Authorization control method and device, authorization method and device and computing equipment

A technology for authorizing documents and equipment information, applied in computing, computer security devices, instruments, etc., to achieve the effect of maintaining copyright, extending authorization expiration time, and preventing modification of system time

Active Publication Date: 2021-04-23
UNIONTECH SOFTWARE TECH CO LTD
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] To this end, the present invention provides an authorization control method, authorization method, authorization device and computing equipment to solve or at least alleviate the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization control method and device, authorization method and device and computing equipment
  • Authorization control method and device, authorization method and device and computing equipment
  • Authorization control method and device, authorization method and device and computing equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028]An exemplary embodiment of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although the exemplary embodiments of the present disclosure are shown in the drawings, it is understood that the present disclosure can be implemented in various forms and should not be restricted herein. Instead, it is provided to provide more thoroughly understood the present disclosure, and can communicate the scope of the disclosure to those skilled in the art.

[0029]figure 1 A schematic diagram of an application authorization system 100 in accordance with one embodiment of the present invention is shown.

[0030]Such asfigure 1 As shown, the application authorization system 100 includes one or more client 110, and server 120 corresponding to the application. It should be noted that the application authorization system 100 of the present invention is in an offline environment that is not connected to the Internet, and the client 110 and the ser...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authorization control method, which comprises the steps of receiving an authorization request sent by a client based on an application file, and obtaining an application ciphertext, first signature information and a first public key from the application file; verifying the first signature information based on the first public key; decrypting the application ciphertext based on the second private key to obtain a device identifier of the client, and generating corresponding device information based on the device identifier; establishing association between the authorization configuration information and the equipment information to generate an authorization file; sending the authorization file to the client, so that the client activates the application program based on the authorization file; and regularly obtaining the actual running duration of the client, and judging whether the actual running duration exceeds the preset running duration of the application program or not so as to determine whether the application program authorization expires or not. The invention also discloses a corresponding authorization method, an authorization device and computing equipment. The authorization scheme provided by the invention can be used for an intranet environment, and can prevent leakage and reuse of authorization information.

Description

Technical field[0001]The present invention relates to the field of application authorization, and more particularly to an authorization control method, an authorization method, an authorization device, and a computing device.Background technique[0002]With the development of Linux, Linux desktop systems have been widely used in all walks of life. At present, the domestic operating system uses the Linux kernel. Installing software on domestic operating systems, there are usually the following ways: based on source code compilation, based on off-line packages (such as DEB, RPM, etc.) installation, based on software warehouse package manager (For example, APT, Yum, Pacman, Zypper, etc.) installed based on the app store. Among them, the first two installation methods need to have a certain technical foundation, and can solve the problem of software package. Based on app store installations are generally performed by command lines, which is the most convenient installation for ordinary us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/10G06F21/60G06F21/64
CPCG06F21/105G06F21/602G06F21/64
Inventor 李墨
Owner UNIONTECH SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products