CN117494074A - Software use authorization method and system based on floating license - Google Patents

Software use authorization method and system based on floating license Download PDF

Info

Publication number
CN117494074A
CN117494074A CN202311309252.8A CN202311309252A CN117494074A CN 117494074 A CN117494074 A CN 117494074A CN 202311309252 A CN202311309252 A CN 202311309252A CN 117494074 A CN117494074 A CN 117494074A
Authority
CN
China
Prior art keywords
software
license
current
white list
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311309252.8A
Other languages
Chinese (zh)
Inventor
王馨
王小焕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongfeng Motor Corp
Original Assignee
Dongfeng Motor Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongfeng Motor Corp filed Critical Dongfeng Motor Corp
Priority to CN202311309252.8A priority Critical patent/CN117494074A/en
Publication of CN117494074A publication Critical patent/CN117494074A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Automation & Control Theory (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Data Mining & Analysis (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a software use authorization method and system based on floating license, and relates to the field of software use authorization. The method comprises the following steps: determining a white list authorized user through user information; when the application party belongs to the white list authorized user, opening a software use license to the application party; when the application party belongs to the white list authorized user and all the licenses are used, judging whether to open the software use license according to the priority of the current application party; and when the application party does not belong to the white list authorized user and all the licenses are in use, prohibiting the application party from using the software. The invention realizes that only authorized users can use the software by using the 'floating license' users through a user white list mechanism, and unauthorized users cannot use the software, thereby reasonably using limited license resources and improving the use quality of the software.

Description

Software use authorization method and system based on floating license
Technical Field
The invention relates to the field of software use authorization, in particular to a software use authorization method and system based on floating license.
Background
Permission: software permissions refer to paid or gratuitous actions granted to a software user that allow the use of the software. It is the right that the software developer or owner grants to the user that the software can be used under explicit authorization, as long as paid licensing fees or in line with paid licensing fees. Commercial license refers to a license of software granted to a user in a paid form, which has the exclusive property that the user cannot provide the software to others, and cannot transfer the service cost of the software to other third parties, and the medium of such software is default and must be purchased. Commercial software is an important component of the software licensing regime and is also the most commonly applied approach by software developers. In general, business licensing refers to the customization of some private rights by a software owner to a user without affecting the original functionality of the software, including the rights of multiple machines to use the software, controlling the updating of the software, and so forth.
CAD: (Computer Aided Diagnosis) was created in the 60 s, and was a research plan for interactive graphics was proposed by the university of Massa Medicata, and only the United states general Motor company and the United states Boeing airline used self-developed interactive graphics systems due to the expensive hardware facilities at that time. Computer aided design (CAD-Computer Aided Design) refers to the use of computers and their graphics devices to assist designers in performing design work.
CAE: (Computer Aided Engineering) refers to computer-aided engineering in engineering design, which refers to analysis of structural mechanical properties of complex engineering and products by computer-aided solution, optimization of structural properties and the like, and each link of engineering (production) is organically organized, and the key is to integrate related information so that the related information is generated and exists in the whole life cycle of the engineering (product). The CAE software can perform static structure analysis and dynamic analysis; study of linear and nonlinear problems; analysis structures (solids), fluids, electromagnetism, etc.
Floating permissions: the license is located on a central license server connected to the network. The workstation may take the license from the server as needed, but can only retrieve if there is an excess license, and if all the licenses have been used by other users, it has to wait until one license becomes available. The license is acquired when the user interface or solver is started, and released when the user interface or solver is exited to complete the calculation.
When an enterprise develops an automobile, a large amount of CAD and CAE software is used, however, the purchase of the software is costly, after the purchase, a CAD/CAE manufacturer can issue a license to the enterprise, and the license controls the software to be opened for use. Because the purchase quantity of the software license is not large, the software license cannot be distributed to each user for use, so that some users who do not need to use the software can open the software license, and license waste is caused. For example, when the CATIA software license is purchased, the CATIA software license is used for a research and development project, because the CATIA software license is concentrated on a license server, any user installs the CATIA software and configures the license server IP, the license can be used, users outside certain project groups can install the CATIA software for research and development or learning and other purposes, if the user opens the CATIA software and connects the license, the license is not related all the time, and even if the user is working or is doing other things, the CATIA software is not related, the license is always occupied by the user, so that the license is wasted greatly, other users cannot use the license, and problems such as project delay are caused.
For this reason, the use of users is limited by adopting a manual management mode at present, for example, an operation and maintenance engineer controls which users can use and which users cannot use through a mode of in-situ installation and uninstallation; if CAE and CAD are of various types, the operation and maintenance engineers have huge workload and are unfavorable for management, and often the operation and maintenance engineers are not easy to develop projects smoothly. Meanwhile, the installation of the software can be carried out by a user, and the software license is occupied and wastefully used.
Disclosure of Invention
Aiming at the defects in the prior art, the invention solves the technical problems as follows: how to perform software use authorization according to the preset white list and the calculated priority, so as to reasonably use the licensed resources.
In order to achieve the above object, the method for authorizing software use based on floating license provided by the present invention comprises the following steps: determining a white list authorized user through user information; when the application party belongs to the white list authorized user, opening a software use license to the application party; when the application party belongs to the white list authorized user and all the licenses are used, judging whether to open the software use license according to the priority of the current application party; and when the application party does not belong to the white list authorized user and all the licenses are in use, prohibiting the application party from using the software.
On the basis of the above technical solution, when the applicant belongs to the whitelist authorized user and all licenses are in use, the process of judging whether to open the software use license according to the priority of the current applicant includes: calculating priority scores according to application information of the current application party, judging whether the priority scores of the current application party are the lowest compared with the priority scores of all the users in use, and if so, prohibiting the current application party from using the software; otherwise, opening the software use permission for the current applicant, prohibiting the user with the lowest priority grade from continuing to use the software, and if a plurality of lowest priority grades exist, prohibiting the user with the lowest priority grade and the longest use time from continuing to use the software.
On the basis of the technical scheme, the application information comprises an expected task emergency level, an expected task relevance level and a software use time length level, and the task relevance comprises task information and execution dates of upstream tasks and downstream tasks; the calculation formula of the priority score S is as follows: s=a×p1+b×p2+c×p3, where a is the actual task urgency, b is the actual task relevance level, and c is the software use time length level; p1, p2 and p3 are weights of a, b, c, p1+p2+p3=100%, p1: p2: p3=1.2 to 1.4:0.9 to 1.0:0.9 to 10.
Based on the technical scheme, the process for determining the white list authorized user through the user information comprises the following steps: acquiring user information, judging whether an application party corresponding to the current user information exists in a white list authorized user set, if yes, determining that the current application party is a white list authorized user, otherwise, when the user information accords with preset open conditions of software use permission, determining that the current application party is a white list authorized user, and storing the user information of the current application party in the white list authorized user set; the method further comprises the steps of: when the applicant does not belong to the white list authorized user and there is an available license, the use license is opened to the current applicant or the current applicant is prohibited from using the software.
Based on the technical scheme, the method comprises the following specific steps:
s1: after receiving the application sent by the applicant, obtaining user information from the application, judging whether the applicant corresponding to the current user information exists in the white list authorized user set, if so, determining that the current applicant is the white list authorized user, storing the current user information into the white list set, and then turning to S3, otherwise turning to S2;
s2: judging whether the user information accords with the open condition of the software use permission or not, if so, determining that the current application party is a white list authorized user, storing the current user information into a white list set, and then turning to S3; otherwise, confirming the use condition of the license: when all licenses are in use, prohibiting the current applicant from using the software; when there is an available license, opening a software use license to the current applicant;
s3: judging whether all licenses are used, if so, turning to S4, otherwise, opening the software use license for the current applicant;
s4: after calculating and storing priority scores according to the application information of the current application party, turning to S5; the calculation formula of the priority score S is: s=a×p1+b×p2+c×p3, p1 is 40%, p2 and p3 are both 30%;
s5: judging whether the priority scores of the current application party are the lowest compared with the priority scores of all the users in use, if so, prohibiting the current application party from using the software; otherwise, opening a software use permission for the current applicant, and prohibiting a user with the lowest priority score from continuously using the software; if there are a plurality of lowest priority scores, the user with the lowest priority score and the longest service time is forbidden to continue using the software.
The invention provides a software use authorization system based on floating license, which comprises a white list authentication module and a software license module;
the white list authentication module is used for: determining a white list authorized user through user information;
the software license module is used for: when the application party belongs to the white list authorized user, opening a software use license to the application party; when the application party belongs to the white list authorized user and all the licenses are used, judging whether to open the software use license according to the priority of the current application party; and when the application party does not belong to the white list authorized user and all the licenses are in use, prohibiting the application party from using the software.
On the basis of the technical scheme, when the application party belongs to the white list authorized user and all licenses are in use, the software license module judges whether to open the software use license according to the priority of the current application party, and the workflow comprises the following steps: calculating priority scores according to application information of the current application party, judging whether the priority scores of the current application party are the lowest compared with the priority scores of all the users in use, and if so, prohibiting the current application party from using the software; otherwise, opening the software use permission for the current applicant, prohibiting the user with the lowest priority grade from continuing to use the software, and if a plurality of lowest priority grades exist, prohibiting the user with the lowest priority grade and the longest use time from continuing to use the software.
On the basis of the technical scheme, the application information comprises an expected task emergency level, an expected task relevance level and a software use time length level, and the task relevance comprises task information and execution dates of upstream tasks and downstream tasks; the calculation formula of the priority score S is as follows: s=a×p1+b×p2+c×p3, where a is the actual task urgency, b is the actual task relevance level, and c is the software use time length level; p1, p2 and p3 are weights of a, b, c, p1+p2+p3=100%, p1: p2: p3=1.2 to 1.4:0.9 to 1.0:0.9 to 10.
On the basis of the technical scheme, the flow of determining the white list authorized user by the white list authentication module through the user information is as follows: acquiring user information, judging whether an application party corresponding to the current user information exists in a white list authorized user set, if yes, determining that the current application party is a white list authorized user, otherwise, when the user information accords with preset open conditions of software use permission, determining that the current application party is a white list authorized user, and storing the user information of the current application party in the white list authorized user set; the software licensing module is further configured to: when the applicant does not belong to the white list authorized user and there is an available license, the use license is opened to the current applicant or the current applicant is prohibited from using the software.
Based on the technical scheme, the workflow of the system comprises the following steps:
s1: after receiving the application sent by the applicant, the software license module acquires user information from the application, the white list authentication module judges whether the applicant corresponding to the current user information exists in a white list authorized user set, if yes, the current applicant is determined to be the white list authorized user, the current user information is stored in the white list set and then is transferred to S3, otherwise, the process is transferred to S2;
s2: the white list authentication module judges whether the user information accords with the open condition of the software use permission or not, if so, the current application party is determined to be a white list authorized user, and the current user information is stored in a white list set and then is transferred to S3; otherwise, the software license module confirms the use condition of the license: when all licenses are in use, prohibiting the current applicant from using the software; when there is an available license, opening a software use license to the current applicant;
s3: the software license module judges whether all licenses are used, if yes, the software license module goes to S4, otherwise, the software license module opens the software use license to the current applicant;
s4: the software license module calculates and stores priority scores according to the application information of the current application party, and then the software license module goes to S5; the calculation formula of the priority score S is: s=a×p1+b×p2+c×p3, p1 is 40%, p2 and p3 are both 30%;
s5: the software license module judges whether the priority score of the current application party is the lowest compared with the priority scores of all the users in use, if so, the current application party is forbidden to use the software; otherwise, opening a software use permission for the current applicant, and prohibiting a user with the lowest priority score from continuously using the software; if there are a plurality of lowest priority scores, the user with the lowest priority score and the longest service time is forbidden to continue using the software.
Compared with the prior art, the invention has the advantages that:
compared with the prior art that the user can use the software by configuring the license server IP, the invention realizes the purpose that only authorized users can use the software by floating license users through a user white list mechanism, and unauthorized users can not use the software, thereby reasonably using limited license resources and improving the use quality of the software.
Meanwhile, the invention sets priority for each user, when the license is used, the first use with high priority is ensured, so as to realize the effect of 'important user priority use', and further improve the rationality of the licensed resource and the software use quality.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a method for authorizing software use based on floating license in an embodiment of the invention.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present application based on the embodiments herein.
The flow diagrams depicted in the figures are merely illustrative and not necessarily all of the elements and operations/steps are included or performed in the order described. For example, some operations/steps may be further divided, combined, or partially combined, so that the order of actual execution may be changed according to actual situations.
The development process of the present invention will be briefly described first.
After the inventor researches the prior art, the technical problems to be solved are as follows: how to reasonably use the licensed resources to achieve the effect of "let users who really need to use even use", but the inventor searches according to the problem and finds out that a specific means for solving the technical problem is not available. Then, after further development, the inventors split the above-mentioned large technical problem, that is, in order to solve the above-mentioned technical problem, the following problems need to be dealt with:
(1) Statistics may use a list of users of the software;
(2) The user can use the software by installing the software and configuring the license server IP;
(3) The software comprises a plurality of modules, and whether white list users can be respectively set for the modules or not;
(4) Adding a white list user of software license;
(5) Whether the software can be used by non-whitelisted users;
(6) And when the users with low priority meet the application of the white list users, the users with low priority are preferentially allocated to the white list users.
On the basis, the software use authorization method based on floating license in the embodiment of the invention comprises the following steps: determining a white list authorized user through user information; when the applicant belongs to the white list authorized user, opening a software use license (i.e. issuing a license) to the applicant; when the application party belongs to the white list authorized user and all the licenses are used, judging whether to open the software use license according to the priority of the current application party; and when the application party does not belong to the white list authorized user and all the licenses are in use, prohibiting the application party from using the software.
Therefore, compared with the prior art that the user can use the software by configuring the license server IP, the invention realizes the purpose that only authorized users can use the software by floating the license users through a user white list mechanism, and unauthorized users can not use the software, thereby reasonably using limited license resources and improving the use quality of the software.
Meanwhile, the invention sets priority for each user, when the license is used, the first use with high priority is ensured, so as to realize the effect of 'important user priority use', and further improve the rationality of the licensed resource and the software use quality.
Preferably, the process of determining the white list authorized user through the user information in the method comprises the following steps:
after receiving the application sent by the applicant, obtaining user information from the application, judging whether the applicant corresponding to the current user information exists in the white list authorized user set, if yes, determining that the current applicant is the white list authorized user, otherwise, when the user information accords with preset open conditions of software use permission (such as task emergency degree, task relevance and the like accords with preset indexes), determining that the current applicant is the white list authorized user, and storing the user information of the current applicant in the white list authorized user set.
Preferably, in the method, when the applicant belongs to the white list authorized user and all the licenses are in use, the process of judging whether to open the software use license according to the priority of the current applicant includes: calculating priority scores according to application information of the current application party, judging whether the priority scores of the current application party are the lowest compared with the priority scores of all the users in use, and if so, prohibiting the current application party from using the software; otherwise, opening the software use permission for the current applicant, prohibiting the user with the lowest priority grade from continuing to use the software, and if a plurality of lowest priority grades exist, prohibiting the user with the lowest priority grade and the longest use time from continuing to use the software.
Preferably, the application information includes a desired task emergency level, a desired task association level and a software use time duration level, and the task association includes task information and execution dates of upstream tasks and downstream tasks; the calculation formula of the priority score S is as follows: s=a×p1+b×p2+c×p3, where a is the actual task urgency, b is the actual task relevance level, a and b are obtained according to the desired task relevance level, and c is the software use time-length level; p1, p2 and p3 are weights of a, b, c, p1+p2+p3=100%, p1: p2: p3=1.2 to 1.4:0.9 to 1.0:0.9 to 10.
The design principle of the calculation formula is as follows:
(1) Judging whether the user is an important user needing to be used preferentially or not, wherein the main conditions of the important user are task urgency, task correlation learning and software use duration in sequence, so that the weight proportion is reduced in sequence;
(2) Based on the step (1), the objective actual task emergency level and the actual task relevance level are obtained according to the expected task emergency level and the expected task relevance level filled by the user, and specific calculation logic can be reasonably set according to different requirements.
Preferably, the method further comprises the steps of: when the applicant does not belong to the whitelisted authorized user and there is a license available, the processing is done in either of two ways:
(1) The use permission is opened to the current applicant in a conventional manner, namely, "there is still a location available, and the priority user is forbidden to use.
(2) The software is still prohibited from being used by the current applicant, the use of non-whitelist authorized users is avoided by the method, the guarantee is provided for the use of whitelist authorized users to the maximum extent, and the method is applicable to important software or users.
The method of the invention is illustrated by a specific example with reference to fig. 1.
S1: after receiving the application sent by the applicant, obtaining user information from the application, judging whether the applicant corresponding to the current user information exists in the white list authorized user set, if so, determining that the current applicant is the white list authorized user, storing the current user information into the white list set, and then turning to S3, otherwise turning to S2.
S2: judging whether the user information accords with the open condition of the software use permission or not, if so, determining that the current application party is a white list authorized user, storing the current user information into a white list set, and then turning to S3; otherwise, whether the software use license is opened for the current applicant is determined according to the use condition of the license, and the process is finished.
The specific flow of determining whether to open the software use license for the current applicant according to the use condition of the license is as follows: when all licenses are in use, prohibiting the current applicant from using the software; when there is a license available, the license is opened to the current applicant.
S3: and judging whether all the licenses are used, if so, turning to S4, otherwise, opening the software use license to the current applicant, and ending.
S4: after calculating and storing priority scores according to application information of a current application party, turning to S5, wherein the application information comprises an expected task emergency level, an expected task relevance level and a software use time-length level, and the task relevance comprises task information and execution dates of upstream tasks and downstream tasks; the calculation formula of the priority score S is: s=a×p1+b×p2+c×p3, p1 is 40%, and p2 and p3 are both 30%.
S5: judging whether the priority score of the current application party is the lowest compared with the priority scores of all the users in use, if so, prohibiting the current application party from using the software, and ending; otherwise, opening a software use permission for the current applicant, and prohibiting a user with the lowest priority score from continuously using the software; if a plurality of lowest priority scores exist, the user with the lowest priority score and the longest service time is forbidden to continue to use the software, and the software is ended.
The software use authorization system based on floating license in the embodiment of the invention comprises a policy configuration module arranged at a management end, a white list authentication module arranged on a license server and a software license module.
The policy configuration module is used for: the workflow of the whitelist authentication module and the software licensing module (e.g., whitelist configuration rules, software licensing mechanisms, etc., below) is set and issued.
The white list authentication module is used for: determining a white list authorized user through user information; the specific flow is as follows: acquiring user information, judging whether an application party corresponding to the current user information exists in a white list authorized user set, if yes, determining that the current application party is a white list authorized user, otherwise, when the user information accords with preset open conditions of software use permission, determining that the current application party is a white list authorized user, and storing the user information of the current application party in the white list authorized user set; the software licensing module is further configured to: when the applicant does not belong to the white list authorized user and there is an available license, the use license is opened to the current applicant or the current applicant is prohibited from using the software.
The software license module is used for: when the application party belongs to the white list authorized user, opening a software use license to the application party; when the application party belongs to the white list authorized user and all the licenses are used, judging whether to open the software use license according to the priority of the current application party; and when the application party does not belong to the white list authorized user and all the licenses are in use, prohibiting the application party from using the software.
When the application party belongs to a white list authorized user and all licenses are used, the software license module judges whether to open the software use license according to the priority of the current application party, and the workflow comprises the following steps: calculating priority scores according to application information of the current application party, judging whether the priority scores of the current application party are the lowest compared with the priority scores of all the users in use, and if so, prohibiting the current application party from using the software; otherwise, opening the software use permission for the current applicant, prohibiting the user with the lowest priority grade from continuing to use the software, and if a plurality of lowest priority grades exist, prohibiting the user with the lowest priority grade and the longest use time from continuing to use the software.
The application information comprises an expected task emergency level, an expected task relevance level and a software use time length level, and the task relevance comprises task information and execution dates of upstream tasks and downstream tasks; the calculation formula of the priority score S is as follows: s=a×p1+b×p2+c×p3, where a is the actual task urgency, b is the actual task relevance level, and c is the software use time length level; p1, p2 and p3 are weights of a, b, c, p1+p2+p3=100%, p1: p2: p3=1.2 to 1.4:0.9 to 1.0:0.9 to 10.
Those of ordinary skill in the art will appreciate that all or some of the steps, systems, functional modules/units in the apparatus, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between the functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed cooperatively by several physical components. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer-readable storage media, which may include computer-readable storage media (or non-transitory media) and communication media (or transitory media).
The term computer-readable storage medium includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer-readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer-readable storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
By way of example, the computer readable storage medium may be an internal storage unit of the electronic device of the foregoing embodiments, such as a hard disk or a memory of the electronic device. The computer readable storage medium may also be an external storage device of the electronic device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the electronic device.
The foregoing is merely a specific implementation of the embodiment of the present invention, but the protection scope of the embodiment of the present invention is not limited thereto, and any person skilled in the art may easily think of various equivalent modifications or substitutions within the technical scope of the embodiment of the present invention, and these modifications or substitutions should be covered in the protection scope of the embodiment of the present invention. Therefore, the protection scope of the embodiments of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A method for authorizing use of software based on floating license, the method comprising the steps of: determining a white list authorized user through user information; when the application party belongs to the white list authorized user, opening a software use license to the application party; when the application party belongs to the white list authorized user and all the licenses are used, judging whether to open the software use license according to the priority of the current application party; and when the application party does not belong to the white list authorized user and all the licenses are in use, prohibiting the application party from using the software.
2. The method for authorizing software use based on floating license as recited in claim 1, wherein the process of determining whether to open a software use license for the current applicant according to the priority of the current applicant when the applicant belongs to a whitelisted authorized user and all licenses are in use comprises: calculating priority scores according to application information of the current application party, judging whether the priority scores of the current application party are the lowest compared with the priority scores of all the users in use, and if so, prohibiting the current application party from using the software; otherwise, opening the software use permission for the current applicant, prohibiting the user with the lowest priority grade from continuing to use the software, and if a plurality of lowest priority grades exist, prohibiting the user with the lowest priority grade and the longest use time from continuing to use the software.
3. The float license-based software usage authorization method of claim 2, wherein the application information includes a desired task urgency level, a desired task relevance level, and a software usage time-duration level, the task relevance including task information and execution dates of upstream and downstream tasks; the calculation formula of the priority score S is as follows: s=a×p1+b×p2+c×p3, where a is the actual task urgency, b is the actual task relevance level, and c is the software use time length level; p1, p2 and p3 are weights of a, b, c, p1+p2+p3=100%, p1: p2: p3=1.2 to 1.4:0.9 to 1.0:0.9 to 10.
4. A method of float-license based software usage authorization according to any one of claims 1 to 3, wherein the process of determining whitelist authorized users from user information is: acquiring user information, judging whether an application party corresponding to the current user information exists in a white list authorized user set, if yes, determining that the current application party is a white list authorized user, otherwise, when the user information accords with preset open conditions of software use permission, determining that the current application party is a white list authorized user, and storing the user information of the current application party in the white list authorized user set; the method further comprises the steps of: when the applicant does not belong to the white list authorized user and there is an available license, the use license is opened to the current applicant or the current applicant is prohibited from using the software.
5. A method for authorizing use of software based on floating license as defined in any one of claims 1 to 3, the method comprising the specific steps of:
s1: after receiving the application sent by the applicant, obtaining user information from the application, judging whether the applicant corresponding to the current user information exists in the white list authorized user set, if so, determining that the current applicant is the white list authorized user, storing the current user information into the white list set, and then turning to S3, otherwise turning to S2;
s2: judging whether the user information accords with the open condition of the software use permission or not, if so, determining that the current application party is a white list authorized user, storing the current user information into a white list set, and then turning to S3; otherwise, confirming the use condition of the license: when all licenses are in use, prohibiting the current applicant from using the software; when there is an available license, opening a software use license to the current applicant;
s3: judging whether all licenses are used, if so, turning to S4, otherwise, opening the software use license for the current applicant;
s4: after calculating and storing priority scores according to the application information of the current application party, turning to S5; the calculation formula of the priority score S is: s=a×p1+b×p2+c×p3, p1 is 40%, p2 and p3 are both 30%;
s5: judging whether the priority scores of the current application party are the lowest compared with the priority scores of all the users in use, if so, prohibiting the current application party from using the software; otherwise, opening a software use permission for the current applicant, and prohibiting a user with the lowest priority score from continuously using the software; if there are a plurality of lowest priority scores, the user with the lowest priority score and the longest service time is forbidden to continue using the software.
6. A software use authorization system based on floating license, characterized in that the system comprises a whitelist authentication module and a software license module;
the white list authentication module is used for: determining a white list authorized user through user information;
the software license module is used for: when the application party belongs to the white list authorized user, opening a software use license to the application party; when the application party belongs to the white list authorized user and all the licenses are used, judging whether to open the software use license according to the priority of the current application party; and when the application party does not belong to the white list authorized user and all the licenses are in use, prohibiting the application party from using the software.
7. The floating license-based software usage authorization system according to claim 6, wherein the workflow for the software license module to determine whether to open a software usage license for the current applicant based on the priority of the current applicant when the applicant belongs to a whitelisted authorized user and all licenses are in use comprises: calculating priority scores according to application information of the current application party, judging whether the priority scores of the current application party are the lowest compared with the priority scores of all the users in use, and if so, prohibiting the current application party from using the software; otherwise, opening the software use permission for the current applicant, prohibiting the user with the lowest priority grade from continuing to use the software, and if a plurality of lowest priority grades exist, prohibiting the user with the lowest priority grade and the longest use time from continuing to use the software.
8. The floating license-based software usage authorization system according to claim 7, wherein the application information includes a desired task urgency level, a desired task relevance level, and a software usage time period level, the task relevance including task information and execution dates of upstream and downstream tasks; the calculation formula of the priority score S is as follows: s=a×p1+b×p2+c×p3, where a is the actual task urgency, b is the actual task relevance level, and c is the software use time length level; p1, p2 and p3 are weights of a, b, c, p1+p2+p3=100%, p1: p2: p3=1.2 to 1.4:0.9 to 1.0:0.9 to 10.
9. The floating license based software usage authorization system according to any one of claims 6 to 8, wherein the flow of the whitelist authentication module determining whitelist authorized users from the user information is: acquiring user information, judging whether an application party corresponding to the current user information exists in a white list authorized user set, if yes, determining that the current application party is a white list authorized user, otherwise, when the user information accords with preset open conditions of software use permission, determining that the current application party is a white list authorized user, and storing the user information of the current application party in the white list authorized user set; the software licensing module is further configured to: when the applicant does not belong to the white list authorized user and there is an available license, the use license is opened to the current applicant or the current applicant is prohibited from using the software.
10. A floating license based software usage authorization system according to any one of claims 6 to 9, wherein the workflow of the system includes:
s1: after receiving the application sent by the applicant, the software license module acquires user information from the application, the white list authentication module judges whether the applicant corresponding to the current user information exists in a white list authorized user set, if yes, the current applicant is determined to be the white list authorized user, the current user information is stored in the white list set and then is transferred to S3, otherwise, the process is transferred to S2;
s2: the white list authentication module judges whether the user information accords with the open condition of the software use permission or not, if so, the current application party is determined to be a white list authorized user, and the current user information is stored in a white list set and then is transferred to S3; otherwise, the software license module confirms the use condition of the license: when all licenses are in use, prohibiting the current applicant from using the software; when there is an available license, opening a software use license to the current applicant;
s3: the software license module judges whether all licenses are used, if yes, the software license module goes to S4, otherwise, the software license module opens the software use license to the current applicant;
s4: the software license module calculates and stores priority scores according to the application information of the current application party, and then the software license module goes to S5; the calculation formula of the priority score S is: s=a×p1+b×p2+c×p3, p1 is 40%, p2 and p3 are both 30%;
s5: the software license module judges whether the priority score of the current application party is the lowest compared with the priority scores of all the users in use, if so, the current application party is forbidden to use the software; otherwise, opening a software use permission for the current applicant, and prohibiting a user with the lowest priority score from continuously using the software; if there are a plurality of lowest priority scores, the user with the lowest priority score and the longest service time is forbidden to continue using the software.
CN202311309252.8A 2023-10-10 2023-10-10 Software use authorization method and system based on floating license Pending CN117494074A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311309252.8A CN117494074A (en) 2023-10-10 2023-10-10 Software use authorization method and system based on floating license

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311309252.8A CN117494074A (en) 2023-10-10 2023-10-10 Software use authorization method and system based on floating license

Publications (1)

Publication Number Publication Date
CN117494074A true CN117494074A (en) 2024-02-02

Family

ID=89671588

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311309252.8A Pending CN117494074A (en) 2023-10-10 2023-10-10 Software use authorization method and system based on floating license

Country Status (1)

Country Link
CN (1) CN117494074A (en)

Similar Documents

Publication Publication Date Title
Islam et al. A risk assessment framework for automotive embedded systems
US7849017B2 (en) Enforced seat-based licensing
CN102270290B (en) System and method for management of license entitlements in a virtualized environment
JP6245175B2 (en) Risk analysis apparatus, risk analysis method and program
US9443101B2 (en) Low-cost specification and enforcement of a privacy-by-consent-policy for online services
US9245144B2 (en) Secure data container for web applications
CN110809757A (en) Machine learning platform on device enabling sharing of machine learning models between applications
US20130085882A1 (en) Offline Optimization of Computer Software
US8661555B2 (en) Role-based access control over instructions in software code
EP2093693A1 (en) System, method and program for controlling access rights
US9805172B2 (en) System and methods of resource usage using an interoperable management framework
CN103699437A (en) Resource scheduling method and device
US11580206B2 (en) Project-based permission system
US20190102524A1 (en) Reconciling Entitlements in a Digital Rights Management (DRM) Environment
CN111062028A (en) Authority management method and device, storage medium and electronic equipment
US20190018953A1 (en) Methods and systems for tenant aware behavior injection in content metadata service
US9760734B2 (en) Catalog-based user authorization to access to multiple applications
Basile et al. Orchestration of dynamic service product lines with featured modal contract automata
CN117494074A (en) Software use authorization method and system based on floating license
US8601551B2 (en) System and method for a business data provisioning for a pre-emptive security audit
Muthukumaran et al. Producing hook placements to enforce expected access control policies
US11799864B2 (en) Computer systems for regulating access to electronic content using usage telemetry data
CN116257821A (en) Mechanism for specifying allowable change amount of digital media
CN115718666A (en) Fine-grained dynamic authority control method and system for WEB service
Martínez et al. On the need for intellectual property protection in model-driven co-engineering processes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination