CN112637231A - Authorization method, authorization device, storage medium and server - Google Patents

Authorization method, authorization device, storage medium and server Download PDF

Info

Publication number
CN112637231A
CN112637231A CN202011595412.6A CN202011595412A CN112637231A CN 112637231 A CN112637231 A CN 112637231A CN 202011595412 A CN202011595412 A CN 202011595412A CN 112637231 A CN112637231 A CN 112637231A
Authority
CN
China
Prior art keywords
authorization
product
verified
client
configuration information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011595412.6A
Other languages
Chinese (zh)
Other versions
CN112637231B (en
Inventor
曹召换
范玉朋
王奎杰
赵雪芹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN202011595412.6A priority Critical patent/CN112637231B/en
Publication of CN112637231A publication Critical patent/CN112637231A/en
Application granted granted Critical
Publication of CN112637231B publication Critical patent/CN112637231B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0806Configuration setting for initial configuration or provisioning, e.g. plug-and-play

Abstract

The present disclosure relates to an authorization method, an authorization apparatus, a storage medium, and a server, where the method is applied to the server, and includes: receiving an authorization request message sent by a client, wherein the authorization request message comprises a product identifier of a product to be verified, which is requested to be used by the client; according to the authorization request message, acquiring pre-stored authorization configuration information corresponding to the product to be verified; and determining authorization information corresponding to the client according to the authorization request message and the authorization configuration information, and sending the authorization information to the client so that the client uses the product to be verified according to the authorization information. That is to say, the server can determine the authorization information corresponding to the client according to the authorization request message sent by the client only by pre-storing the authorization configuration information of the product to be verified, so that the authorization process does not need to be re-developed for the product to be verified, the workload of software development can be reduced, and the efficiency of software development can be improved.

Description

Authorization method, authorization device, storage medium and server
Technical Field
The present disclosure relates to the field of internet technologies, and in particular, to an authorization method, an authorization device, a storage medium, and a server.
Background
With the rapid development of information technology, in order to improve the production efficiency of enterprises, information systems become a necessary choice for enterprises. To protect the interests of information system developers, enterprises need to be authorized to use the information system. In the related art, a request may be sent to an authorization server for verification authorization when an information system is started or used, and the information system may be used after the authorization is obtained.
However, this authorization method requires that authorization verification conditions are determined in advance, or an authorization file is generated and sent to the client terminal when verification is performed. Therefore, when the newly added software is authorized, the software needs to be customized and developed, which results in a large workload of software development and affects the efficiency of software development.
Disclosure of Invention
In order to solve the above problem, the present disclosure provides an authorization method, an authorization apparatus, a storage medium, and a server.
In a first aspect, the present disclosure provides an authorization method applied to a server, the method including: receiving an authorization request message sent by a client, wherein the authorization request message comprises a product identifier of a product to be verified, which is requested to be used by the client; according to the authorization request message, acquiring pre-stored authorization configuration information corresponding to the product to be verified; and determining authorization information corresponding to the client according to the authorization request message and the authorization configuration information, and sending the authorization information to the client so that the client uses the product to be verified according to the authorization information.
Optionally, the authorization request message further includes a device identifier corresponding to the client; the obtaining, according to the authorization request message, the pre-stored authorization configuration information corresponding to the product to be verified includes: acquiring authorization configuration information corresponding to the product to be verified according to the product identification; the determining, according to the authorization request message and the authorization configuration information, authorization information corresponding to the client includes: determining whether the client has the right to use the product to be verified according to the equipment identifier corresponding to the client, the product identifier of the product to be verified and the authorization configuration information; and under the condition that the client is determined to have the right to use the product to be verified, determining that the authorization information is a request success, and under the condition that the client is determined not to have the right to use the product to be verified, determining that the authorization information is a request failure.
Optionally, the authorization request message further includes an activation code; the determining, according to the authorization request message and the authorization configuration information, authorization information corresponding to the client includes: determining whether the product to be verified is global verification according to the product identification, wherein the global verification is used for representing all services of the product to be verified which can be used by the client; and under the condition that the product to be verified is not verified globally, determining authorization information corresponding to the client according to the activation code and the authorization configuration information.
Optionally, the determining, according to the activation code and the authorization configuration information, the authorization information corresponding to the client includes: determining the target service of the product to be verified, which is requested to be used by the client, according to the activation code and the authorization configuration information, wherein the target service comprises the service of the product to be verified, which is authorized to be used by the client; and acquiring authorization information corresponding to the client according to the target service.
Optionally, before the determining, according to the activation code and the authorization configuration information, a target service of the product to be verified, which is requested to be used by the client, the method further includes: determining whether the activation code belongs to the product to be verified; the determining, according to the activation code and the authorization configuration information, the target service of the product to be verified, which is requested to be used by the client, includes: and under the condition that the activation code is determined to belong to the product to be verified, determining the target service according to the authorization configuration information.
In a second aspect, the present disclosure provides an authorization apparatus, applied to a server, the apparatus including: a request message receiving module, configured to receive an authorization request message sent by a client, where the authorization request message includes a product identifier of a product to be verified, the product identifier being requested by the client to be used; the configuration information acquisition module is used for acquiring pre-stored authorization configuration information corresponding to the product to be verified according to the authorization request message; and the authorization information determining module is used for determining authorization information corresponding to the client according to the authorization request message and the authorization configuration information, and sending the authorization information to the client so that the client uses the product to be verified according to the authorization information.
Optionally, the authorization request message further includes a device identifier corresponding to the client; the configuration information obtaining module is specifically configured to: acquiring authorization configuration information corresponding to the product to be verified according to the product identification; the authorization information determination module is specifically configured to: determining whether the client has the right to use the product to be verified according to the equipment identifier corresponding to the client, the product identifier of the product to be verified and the authorization configuration information; and under the condition that the client is determined to have the right to use the product to be verified, determining that the authorization information is a request success, and under the condition that the client is determined not to have the right to use the product to be verified, determining that the authorization information is a request failure.
Optionally, the authorization request message further includes an activation code; the authorization information determination module is specifically configured to: determining whether the product to be verified is global verification according to the product identification, wherein the global verification is used for representing all services of the product to be verified which can be used by the client; and under the condition that the product to be verified is not verified globally, determining authorization information corresponding to the client according to the activation code and the authorization configuration information.
Optionally, the authorization information determining module is further configured to: determining the target service of the product to be verified, which is requested to be used by the client, according to the activation code and the authorization configuration information, wherein the target service comprises the service of the product to be verified, which is authorized to be used by the client; and acquiring authorization information corresponding to the client according to the target service.
Optionally, the apparatus further comprises: the activation code determining module is used for determining whether the activation code belongs to the product to be verified;
the authorization information determination module is further configured to:
and under the condition that the activation code is determined to belong to the product to be verified, determining the target service according to the authorization configuration information.
In a third aspect, the present disclosure provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method of the first aspect of the present disclosure.
In a fourth aspect, the present disclosure provides a server comprising: a memory having a computer program stored thereon; a processor for executing the computer program in the memory to implement the steps of the method of the first aspect of the disclosure.
According to the technical scheme, the authorization request message sent by the client is received, wherein the authorization request message comprises the product identification of the product to be verified, which is requested to be used by the client; according to the authorization request message, acquiring pre-stored authorization configuration information corresponding to the product to be verified; and determining authorization information corresponding to the client according to the authorization request message and the authorization configuration information, and sending the authorization information to the client so that the client uses the product to be verified according to the authorization information. That is to say, the server can determine the authorization information corresponding to the client according to the authorization request message sent by the client only by pre-storing the authorization configuration information of the product to be verified, so that the authorization process does not need to be re-developed for the product to be verified, the workload of software development can be reduced, and the efficiency of software development can be improved.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure and are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description serve to explain the disclosure without limiting the disclosure. In the drawings:
FIG. 1 is a flow diagram illustrating an authorization method in accordance with an exemplary embodiment;
FIG. 2 is a flow diagram illustrating another authorization method in accordance with an exemplary embodiment;
FIG. 3 is a schematic diagram illustrating the structure of an authorization device according to an exemplary embodiment;
FIG. 4 is a schematic diagram illustrating another authorization device according to an exemplary embodiment;
FIG. 5 is a block diagram illustrating a server in accordance with an example embodiment.
Detailed Description
The following detailed description of specific embodiments of the present disclosure is provided in connection with the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present disclosure, are given by way of illustration and explanation only, not limitation.
First, an application scenario of the present disclosure will be explained. The method can be applied to software projects or products needing to increase authorization processes, currently, the authorization mode of software comprises offline authorization and online authorization, the offline authorization needs an authorization medium, the authorization medium can be hardware or an authorization file, the deployment cost of the projects can be increased, and manual participation is needed; the online authorization requires the client software to access the internet, and the client software is verified and authorized by sending a request to the authorization server when being started or used, and the deployment and the authorization do not need manual participation. In the current online authorization scheme, authorization verification conditions need to be determined in advance, or an authorization file needs to be generated during verification, so that when newly added software is authorized, customized development needs to be performed, which causes a large workload of software development and affects the efficiency of software development.
In order to solve the existing problems, the present disclosure provides an authorization method, an authorization apparatus, a storage medium, and a server, where the server determines authorization information corresponding to a client according to an authorization request message sent by the client by only pre-storing authorization configuration information of a product to be verified, so that an authorization process does not need to be re-developed for the product to be verified, workload of software development can be reduced, and efficiency of software development is improved.
The present disclosure is described below with reference to specific examples.
Fig. 1 is a flowchart illustrating an authorization method applied to a server according to an exemplary embodiment, and the method includes:
s101, receiving an authorization request message sent by a client.
The authorization request message may include a product identifier of a product to be verified, which is requested to be used by the client, where the product to be verified may include one piece of software or multiple pieces of software, and each piece of software may include one service or multiple services.
In this step, when the client needs to start or use the product to be verified, an authorization request message may be sent to the server according to the product identifier of the product to be verified, so as to request the server to authorize the client to use the product to be verified.
S102, according to the authorization request message, obtaining the pre-stored authorization configuration information corresponding to the product to be verified.
The authorization configuration information may include a product identifier, an authorization amount, a concurrency amount, an expiration time, and the like, which is not limited by this disclosure, and the authorization configuration information may be created and stored after the product to be verified is developed.
In this step, after receiving the authorization request message sent by the client, the server may parse the authorization request message to obtain the product identifier of the product to be verified, which is requested to be used by the client. And then, the server can acquire the pre-stored authorization configuration information corresponding to the product to be verified according to the product identifier.
S103, determining authorization information corresponding to the client according to the authorization request message and the authorization configuration information, and sending the authorization information to the client.
In this step, after obtaining the authorization configuration information, the server may determine the authorization information corresponding to the client according to the authorization request message and the authorization configuration information, for example, in a case that the authorization configuration information includes a product identifier, an authorization quantity, a concurrency quantity, and an expiration time, the server may determine the authorization quantity, the concurrency quantity, and the expiration time corresponding to the product to be verified according to the authorization request message. The server may then generate the authorization information according to the authorization amount, the concurrency amount, and the expiration time, and send the authorization information to the client, and the client may use the product to be verified according to the authorization information after receiving the authorization information sent by the server, for example, the client may use the device of the product to be verified according to the authorization amount and the concurrency amount before the expiration time.
It should be noted that, in a case that the product to be verified is only allowed to be used by one client, for example, the product to be verified is customized for a target client, and only the target client will use the product to be verified, the product to be verified may be bound with the client in advance, so that when the client uses the product to be verified, the client may also send the device identifier corresponding to the client to the server, and thus the server may determine whether to allow the client to use the product to be verified according to the device identifier.
In a possible implementation manner, the server may determine whether the client has the right to use the product to be verified according to the device identifier corresponding to the client, the product identifier of the product to be verified, and the authorization configuration information; and under the condition that the client is determined to have the right to use the product to be verified, determining that the authorization information is successful in request, and under the condition that the client is determined not to have the right to use the product to be verified, determining that the authorization information is failed in request.
For example, the authorization configuration information may include a target device identifier corresponding to a client that is allowed to use the product to be verified, after receiving the authorization request message sent by the client, the server may obtain, according to the authorization request message, a device identifier of the client that requests to use the product to be verified, and then may determine whether the device identifier is the same as the target device identifier, and in a case where it is determined that the device identifier is the same as the target device identifier, it may be determined that the client has an authority to use the product to be verified, and then it is determined that the authorization information is a request success, and in a case where it is determined that the device identifier is different from the target device identifier, it may be determined that the client does not have an authority to use the product to be verified, and then it is determined that the authorization information is a request failure. The client can normally use the product to be verified under the condition that the authorization information is determined to be the request success, and the client cannot use the product to be verified under the condition that the authorization information is determined to be the request failure.
By adopting the method, the server can determine the authorization information corresponding to the client according to the authorization request message sent by the client only by pre-storing the authorization configuration information of the product to be verified, so that the authorization flow does not need to be re-developed aiming at the product to be verified, the workload of software development can be reduced, and the efficiency of software development is improved.
Fig. 2 is a flow chart illustrating another authorization method according to an example embodiment, as shown in fig. 2, the method comprising:
s201, receiving an authorization request message sent by a client.
The authorization request message may include a product identifier of a product to be verified, which is requested to be used by the client, where the product to be verified may include one piece of software or multiple pieces of software, and each piece of software may include one service or multiple services.
S202, according to the authorization request message, obtaining the pre-stored authorization configuration information corresponding to the product to be verified.
The authorization request message may include an activation code, the authorization configuration information may include a global verification item and a software verification item, for example, table 1 provides authorization configuration information for the present disclosure, as shown in table 1, the verification item included in the authorization configuration information is only an example, and the present disclosure is not limited thereto.
Verification item type Authentication item ID Verifying item names Verification item type Checking mode
Global authentication item countNum Authorization quantity Numerical value Total number is not more than
Global authentication item expiration Expiration date Date Date not exceeding
Global authentication item concurrent Number of concurrencies Numerical value Total number is not more than
SoftwareVerification mark check_soft Whether to verify software Boolean
Software validation item module Module information Character string Included
Software validation item date Date of module Date Date not exceeding
TABLE 1
In this step, after receiving the authorization request message sent by the client, the server may parse the authorization request message, and obtain the product identifier of the product to be verified and the activation code for requesting to use the product to be verified, where the activation code may be generated by the server in advance according to authorization configuration information, and different activation codes may be generated for different amounts of software. And then, the server can acquire the authorization configuration information corresponding to the product to be verified according to the product identifier.
S203, determining whether the product to be verified is globally verified according to the product identifier.
The global verification is used for representing all services which can be used by the client for the product to be verified.
It should be noted that, considering that different products to be verified include different amounts of software, only global verification may be performed on a product to be verified that includes only one piece of software, and the authority of each piece of software in the product to be verified may be verified on a product to be verified that includes a plurality of pieces of software.
In this step, after the product identifier of the product to be verified is obtained, it may be determined whether the product to be verified is globally verified according to the product identifier, where it may be determined whether the product to be verified includes multiple pieces of software according to the product identifier, where in the case where the product to be verified includes one piece of software, it may be determined that the product to be verified is globally verified, and in the case where the product to be verified includes multiple pieces of software, it may be determined that the product to be verified is not globally verified. For example, the server may determine whether a software verification item is included in the authorization configuration information, may determine that the product to be verified is a global verification in a case where the authorization configuration information does not include the software verification item, and may determine that the product to be verified is not a global verification in a case where the authorization configuration information includes the software verification item.
And S204, under the condition that the product to be verified is not globally verified, determining the authorization information corresponding to the client according to the activation code and the authorization configuration information.
In this step, when it is determined that the product to be verified is not globally verified, a target service of the product to be verified, which is requested to be used by the client, may be determined according to the activation code and the authorization configuration information, where the target service may include a service of the product to be verified, which is authorized to be used by the client, and the authorization information corresponding to the client is obtained according to the target service.
Here, before determining the target service of the product to be verified, which is requested to be used by the client, according to the activation code and the authorization configuration information, it may be determined whether the activation code belongs to the product to be verified, and in a possible implementation manner, it may be determined whether the activation code matches the authorization configuration information through a preset configuration information association relationship, where the configuration information association relationship may be a correspondence relationship between different activation codes and the authorization configuration information. For example, when the server generates the activation code according to the authorization configuration information, the server may store the corresponding relationship between the generated activation code and the authorization configuration information. If the activation code matches the authorization configuration information, it may be determined that the activation code belongs to the product to be verified, and if the activation code does not match the authorization configuration information, it may be determined that the activation code does not belong to the product to be verified. Further, when it is determined that the activation code belongs to the product to be verified, the target service may be determined according to the authorization configuration information, and the authorization information corresponding to the client may be obtained according to the target service. The activation code may also include information of software requested to be used, and the server may also parse the activation code to determine whether the client has permission to use the software.
In the case that the product to be verified is globally verified, the server may determine the authorization information corresponding to the client directly according to the product identifier without further verification of the activation code, for example, the authorization information may include an authorization number, a concurrency number, an expiration date, and the like.
In addition, the authorization request message may also include a device identifier corresponding to the client, after receiving the device identifier, the server may bind the device identifier with the product to be verified, and then after the client sends the authorization request message next time, if the server determines that the device identifier is bound with the product to be verified, the server may directly send authorization information to the client without acquiring authorization information again, so that the acquisition efficiency of the authorization information may be improved, and user experience may be improved.
It should be noted that, the content included in the authorization request message is only an example, the authorization request message may also include other request information, and the server may verify the authority of the client according to any authorization request message sent by the client. For example, for a globally verified product to be verified, the request information may include an authorization amount, the server may determine whether the client is allowed to use the product to be verified according to the request information, in the case where it is determined that the client is allowed to use the product to be verified according to the request information, the authorization information may be determined as permitted to use, and in the case where it is determined that the client is not allowed to use the product to be verified according to the request information, the authorization information may be determined as prohibited to use. Illustratively, the format of the authorization request message may be:
{
productId:"SOFT_ID",
itemId:"A",
concurrent:"110",
hardware:"computer_1"
}
the value corresponding to the current is the authorization number, and if the authorization number in the authorization configuration information corresponding to the product to be verified is 100, the server may determine that the client is not allowed to use the product to be verified according to the request information.
For a product to be verified that is not globally verified, the request message may include software verification information in addition to the authorization number, and determine whether the software can be used, for example, the format of the authorization request message may be:
{
productId:"SOFT_ID",
itemId:"B",
concurrent:"80",
hardware:"computer_2",
activeCode:"B1"
}
wherein, the activeCode is the software verification code, and different software verification codes correspond to different software.
S205, the authorization information is sent to the client.
By adopting the method, the server can determine the authorization information corresponding to the client according to the authorization request message sent by the client only by pre-storing the authorization configuration information of the product to be verified, and carry out different authority verification aiming at different authorization request messages, so that the authorization process does not need to be re-developed aiming at the product to be verified, the workload of software development can be reduced, and the efficiency of software development is improved.
Fig. 3 is a schematic diagram illustrating a structure of an authorization apparatus according to an exemplary embodiment, as shown in fig. 3, the apparatus including:
a request message receiving module 301, configured to receive an authorization request message sent by a client, where the authorization request message includes a product identifier of a product to be verified, where the product identifier is requested to be used by the client;
a configuration information obtaining module 302, configured to obtain, according to the authorization request message, pre-stored authorization configuration information corresponding to the product to be verified;
the authorization information determining module 303 is configured to determine authorization information corresponding to the client according to the authorization request message and the authorization configuration information, and send the authorization information to the client, so that the client uses the product to be verified according to the authorization information.
Optionally, the authorization request message further includes a device identifier corresponding to the client; the configuration information obtaining module 302 is specifically configured to:
obtaining authorization configuration information corresponding to the product to be verified according to the product identification;
the authorization information determination module is specifically configured to:
determining whether the client has the right to use the product to be verified according to the equipment identifier corresponding to the client, the product identifier of the product to be verified and the authorization configuration information;
and under the condition that the client is determined to have the right to use the product to be verified, determining that the authorization information is successful in request, and under the condition that the client is determined not to have the right to use the product to be verified, determining that the authorization information is failed in request.
Optionally, the authorization request message further includes an activation code; the authorization information determining module 303 is specifically configured to:
determining whether the product to be verified is global verification according to the product identification, wherein the global verification is used for representing all services of the product to be verified which can be used by the client;
and under the condition that the product to be verified is not verified globally, determining the authorization information corresponding to the client according to the activation code and the authorization configuration information.
Optionally, the authorization information determining module 303 is further configured to:
determining the target service of the product to be verified, which is requested to be used by the client, according to the activation code and the authorization configuration information, wherein the target service comprises the service of the product to be verified, which is authorized to be used by the client;
and acquiring the authorization information corresponding to the client according to the target service.
Optionally, fig. 4 is a schematic structural diagram of another authorization apparatus according to an exemplary embodiment, and as shown in fig. 4, the apparatus further includes:
an activation code determination module 304, configured to determine whether the activation code belongs to the product to be verified;
the authorization information determination module 303 is further configured to:
and under the condition that the activation code is determined to belong to the product to be verified, determining the target service according to the authorization configuration information.
Through the device, the server can determine the authorization information corresponding to the client according to the authorization request message sent by the client only by pre-storing the authorization configuration information of the product to be verified, so that the authorization process does not need to be re-developed for the product to be verified, the workload of software development can be reduced, and the efficiency of software development is improved.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Fig. 5 is a block diagram illustrating a server 500 in accordance with an example embodiment. For example, the server 500 may be provided as a server. Referring to fig. 5, the server 500 includes a processor 522, which may be one or more in number, and a memory 532 for storing computer programs executable by the processor 522. The computer programs stored in memory 532 may include one or more modules that each correspond to a set of instructions. Further, the processor 522 may be configured to execute the computer program to perform the authorization method described above.
Additionally, the server 500 may also include a power component 526 and a communication component 550, the power component 526 may be configured to perform power management of the server 500, and the communication component 550 may be configured to enable communication, e.g., wired or wireless communication, of the server 500. The server 500 may also include input/output (I/O) interfaces 558. The Server 500 may operate based on an operating system, such as Windows Server, stored in the memory 532TM,Mac OS XTM,UnixTM,LinuxTMAnd so on.
In another exemplary embodiment, a computer readable storage medium comprising program instructions which, when executed by a processor, implement the steps of the authorization method described above is also provided. For example, the computer readable storage medium may be the memory 532 described above including program instructions that are executable by the processor 522 of the server 500 to perform the authorization method described above.
In another exemplary embodiment, a computer program product is also provided, which comprises a computer program executable by a programmable apparatus, the computer program having code portions for performing the authorization method described above when executed by the programmable apparatus.
The preferred embodiments of the present disclosure are described in detail with reference to the accompanying drawings, however, the present disclosure is not limited to the specific details of the above embodiments, and various simple modifications may be made to the technical solution of the present disclosure within the technical idea of the present disclosure, and these simple modifications all belong to the protection scope of the present disclosure. It should be noted that, in the foregoing embodiments, various features described in the above embodiments may be combined in any suitable manner, and in order to avoid unnecessary repetition, various combinations that are possible in the present disclosure are not described again.
In addition, any combination of various embodiments of the present disclosure may be made, and the same should be considered as the disclosure of the present disclosure, as long as it does not depart from the spirit of the present disclosure.

Claims (10)

1. An authorization method applied to a server, the method comprising:
receiving an authorization request message sent by a client, wherein the authorization request message comprises a product identifier of a product to be verified, which is requested to be used by the client;
according to the authorization request message, acquiring pre-stored authorization configuration information corresponding to the product to be verified;
and determining authorization information corresponding to the client according to the authorization request message and the authorization configuration information, and sending the authorization information to the client so that the client uses the product to be verified according to the authorization information.
2. The method of claim 1, wherein the authorization request message further comprises a device identifier corresponding to the client; the obtaining, according to the authorization request message, the pre-stored authorization configuration information corresponding to the product to be verified includes:
acquiring authorization configuration information corresponding to the product to be verified according to the product identification;
the determining, according to the authorization request message and the authorization configuration information, authorization information corresponding to the client includes:
determining whether the client has the right to use the product to be verified according to the equipment identifier corresponding to the client, the product identifier of the product to be verified and the authorization configuration information;
and under the condition that the client is determined to have the right to use the product to be verified, determining that the authorization information is a request success, and under the condition that the client is determined not to have the right to use the product to be verified, determining that the authorization information is a request failure.
3. The method of claim 1, wherein the authorization request message further comprises an activation code; the determining, according to the authorization request message and the authorization configuration information, authorization information corresponding to the client includes:
determining whether the product to be verified is global verification according to the product identification, wherein the global verification is used for representing all services of the product to be verified which can be used by the client;
and under the condition that the product to be verified is not verified globally, determining authorization information corresponding to the client according to the activation code and the authorization configuration information.
4. The method of claim 3, wherein the determining the authorization information corresponding to the client according to the activation code and the authorization configuration information comprises:
determining the target service of the product to be verified, which is requested to be used by the client, according to the activation code and the authorization configuration information, wherein the target service comprises the service of the product to be verified, which is authorized to be used by the client;
and acquiring authorization information corresponding to the client according to the target service.
5. The method of claim 4, wherein before the determining, according to the activation code and the authorization configuration information, the target service of the product to be verified requested by the client, the method further comprises:
determining whether the activation code belongs to the product to be verified;
the determining, according to the activation code and the authorization configuration information, the target service of the product to be verified, which is requested to be used by the client, includes:
and under the condition that the activation code is determined to belong to the product to be verified, determining the target service according to the authorization configuration information.
6. An authorization apparatus, applied to a server, the apparatus comprising:
a request message receiving module, configured to receive an authorization request message sent by a client, where the authorization request message includes a product identifier of a product to be verified, the product identifier being requested by the client to be used;
the configuration information acquisition module is used for acquiring pre-stored authorization configuration information corresponding to the product to be verified according to the authorization request message;
and the authorization information determining module is used for determining authorization information corresponding to the client according to the authorization request message and the authorization configuration information, and sending the authorization information to the client so that the client uses the product to be verified according to the authorization information.
7. The apparatus according to claim 6, wherein the authorization request message further includes a device identifier corresponding to the client; the configuration information obtaining module is specifically configured to:
acquiring authorization configuration information corresponding to the product to be verified according to the product identification;
the authorization information determination module is specifically configured to:
determining whether the client has the right to use the product to be verified according to the equipment identifier corresponding to the client, the product identifier of the product to be verified and the authorization configuration information;
and under the condition that the client is determined to have the right to use the product to be verified, determining that the authorization information is a request success, and under the condition that the client is determined not to have the right to use the product to be verified, determining that the authorization information is a request failure.
8. The apparatus of claim 6, wherein the authorization request message further comprises an activation code; the authorization information determination module is specifically configured to:
determining whether the product to be verified is global verification according to the product identification, wherein the global verification is used for representing all services of the product to be verified which can be used by the client;
and under the condition that the product to be verified is not verified globally, determining authorization information corresponding to the client according to the activation code and the authorization configuration information.
9. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 5.
10. A server, comprising:
a memory having a computer program stored thereon;
a processor for executing the computer program in the memory to carry out the steps of the method of any one of claims 1 to 5.
CN202011595412.6A 2020-12-29 2020-12-29 Authorization method, device, storage medium and server Active CN112637231B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011595412.6A CN112637231B (en) 2020-12-29 2020-12-29 Authorization method, device, storage medium and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011595412.6A CN112637231B (en) 2020-12-29 2020-12-29 Authorization method, device, storage medium and server

Publications (2)

Publication Number Publication Date
CN112637231A true CN112637231A (en) 2021-04-09
CN112637231B CN112637231B (en) 2023-12-12

Family

ID=75287154

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011595412.6A Active CN112637231B (en) 2020-12-29 2020-12-29 Authorization method, device, storage medium and server

Country Status (1)

Country Link
CN (1) CN112637231B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113408845A (en) * 2021-05-08 2021-09-17 深圳市广和通无线股份有限公司 Processing method and device of production flow, computer equipment and storage medium
CN114944928A (en) * 2022-03-23 2022-08-26 北京奕斯伟计算技术股份有限公司 Authentication method and system for algorithm model in edge computing equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105308907A (en) * 2013-11-29 2016-02-03 华为终端有限公司 Installation package authorization method and device
CN106503492A (en) * 2016-10-27 2017-03-15 厦门中控生物识别信息技术有限公司 A kind of authorization management method, server, customer equipment and system
CN107066840A (en) * 2017-03-31 2017-08-18 北京深思数盾科技股份有限公司 The acquisition methods and device of data
CN110555300A (en) * 2019-09-06 2019-12-10 北京字节跳动网络技术有限公司 application program authorization method, client, server, terminal device and medium
CN111625781A (en) * 2020-08-03 2020-09-04 腾讯科技(深圳)有限公司 SDK authorization authentication method, device, equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105308907A (en) * 2013-11-29 2016-02-03 华为终端有限公司 Installation package authorization method and device
CN106503492A (en) * 2016-10-27 2017-03-15 厦门中控生物识别信息技术有限公司 A kind of authorization management method, server, customer equipment and system
CN107066840A (en) * 2017-03-31 2017-08-18 北京深思数盾科技股份有限公司 The acquisition methods and device of data
CN110555300A (en) * 2019-09-06 2019-12-10 北京字节跳动网络技术有限公司 application program authorization method, client, server, terminal device and medium
CN111625781A (en) * 2020-08-03 2020-09-04 腾讯科技(深圳)有限公司 SDK authorization authentication method, device, equipment and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113408845A (en) * 2021-05-08 2021-09-17 深圳市广和通无线股份有限公司 Processing method and device of production flow, computer equipment and storage medium
CN113408845B (en) * 2021-05-08 2023-06-20 深圳市广和通无线股份有限公司 Processing method and device of production flow, computer equipment and storage medium
CN114944928A (en) * 2022-03-23 2022-08-26 北京奕斯伟计算技术股份有限公司 Authentication method and system for algorithm model in edge computing equipment

Also Published As

Publication number Publication date
CN112637231B (en) 2023-12-12

Similar Documents

Publication Publication Date Title
CN110995513B (en) Data sending and receiving method in Internet of things system, internet of things equipment and platform
CN102446106A (en) Installation management method, server and terminal for application program
EP2550769A1 (en) System and methods for remote maintenance of multiple clients in an electronic network using virtual machines
CN108933789B (en) Method for preventing personal information leakage and third-party application server
CN112637231B (en) Authorization method, device, storage medium and server
CN109040255B (en) Internet of things equipment access method, device, equipment and storage medium
CN109017676B (en) Vehicle control method, device and storage medium
US20220377556A1 (en) Internet-of-things device registration method and apparatus, device, and storage medium
CN115396192A (en) User identity verification method and device, computer equipment and storage medium
CN112165448A (en) Service processing method, device, system, computer equipment and storage medium
CN111835504B (en) Identification code generation method and server
CN109714363B (en) Method and system for modifying switch password
CN116633603A (en) Cross-platform service access method, device, equipment and storage medium
CN112565466B (en) Method and device for cross-application association of users
CN111680279B (en) Login verification method, device and system
CN108830050A (en) Register method, device and the storage medium of computer program
CN115442025A (en) License generation, verification and binding method in load balancing equipment
CN104753755A (en) System access method, system access device, application client, and IM background system
CN109495451B (en) Method and system for processing cloud data request
CN113360868A (en) Application program login method and device, computer equipment and storage medium
CN113422796A (en) Information processing method and device and storage medium
CN113660288B (en) User number binding method and system based on block chain system
CN107179917A (en) System architecture and dispositions method for the operating system of installing multiple test systems
CN111767524B (en) Authority management method, device, system, server and medium
CN114928834B (en) Method for downloading user identification card profile of communication module, device, equipment and medium thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant