CN114995838A - Software authorization installation method, device, equipment and medium for enterprise client - Google Patents

Software authorization installation method, device, equipment and medium for enterprise client Download PDF

Info

Publication number
CN114995838A
CN114995838A CN202210494903.4A CN202210494903A CN114995838A CN 114995838 A CN114995838 A CN 114995838A CN 202210494903 A CN202210494903 A CN 202210494903A CN 114995838 A CN114995838 A CN 114995838A
Authority
CN
China
Prior art keywords
software
authorization
installation package
program
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210494903.4A
Other languages
Chinese (zh)
Inventor
姚晓星
周磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ctrip Travel Network Technology Shanghai Co Ltd
Original Assignee
Ctrip Travel Network Technology Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ctrip Travel Network Technology Shanghai Co Ltd filed Critical Ctrip Travel Network Technology Shanghai Co Ltd
Priority to CN202210494903.4A priority Critical patent/CN114995838A/en
Publication of CN114995838A publication Critical patent/CN114995838A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Abstract

The invention discloses a software authorization installation method, a device, equipment and a medium of an enterprise client, wherein the software authorization installation method comprises the following steps: acquiring encrypted software data; decrypting the software data and downloading the software installation package according to the decrypted software data; when the software installation package passes the verification, releasing a pre-configured authorization program; setting and encrypting account data corresponding to the software installation package; and sending the account data so that the authorization program operates the software installation package according to the administrator account. The invention improves the software installation function of the enterprise client, expands the software installation range and improves the user experience degree on the premise of not reducing the safety.

Description

Software authorization installation method, device, equipment and medium for enterprise client
Technical Field
The present invention relates to the field of software, and in particular, to a method, an apparatus, a device, and a medium for authorized installation of software on an enterprise client.
Background
According to the requirements of enterprise management, safety, business and the like, various working software is often required to be deployed on an enterprise client. For example, communication software (WeChat), navigation software, ticket processing software, development software, UI design software, database software, and the like. According to the security and management requirements of enterprises, users are often limited to have no administrator authority, but most working software can be normally installed and used after the administrator authority is used.
Common software authorized installation methods include authorized installation of local system service authority and authorized installation of specified local administrator authority. The authorized installation mode of the local system service is limited by the characteristics of the system service, and only a silent installation mode without a user interaction interface can be supported. However, many working software installation packages do not support silent installation, resulting in a significant limitation on the types of software that can be installed by system services. The authorized installation of the authority of the designated local administrator can solve the problem that the local system service cannot support the interactive installation mode with an interactive interface, but great efforts are needed for the security management of the administrator account.
Therefore, the existing software authorization installation method has the defects of limited software types, small installation range and poor user experience due to the requirement of the security of enterprise clients.
Disclosure of Invention
The invention provides a method, a device, equipment and a medium for authorized installation of software of an enterprise client, aiming at overcoming the defects of limited software types, small installation range and poor user experience caused by the requirement of the security of the enterprise client in the prior art.
The invention solves the technical problems through the following technical scheme:
in a first aspect, the present invention provides a software authorization installation method for an enterprise client, where the software authorization installation method includes:
acquiring encrypted software data;
decrypting the software data and downloading a software installation package according to the decrypted software data;
when the software installation package passes the verification, releasing a pre-configured authorization program; the authorization program is used for acquiring and authorizing to install the software installation package by using administrator authority under the condition of representing user authority operation;
setting and encrypting account data corresponding to the software installation package; the account data comprises an administrator account;
and sending the account data to enable the authorization program to operate the software installation package according to the administrator account.
Preferably, after the step of releasing the pre-configured authorization program, the software authorization installation method further includes:
sending notification information to the application platform; the notification information is used for enabling the application platform to run the authorization program.
Preferably, the account data includes an administrator account password, and the software authorization installation method further includes:
when first prompt information sent by the authorization program is received, resetting the administrator account password; the prompt message is used for representing that the software installation package is started to be installed by the authorization program.
Preferably, the software authorization installation method further includes:
and when second prompt information sent by the authorization program is received, deleting the administrator account and the authorization program.
Preferably, the software authorization installation method further includes:
and when the software installation package is not verified, pushing alarm information to the application platform.
In a second aspect, the present invention provides a software authorization installation apparatus for an enterprise client, where the software authorization installation system includes:
the acquisition module is used for acquiring the encrypted software data;
the data decryption module is used for decrypting the software data and downloading a software installation package according to the decrypted software data;
the first verification module is used for releasing a pre-configured authorization program when the software installation package passes the verification; the authorization program is used for representing that the software installation package is installed after the authority of an administrator is obtained under the user authority operation condition;
the setting module is used for setting and encrypting account data corresponding to the software installation package; the account data includes an administrator account;
and the first sending module is used for sending the account data so that the authorization program operates the software installation package according to the administrator account.
Preferably, the software authorization installation system further comprises:
the second sending module is used for sending notification information to the application platform; the notification information is used for enabling the application platform to run the authorization program.
Preferably, the account data includes an administrator account password, and the software authorization installation system further includes:
the first receiving module is used for resetting the administrator account password when receiving first prompt information sent by the authorization program; the first prompt message is used for representing that the software installation package is installed after the authorization program is started.
Preferably, the software authorization installation system further comprises:
the second receiving module is used for deleting the administrator account and the authorization program when receiving second prompt information sent by the authorization program; the second prompt message is used for representing that the authorized program finishes installing the software installation package.
Preferably, the software authorization installation system further comprises:
and the second checking module is used for pushing the alarm information to the application platform when the software installation package fails to check.
In a third aspect, the present invention further provides an electronic device, including a processor, a memory, and a computer program stored on the memory and executable on the processor, where the computer program is executed by the processor to perform the software authorization installation method of the enterprise client according to any one of the first aspect.
In a fourth aspect, the present invention also provides a computer-readable storage medium, on which a computer program is stored, which computer program, when being executed by a processor, realizes the steps of the software authorization installation method of an enterprise client according to any one of the first aspect.
The positive progress effects of the invention are as follows: the software authorization installation method, the device, the equipment and the medium of the enterprise client side are provided, a software installation package is downloaded according to decrypted software data, when the software installation package passes verification, a pre-configured authorization program is released, and an administrator account corresponding to the software installation package is sent, so that the software installation package is operated by the authorization program according to the administrator account. The invention improves the software installation function of the enterprise client, expands the software installation range and improves the user experience degree on the premise of not reducing the safety.
Drawings
Fig. 1 is a flowchart of a software authorization installation method of an enterprise client according to embodiment 1 of the present invention.
Fig. 2 is a data flow diagram of interactive software installation authorization according to embodiment 1 of the present invention.
Fig. 3 is a schematic block diagram of a software authorization installation system of an enterprise client according to embodiment 2 of the present invention.
Fig. 4 is a schematic diagram of a hardware structure of an electronic device according to embodiment 3 of the present invention.
Detailed Description
The invention is further illustrated by the following examples, which are not intended to limit the scope of the invention.
Example 1
Fig. 1 is a flowchart of a software authorization installation method of an enterprise client in an embodiment of the present invention, which is applied to a client, and specifically includes the following steps:
and S1, acquiring the encrypted software data.
And S2, decrypting the software data and downloading the software installation package according to the decrypted software data.
S31, when the software installation package passes the verification, releasing the pre-configured authorization program; and the authorization program is used for representing that the software installation package is installed after the authority of the administrator is obtained under the user authority operation condition.
And S32, when the software installation package fails to pass the verification, pushing alarm information to the application platform.
S4, setting and encrypting account data corresponding to the software installation package; the account data includes an administrator account.
And S5, sending the account data so that the authorization program runs the software installation package according to the administrator account.
With respect to step S1, when the user clicks the application platform (web portal) installed on the client, the client may obtain the encrypted software data corresponding to the software type from the server through the background interface after selecting the software type to be installed through decryption displayed by the application platform. Therefore, users without the client can obtain different types of software installation packages according to own requirements, personalized customization is realized, system resources are further saved, and the range of the types of software installation supported by the client is expanded. The software data may include basic information of the software installation package, network download address information of the software installation package, hash check code of the software installation package, and the like.
It should be noted that the server may be a single server or a server cluster, and may be specifically determined according to the data volume and throughput corresponding to the number of clients that need to be served. The number and variety of clients may also be varied.
In step S2, after the encrypted software data is decrypted and the software installation package is downloaded according to the network download address information of the software installation package, the downloaded software installation package may be maliciously tampered with by other programs on the server, so that the downloaded software installation package needs to be verified before the software installation package is run, and the software installation package can only be run after the verification is passed. For example, whether the downloaded software installation package is correct can be checked according to the hash check code of the software installation package, and whether the downloaded software installation package is correct can also be checked according to the encrypted data of the software installation package, so that the safety of client software installation can be further improved.
In step S31, after the software installation package passes the verification, the client completes the pre-configuration and stores the authorization program temporarily stored in the local system service in another set path of the client. The setting path may be determined according to specific situations and is not particularly limited.
In step S32, after the software installation package fails to be verified, the client sends an alarm message of a download error to the application platform, and the application platform submits a record of the download error to the background and then ends the installation process of the software installation package.
For the above steps S4-S5, the local service system of the client may create an account data corresponding to the software installation package and send it to the authorization program. The account data is time sensitive and may include an administrator account. The client generates a random strong password while generating account data, wherein the random strong password is 20 bits of hash check codes carrying upper and lower case letters, numbers or special accords. The method can avoid the leakage of the account data temporarily generated in the software installation process, and further improve the safety of the client software installation.
In a possible implementation scheme, after step S31, the software authorization installation method further includes:
s311, sending notification information to an application platform; the notification information is used to cause the application platform to run the authorization program.
Specifically, the client invokes the authorization program with the current user right through a preset private protocol, that is, through a preset registry key value, the protocol of the local application is invoked by an interactive page supporting the application platform, so that the authorization program runs.
The account data comprises an administrator account password, and the software authorization installation method further comprises the following steps:
s51, resetting the account password of the administrator when first prompt information sent by the authorization program is received; the first prompt message is used for representing that the authorized program starts the installation package of the installation software.
S52, deleting the administrator account and the authorization program when receiving the second prompt message sent by the authorization program; the second prompt message is used for representing that the authorized program finishes installing the software installation package.
For the above steps S51-S52, when receiving the prompt message of "start of installation" sent by the authorization program, the random strong password is immediately generated again and the temporarily generated administrator account password is modified, so that the temporarily generated administrator account password of the software installation package in the installation process is prevented from being leaked, the risk that the temporarily generated administrator account password is hijacked by the memory is reduced, and the security of software installation is ensured.
And when receiving the prompt information of 'installation completion' sent by the authorization program, the client performs software installation cleaning work, deletes the locally temporarily generated administrator account password, and deletes the authorization program. Therefore, the temporarily generated administrator account password of the software installation package is prevented from being leaked after the installation is finished, the risk that the temporarily generated administrator account password is hijacked by the memory and acquired is reduced, and the safety of software installation is also ensured.
As shown in fig. 2, the background interface is part of a server that can provide an administration page to add or change applications, set configuration data (applet configurations), and store the configuration data to a database. The client is divided into an application platform and a local system service from the view point of displaying an interface and the internal operation of the client tool, wherein the application platform corresponds to the interface displayed for a user, and the local system service corresponds to the background operation part of the client tool. When the user selects and runs the application through the interface provided by the application platform installed at the client, the server provides the client with the download instruction data of the corresponding application program, namely the encrypted software data. According to the method, the user can operate the selected application program only by one-time selection, and the execution result of software data downloading is seen through the step of displaying the execution result of the application, so that the user experience is improved.
And the client executes the steps of acquiring the encrypted software data, decrypting the software data, downloading the installation package and the like through the local system service.
In this embodiment, a method for authorized installation of software at an enterprise client is provided, which obtains encrypted software data; decrypting the software data and downloading the software installation package according to the decrypted software data; when the software installation package passes the verification, releasing a pre-configured authorization program; setting and encrypting account data corresponding to the software installation package; and sending the account data so that the authorization program operates the software installation package according to the administrator account. The invention improves the software installation function of the enterprise client, expands the software installation range and improves the user experience degree on the premise of not reducing the safety.
Example 2
Fig. 3 is a schematic block diagram of a software authorization installation apparatus of an enterprise client in an embodiment of the present invention, which may specifically include the following modules: a fetch module 210, a data decryption module 220, a first check module 231, a second check module 232, a setup module 240, and a first send module 250.
The obtaining module 210 is configured to obtain the encrypted software data.
A data decryption module 220 for decrypting the software data and downloading the software installation package according to the decrypted software data,
the first checking module 231 is used for releasing the pre-configured authorization program when the software installation package passes the checking; and the authorization program is used for acquiring and authorizing the installation of the software installation package with the authority of the administrator under the condition that the user operates under the authority.
And the second check module 232 pushes the alarm information to the application platform when the software installation package fails to check.
A setting module 240, configured to set and encrypt account data corresponding to the software installation package; the account data includes an administrator account.
The first sending module 250 is configured to send the account data, so that the authorization program runs the software installation package according to the administrator account.
When a user clicks an application platform (web portal) installed on a client, after a software type to be installed is selected through decryption displayed by the application platform, the obtaining module 210 may obtain encrypted software data corresponding to the software type from a server through a background interface. Therefore, users without the client can obtain different types of software installation packages according to own requirements, personalized customization is realized, system resources are further saved, and the range of the types of software installation supported by the client is expanded. The software data may include basic information of the software installation package, network download address information of the software installation package, hash check code of the software installation package, and the like.
It should be noted that the server may be a single server or a server cluster, and may be specifically determined according to the data volume and throughput corresponding to the number of clients that need to be served. The number and variety of clients may also be varied.
After the encrypted software data is decrypted, after the data decryption module 220 downloads the software installation package according to the network download address information of the software installation package, the downloaded software installation package may be maliciously tampered by other programs on the server, so that the downloaded software installation package needs to be checked before the software installation package is operated, and the software installation package can be operated only after the software installation package is checked to be passed. For example, whether the downloaded software installation package is correct can be checked according to the hash check code of the software installation package, and whether the downloaded software installation package is correct can also be checked according to the encrypted data of the software installation package, so that the safety of client software installation can be further improved.
After the software installation package passes the verification, the first verification module 231 completes the pre-configuration and stores the authorization program temporarily stored in the local system service in another set path of the client. The setting path may be determined according to specific situations and is not particularly limited.
After the software installation package fails to pass the verification, the second verification module 232 sends an alarm message of the download error to the application platform, and the application platform submits a record of the download error to the background and then ends the installation process of the software installation package.
The setup module 240 may create an account number data corresponding to the software installation package and send it to the authorization program. The account data is time sensitive and may include an administrator account. The client generates a random strong password while generating account data, wherein the random strong password is 20 bits of hash check codes carrying upper and lower case letters, numbers or special accords. The method can avoid the leakage of the account data temporarily generated in the software installation process, and further improve the safety of the client software installation.
In one possible implementation, the software authorization installation system further includes:
the second sending module is used for sending notification information to the application platform; the notification information is used to cause the application platform to run the authorization program.
Specifically, the second sending module invokes the authorization program with the current user right through a preset private protocol, that is, the protocol of the local application is invoked by an interactive page supporting the application platform through a preset registry key value, so that the authorization program operates.
The account data includes an administrator account password, and the software authorization installation system further includes:
the first receiving module is used for resetting the account number and the password of the administrator when receiving first prompt information sent by the authorization program; the first prompt message is used for representing that the authorized program starts the installation package of the installation software.
The second receiving module is used for deleting the administrator account and the authorization program when receiving second prompt information sent by the authorization program; the second prompt message is used for representing that the authorized program finishes installing the software installation package.
When the first receiving module receives prompt information of 'installation start' sent by the authorization program, the random strong password is immediately generated again and the temporarily generated administrator account password is modified, so that the temporarily generated administrator account password of the software installation package in the installation process is prevented from being leaked, the risk that the temporarily generated administrator account password is hijacked by the memory and acquired is reduced, and the software installation safety is ensured.
When the second receiving module receives prompt information of 'installation completion' sent by the authorization program, the client performs cleaning work of software installation, deletes the administrator account password temporarily generated locally, and deletes the authorization program. Therefore, the temporarily generated administrator account password of the software installation package is prevented from being leaked after the installation is finished, the risk that the temporarily generated administrator account password is hijacked by the memory and acquired is reduced, and the safety of software installation is also ensured.
In this embodiment, a software authorization installation apparatus for an enterprise client is provided, where an obtaining module obtains encrypted software data; the data decryption module decrypts the software data and downloads the software installation package according to the decrypted software data; when the software installation package passes the verification, the first verification module releases the pre-configured authorization program; the setting module sets and encrypts account data corresponding to the software installation package; the first sending module sends the account data so that the authorization program runs the software installation package according to the administrator account. The invention improves the software installation function of the enterprise client, expands the software installation range and improves the user experience degree on the premise of not reducing the safety.
Example 3
Fig. 4 is a schematic structural diagram of an electronic device provided in this embodiment. The electronic device includes a memory, a processor and a computer program stored in the memory and executable on the processor, and the processor executes the program to implement the software authorization installation method of the enterprise client according to embodiment 1, and the electronic device 60 shown in fig. 4 is only an example and should not bring any limitation to the function and the scope of the application of the embodiment of the present invention.
The electronic device 60 may be embodied in the form of a general purpose computing device, which may be a server device, for example. The components of the electronic device 60 may include, but are not limited to: the at least one processor 61, the at least one memory 62, and a bus 63 connecting the various system components (including the memory 62 and the processor 61).
The bus 63 includes a data bus, an address bus, and a control bus.
The memory 62 may include volatile memory, such as Random Access Memory (RAM)621 and/or cache memory 622, and may further include Read Only Memory (ROM) 623.
The memory 62 may also include a program/utility 625 having a set (at least one) of program modules 624, such program modules 624 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
The processor 61 executes various functional applications and data processing, such as a software authorization installation method of the enterprise client of embodiment 1 of the present invention, by running the computer program stored in the memory 62.
The electronic device 60 may also communicate with one or more external devices 64 (e.g., keyboard, pointing device, etc.). Such communication may be through an input/output (I/O) interface 65. Also, model-generating device 60 may also communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet) via network adapter 66. As shown, a network adapter 66 communicates with the other modules of the model-generating device 60 over a bus 63. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the model-generating device 60, including but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, RAID (disk array) systems, tape drives, and data backup storage systems, etc.
It should be noted that although in the above detailed description several units/modules or sub-units/modules of the electronic device are mentioned, such a division is merely exemplary and not mandatory. Indeed, the features and functionality of two or more of the units/modules described above may be embodied in one unit/module according to embodiments of the invention. Conversely, the features and functions of one unit/module described above may be further divided into embodiments by a plurality of units/modules.
Example 4
The present embodiment provides a computer-readable storage medium on which a computer program is stored, which when executed by a processor, implements the software authorization installation method of the enterprise client of embodiment 1.
More specific examples, among others, that the readable storage medium may employ may include, but are not limited to: a portable disk, a hard disk, random access memory, read only memory, erasable programmable read only memory, optical storage device, magnetic storage device, or any suitable combination of the foregoing.
In a possible implementation, the invention can also be implemented in the form of a program product comprising program code for causing a terminal device to execute a software authorization installation method implementing the enterprise client of embodiment 1, when said program product is run on the terminal device.
Where program code for carrying out the invention is written in any combination of one or more programming languages, the program code may be executed entirely on the user device, partly on the user device, as a stand-alone software package, partly on the user device and partly on a remote device or entirely on the remote device.
While specific embodiments of the invention have been described above, it will be understood by those skilled in the art that this is by way of example only, and that the scope of the invention is defined by the appended claims. Various changes and modifications to these embodiments may be made by those skilled in the art without departing from the spirit and scope of the invention, and these changes and modifications are within the scope of the invention.

Claims (12)

1. A software authorization installation method of an enterprise client is characterized by comprising the following steps:
acquiring encrypted software data;
decrypting the software data and downloading a software installation package according to the decrypted software data;
when the software installation package passes the verification, releasing a pre-configured authorization program; the authorization program is used for representing that the software installation package is installed after the authority of an administrator is obtained under the user authority operation condition;
setting and encrypting account data corresponding to the software installation package; the account data comprises an administrator account;
and sending the account data to enable the authorization program to operate the software installation package according to the administrator account.
2. The method of claim 1, wherein after the step of releasing the pre-configured authorization procedure, the method further comprises:
sending notification information to the application platform; the notification information is used for enabling the application platform to run the authorization program.
3. The method of claim 1, wherein the account data includes an administrator account password, the method further comprising:
when first prompt information sent by the authorization program is received, resetting the administrator account password; the first prompt message is used for representing that the software installation package is installed after the authorization program is started.
4. The method of claim 3, wherein the method further comprises:
when second prompt information sent by the authorization program is received, deleting the administrator account and the authorization program; the second prompt message is used for representing that the authorized program finishes installing the software installation package.
5. The method of claim 1, wherein the method further comprises:
and when the software installation package fails to pass the verification, pushing alarm information to the application platform.
6. A software authorization installation apparatus for an enterprise client, said software authorization installation system comprising:
the acquisition module is used for acquiring the encrypted software data;
the data decryption module is used for decrypting the software data and downloading a software installation package according to the decrypted software data;
the first checking module is used for releasing a pre-configured authorization program when the software installation package passes the checking; the authorization program is used for representing that the software installation package is obtained and authorized to be installed by the authority of an administrator under the condition of user authority operation;
the setting module is used for setting and encrypting account data corresponding to the software installation package; the account data includes an administrator account;
and the first sending module is used for sending the account data so that the authorization program operates the software installation package according to the administrator account.
7. The software authorization installation system of an enterprise client of claim 6, wherein the software authorization installation system further comprises:
the second sending module is used for sending notification information to the application platform; the notification information is used for enabling the application platform to run the authorization program.
8. The software authorization installation system of an enterprise client of claim 7, wherein the account data comprises an administrator account password, the software authorization installation system further comprising:
the first receiving module is used for resetting the administrator account password when receiving first prompt information sent by the authorization program; the first prompt message is used for representing that the software installation package is installed after the authorization program is started.
9. The software authorization installation system of an enterprise client of claim 8, wherein the software authorization installation system further comprises:
the second receiving module is used for deleting the administrator account and the authorization program when receiving second prompt information sent by the authorization program; the second prompt message is used for representing that the authorized program finishes installing the software installation package.
10. The software authorization installation system of an enterprise client of claim 6, wherein the software authorization installation system further comprises:
and the second checking module is used for pushing the alarm information to the application platform when the software installation package fails to check.
11. An electronic device comprising a processor, a memory, and a computer program stored on the memory and executable on the processor, the computer program being executed by the processor to perform the software authorization installation method of an enterprise client as claimed in any one of claims 1-5.
12. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out a method for software authorization installation of an enterprise client according to any one of claims 1-5.
CN202210494903.4A 2022-05-07 2022-05-07 Software authorization installation method, device, equipment and medium for enterprise client Pending CN114995838A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210494903.4A CN114995838A (en) 2022-05-07 2022-05-07 Software authorization installation method, device, equipment and medium for enterprise client

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210494903.4A CN114995838A (en) 2022-05-07 2022-05-07 Software authorization installation method, device, equipment and medium for enterprise client

Publications (1)

Publication Number Publication Date
CN114995838A true CN114995838A (en) 2022-09-02

Family

ID=83024564

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210494903.4A Pending CN114995838A (en) 2022-05-07 2022-05-07 Software authorization installation method, device, equipment and medium for enterprise client

Country Status (1)

Country Link
CN (1) CN114995838A (en)

Similar Documents

Publication Publication Date Title
EP2008220B1 (en) Service management framework
US9766914B2 (en) System and methods for remote maintenance in an electronic network with multiple clients
US8230222B2 (en) Method, system and computer program for deploying software packages with increased security
CN112039826B (en) Login method and device applied to applet end, electronic equipment and readable medium
US8131830B2 (en) System and method for providing support services using administrative rights on a client computer
CN103577206A (en) Method and device for installing application software
CN103713904A (en) Method, related device and system for installing applications in working area of mobile terminal
CN107689943B (en) Data encryption method, user terminal, server and system
US11663347B2 (en) Systems and methods for maintaining immutable data access logs with privacy
CN102945337A (en) On-line self-help management method and system of Subversion user password
CN111400760B (en) Method, device, server and storage medium for web application to access database
CN114598481A (en) Authorization authentication method, device, electronic equipment and storage medium
US7454791B1 (en) Method and system for checking the security on a distributed computing environment
US8732456B2 (en) Enterprise environment disk encryption
US20130238905A1 (en) Data shielding system and method
CN103559430A (en) Application account management method and device based on android system
WO2021101560A1 (en) Recovery keys
CN114995838A (en) Software authorization installation method, device, equipment and medium for enterprise client
CN110674514B (en) Hard disk grading method, device and system
CN113852621A (en) License information determination method and device based on Jenkins server and storage medium
CN114444080A (en) Server configuration method and computer readable storage medium
CN116089909A (en) Method and device for realizing micro-service license authorization
CN113407227A (en) Program management method and device, equipment and medium
CN115577371A (en) Firmware processing method, device and platform
CN118051899A (en) Login verification method, login verification device, computer equipment, storage medium and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination