invoking a control lock corresponding to the user lock; the control lock is physically connected with the server, or the control lock is a control lock module integrated in the server;
wherein, the license upgrade package comprises: a serial number or a timestamp of the license upgrade package;
the sending, based on the upgrade request, at least one license upgrade package corresponding to the user lock to the user terminal, so that the user terminal upgrades the user lock based on the at least one license upgrade package, includes:
and on the basis of the upgrading request, under the condition that at least two license upgrading packages corresponding to the user lock exist, the at least two license upgrading packages corresponding to the user lock are sequentially sent to the user terminal according to a first preset sequence on the basis of the serial number or the timestamp of the license upgrading package, so that the user terminal utilizes the at least two license upgrading packages to upgrade the user lock on the basis of a second preset sequence.
2. The method according to claim 1, wherein before the receiving the request for upgrading the user lock sent by the user terminal, further comprising:
receiving a permission issuing request of the user lock sent by a developer terminal;
and calling a control lock corresponding to the user lock based on the permission issuing request, and generating at least one permission upgrading package corresponding to the user lock.
3. The method of claim 2, wherein the permission issuance request comprises: first identification information of a developer and second identification information of the user lock;
after receiving the request for issuing permission of the user lock sent by the developer terminal, the method further includes:
judging whether the user of the developer terminal has the permission issuing authority of the user lock or not based on the first identification information and the second identification information;
and if the license issuing authority exists, executing the operation of calling a control lock corresponding to the user lock based on the license issuing request and generating at least one license upgrading packet corresponding to the user lock.
4. The method of any of claims 1-3, wherein the license upgrade package further comprises: the service life corresponding to the permission upgrading packet;
the receiving of the upgrade request of the user lock sent by the user terminal includes:
determining a first preset period based on the service life corresponding to the license upgrading packet used by the last upgrading of the user lock;
and receiving an upgrading request of the user lock sent by the user terminal based on the first preset period.
5. A method for upgrading a user lock is applied to a user terminal and comprises the following steps:
sending an upgrading request of a user lock to a server;
receiving at least one permission upgrading packet corresponding to the user lock and sent by the server in response to the upgrading request; wherein the at least one license upgrade package is generated by the server invoking a control lock corresponding to the user lock; the control lock is physically connected with the server, or the control lock is a control lock module integrated in the server;
upgrading the user lock based on the at least one license upgrade package;
wherein, the license upgrade package comprises: a serial number or a timestamp of the license upgrade package;
the receiving at least one license upgrade package corresponding to the user lock sent by the server in response to the upgrade request comprises:
and under the condition that at least two permission upgrading packets corresponding to the user lock exist, receiving the upgrading request responded by the server, sequentially sending the at least two permission upgrading packets corresponding to the user lock according to a first preset sequence based on the serial number or the timestamp of the permission upgrading packets, and upgrading the user lock by utilizing the at least two permission upgrading packets based on a second preset sequence.
6. The utility model provides an upgrading device of user's lock which characterized in that sets up in the server, includes:
the upgrading request receiving module is used for receiving an upgrading request of the user lock sent by the user terminal;
the permission upgrading package sending module is used for sending at least one permission upgrading package corresponding to the user lock to the user terminal based on the upgrading request so that the user terminal upgrades the user lock based on the at least one permission upgrading package; wherein the at least one license upgrade package is generated by the server invoking a control lock corresponding to the user lock; the control lock is physically connected with the server, or the control lock is a control lock module integrated in the server; wherein, the license upgrade package comprises: a serial number or a timestamp of the license upgrade package; the sending, based on the upgrade request, at least one license upgrade package corresponding to the user lock to the user terminal, so that the user terminal upgrades the user lock based on the at least one license upgrade package, includes: and on the basis of the upgrading request, under the condition that at least two license upgrading packages corresponding to the user lock exist, the at least two license upgrading packages corresponding to the user lock are sequentially sent to the user terminal according to a first preset sequence on the basis of the serial number or the timestamp of the license upgrading package, so that the user terminal utilizes the at least two license upgrading packages to upgrade the user lock on the basis of a second preset sequence.
7. The utility model provides an upgrading device of user's lock which characterized in that sets up in user terminal, includes:
the receiving and sending module is used for sending an upgrading request of the user lock to the server; receiving at least one permission upgrading packet corresponding to the user lock and sent by the server in response to the upgrading request; wherein the at least one license upgrade package is generated by the server invoking a control lock corresponding to the user lock; the control lock is physically connected with the server, or the control lock is a control lock module integrated in the server; wherein, the license upgrade package comprises: a serial number or a timestamp of the license upgrade package; the receiving at least one license upgrade package corresponding to the user lock sent by the server in response to the upgrade request comprises: under the condition that at least two permission upgrading packets corresponding to the user lock exist, receiving the upgrading request responded by the server, sequentially sending the at least two permission upgrading packets corresponding to the user lock according to a first preset sequence based on the serial number or the timestamp of the permission upgrading packets, and upgrading the user lock by utilizing the at least two permission upgrading packets based on a second preset sequence;
and the user lock upgrading module is used for upgrading the user lock based on at least one permission upgrading package.
8. A system for upgrading a user lock, comprising: a user terminal, a server and a control lock;
the server is used for receiving an upgrading request of the user lock sent by the user terminal and sending at least one permission upgrading packet corresponding to the user lock to the user terminal based on the upgrading request; wherein the at least one license upgrade package is generated by the server invoking a control lock corresponding to the user lock; the control lock is physically connected with the server, or the control lock is a control lock module integrated in the server; wherein, the license upgrade package comprises: a serial number or a timestamp of the license upgrade package; the sending, based on the upgrade request, at least one license upgrade package corresponding to the user lock to the user terminal, so that the user terminal upgrades the user lock based on the at least one license upgrade package, includes: on the basis of the upgrading request, under the condition that at least two license upgrading packages corresponding to the user lock exist, the at least two license upgrading packages corresponding to the user lock are sequentially sent to the user terminal according to a first preset sequence on the basis of the serial number or the timestamp of the license upgrading packages, so that the user terminal utilizes the at least two license upgrading packages to upgrade the user lock on the basis of a second preset sequence;
and the user terminal is in communication connection with the server and upgrades the user lock based on the received at least one permission upgrading packet.
9. The system of claim 8, further comprising: a developer terminal in communication connection with the server;
the developer terminal is used for sending a permission issuing request of the user lock to the server;
the server is further configured to invoke a control lock corresponding to the user lock based on the received license issuance request, and generate at least one license upgrade package corresponding to the user lock.
10. An electronic device, characterized in that the electronic device comprises:
one or more processors;
storage means for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the method for upgrading a user lock of any of claims 1-4 or the method for upgrading a user lock of claim 5.
11. A storage medium containing computer-executable instructions for performing the method of upgrading a user lock according to any one of claims 1-4 or the method of upgrading a user lock according to claim 5 when executed by a computer processor.
CN202011164104.8A 2020-10-27 2020-10-27 User lock upgrading method, device, system, electronic equipment and storage medium Active CN112286553B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011164104.8A CN112286553B (en) 2020-10-27 2020-10-27 User lock upgrading method, device, system, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011164104.8A CN112286553B (en) 2020-10-27 2020-10-27 User lock upgrading method, device, system, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112286553A CN112286553A (en) 2021-01-29
CN112286553B true CN112286553B (en) 2021-11-05

Family

ID=74372434

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011164104.8A Active CN112286553B (en) 2020-10-27 2020-10-27 User lock upgrading method, device, system, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112286553B (en)

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8627030B2 (en) * 2007-11-07 2014-01-07 Intel Corporation Late lock acquire mechanism for hardware lock elision (HLE)
US9499128B2 (en) * 2013-03-14 2016-11-22 The Crawford Group, Inc. Mobile device-enhanced user selection of specific rental vehicles for a rental vehicle reservation
JP6562734B2 (en) * 2015-06-26 2019-08-21 キヤノン株式会社 Information processing apparatus, method, and program
CN113886772A (en) * 2015-07-20 2022-01-04 谷歌有限责任公司 Systems, methods, and media for media session concurrency management with recurring license updates
JP6548525B2 (en) * 2015-08-31 2019-07-24 キヤノン株式会社 License management system, client, license management method, and computer program
WO2017177302A1 (en) * 2016-04-15 2017-10-19 Light Wave Technology Inc. Automotive rear-view camera peripheral
CN109313674B (en) * 2016-06-15 2021-06-29 株式会社岛津制作所 Software license management system and management method
CN106936588B (en) * 2017-04-13 2020-04-24 北京深思数盾科技股份有限公司 Hosting method, device and system of hardware control lock
CN109902449A (en) * 2017-12-08 2019-06-18 镇江荣千软件开发有限公司 The method and system of software processing
CN109922076B (en) * 2019-03-27 2020-12-18 北京深思数盾科技股份有限公司 Secure communication method and authorization platform in soft lock permission process
CN110781459A (en) * 2019-09-04 2020-02-11 西安交大捷普网络科技有限公司 Authorization permission management and control method, system and electronic equipment
CN110706035B (en) * 2019-09-30 2022-08-23 江苏满运软件科技有限公司 Updating effect evaluation method and device, storage medium and electronic equipment
CN112149067B (en) * 2020-09-29 2022-10-18 济南博观智能科技有限公司 Software authorization method, terminal equipment, authorization server and storage medium
CN112287305B (en) * 2020-10-30 2023-09-08 北京深盾科技股份有限公司 Data processing method, user lock and server

Also Published As

Publication number Publication date
CN112286553A (en) 2021-01-29

Similar Documents

Publication Publication Date Title
US9766914B2 (en) System and methods for remote maintenance in an electronic network with multiple clients
CN1174302C (en) Verification of software agents and agent activities
US8417964B2 (en) Software module management device and program
US8341616B2 (en) Updating digitally signed active content elements without losing attributes associated with an original signing user
US9336369B2 (en) Methods of licensing software programs and protecting them from unauthorized use
CN111061685B (en) Log query method and device, node equipment and storage medium
CN111492355B (en) Method and control system for controlling and/or monitoring a device
US6651169B1 (en) Protection of software using a challenge-response protocol embedded in the software
CN107133499B (en) Software copyright protection method, client, server and system
CN101192263A (en) Information processing system and method
CN112286553B (en) User lock upgrading method, device, system, electronic equipment and storage medium
CN118432953B (en) Equipment management method, device, medium and equipment applied to FTTR network
CN112468544B (en) Express data transmission method based on middleware and middleware
CN118350031A (en) Block chain-based data processing method, device, equipment and medium
CN117375858A (en) Software upgrading method, device, equipment and storage medium
Joly Sistema de reconocimiento de servicios para la gestión de vulnerabilidades
KR20160142709A (en) Security system and method for private information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 100094 510, 5th floor, building 5, East District, yard 10, northwest Wangdong Road, Haidian District, Beijing

Patentee after: Beijing Shendun Technology Co.,Ltd.

Address before: 100094 510, 5th floor, building 5, East District, yard 10, northwest Wangdong Road, Haidian District, Beijing

Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder