CN113326480B - Authorization verification method, device, medium and equipment for application program - Google Patents
Authorization verification method, device, medium and equipment for application program Download PDFInfo
- Publication number
- CN113326480B CN113326480B CN202110609120.1A CN202110609120A CN113326480B CN 113326480 B CN113326480 B CN 113326480B CN 202110609120 A CN202110609120 A CN 202110609120A CN 113326480 B CN113326480 B CN 113326480B
- Authority
- CN
- China
- Prior art keywords
- authorization
- data file
- application program
- server
- license data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000013475 authorization Methods 0.000 title claims abstract description 231
- 238000012795 verification Methods 0.000 title claims abstract description 159
- 238000000034 method Methods 0.000 title claims abstract description 85
- 230000008569 process Effects 0.000 claims description 45
- 230000010354 integration Effects 0.000 abstract description 6
- 238000010586 diagram Methods 0.000 description 14
- 230000006870 function Effects 0.000 description 5
- 230000008676 import Effects 0.000 description 4
- 230000009545 invasion Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 238000000638 solvent extraction Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an authorization verification method, device, medium and equipment of an application program, comprising the steps of integrating an encryption license authorization verification component in the application program; encrypting the license data file to obtain an encrypted license data file; importing the encrypted license data file into an application program, and decrypting the encrypted license data file by utilizing an encrypted license authorization verification component to obtain a decrypted license data file; and verifying the server to be verified for installing the application program by utilizing the encrypted license authorization verification component according to the decrypted license data file, and if the verification is passed, determining the server to be verified as an authorization server, and authorizing the authorization server to run all or part of the working content of the application program. The application of the invention solves the problems of high invasiveness and poor integration of the prior license authorization verification component, reduces the cost of license authorization verification, has high flexibility, prevents the unauthorized starting of the application program, and protects the intellectual property of the application program.
Description
Technical Field
The application relates to the technical field of software development, in particular to an authorization verification method, device, storage medium and equipment for an application program.
Background
Although license authorization verification components and services thereof are available in the market, the license verification functions can be realized, the license management services are configured by interfacing respective license interfaces, the invasiveness is high, authorized application programs are also connected with the license services, and the integration practicability is poor. And the license authorization verification component on the market generally is a production line, and when the actual situation needs can not be met in the function, the corresponding product can not be adjusted and updated immediately, so that the flexibility and the usability of the license authorization verification component are not guaranteed. And because license authorization verification components on the market are not free, or advanced functions and advanced features are not free, additional costs are incurred by using these components.
Disclosure of Invention
The invention provides an authorization verification method, device, medium and equipment for an application program, which solve the problems of high invasiveness and poor integration of the existing license authorization verification component, reduce the cost of license authorization verification, have high flexibility, prevent the unauthorized starting of the application program and protect the intellectual property of the application program.
In order to solve the problems, the invention adopts a technical scheme that: there is provided an authorization verification method of an application program, the method comprising:
an encryption license authorization verification component is integrated in an application program;
encrypting the license data file to obtain an encrypted license data file;
importing the encrypted license data file into an application program, and decrypting the encrypted license data file by utilizing an encrypted license authorization verification component to obtain a decrypted license data file;
and verifying the server to be verified for installing the application program by utilizing the encrypted license authorization verification component according to the decrypted license data file, and if the verification is passed, determining the server to be verified as an authorization server, and authorizing the authorization server to run all or part of the working content of the application program.
The invention adopts another technical scheme that: there is provided an authorization verification apparatus for an application program, the apparatus comprising:
the integrated module is used for integrating and setting an encryption license authorization verification component in the application program;
the encryption module is used for encrypting the license data file to obtain an encrypted license data file;
the decryption module is used for importing the encrypted license data file into the application program, decrypting the encrypted license data file by utilizing the encrypted license authorization verification component, and obtaining a decrypted license data file;
and the verification authorization module is used for verifying the server to be verified for installing the application program by utilizing the encryption license authorization verification component according to the decrypted license data file, and if the verification is passed, determining the server to be verified as an authorization server, and authorizing the authorization server to run all or part of the working content of the application program.
In another aspect of the present application, a computer-readable storage medium is provided that stores computer instructions operable to perform a method of authorization verification of an application in the solution.
In another aspect of the present application, a computer device is provided that includes a processor and a memory, the memory storing computer instructions, wherein the processor operates the computer instructions to perform a method of authorization verification of an application in the solution.
The technical scheme of the invention has the following beneficial effects: the invention provides an authorization verification method, device, storage medium and equipment for an application program, which solve the problems of high invasiveness and poor integration of the existing license authorization verification component, reduce the cost of license authorization verification, have high flexibility, prevent the unauthorized starting of the application program and protect the intellectual property of the application program.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, a brief description will be given below of the drawings that are needed in the embodiments or the prior art descriptions, it being obvious that the drawings in the following description are some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort to a person skilled in the art.
FIG. 1 is a schematic diagram of an authorization verification method for an application according to an embodiment of the present invention;
FIG. 2 is a schematic diagram showing an embodiment of an authorization verification method for an application program according to the present invention;
FIG. 3 is a schematic diagram showing an embodiment of an authorization checking method for an application program according to the present invention;
FIG. 4 is a schematic diagram showing an embodiment of an authorization verification method for an application program according to the present invention;
FIG. 5 is a schematic diagram of an authorization check device for an application of the present invention;
fig. 6 is a schematic diagram of an authorization checking device for an application program according to an embodiment of the present invention.
Specific embodiments thereof have been shown by way of example in the drawings and will herein be described in more detail. These drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but to illustrate the concepts of the present application to those skilled in the art by reference to specific embodiments.
Detailed Description
The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings so that the advantages and features of the present invention can be more easily understood by those skilled in the art, thereby making clear and defining the scope of the present invention.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
Fig. 1 is a schematic diagram of an embodiment of an authorization checking method for an application program according to the present invention.
In this embodiment, the authorization verification method of the application program mainly includes:
process S101: an encryption license authorization verification component is integrated in an application program;
process S102: encrypting the license data file to obtain an encrypted license data file;
process S103: importing the encrypted license data file into an application program, and decrypting the encrypted license data file by utilizing an encrypted license authorization verification component to obtain a decrypted license data file;
process S104: and verifying the server to be verified for installing the application program by utilizing the encrypted license authorization verification component according to the decrypted license data file, and if the verification is passed, determining the server to be verified as an authorization server, and authorizing the authorization server to run all or part of the working content of the application program.
The authorization verification method for the application program solves the problems of high invasiveness and poor integration of the existing license authorization verification component, reduces the cost of license authorization verification, has high flexibility, prevents the application program from being started without authorization, and protects the intellectual property of the application program.
In the specific embodiment shown in fig. 1, the authorization verification method for an application program of the present invention includes a process S101, in which an encryption license authorization verification component is integrally set in the application program. This process facilitates reducing the cost of license authorization verification.
Specifically, since the license authorization verification component on the market is generally a production route, when the license authorization verification component cannot be attached to the actual situation in function, the corresponding product cannot be adjusted and updated immediately, so that the flexibility and usability of the license authorization verification component are not guaranteed. Meanwhile, because license authorization check components on the market are not free, or advanced functions and advanced characteristics are not free, extra cost is generated when the components are used, so that in order to protect intellectual property of application programs, timeliness and controllability of externally-authorized deployment applications are ensured, meanwhile, the externally-deployed applications are prevented from being copied and stolen, unauthorized transplanting deployment is avoided, an encryption license authorization component integrated with a basic development framework is independently developed and realized, and the encryption license authorization check component is integrally arranged in the externally-deployed application programs.
In the specific embodiment shown in fig. 1, the authorization verification method for an application program of the present invention includes a process S102, where a license data file is encrypted to obtain an encrypted license data file. The process is convenient for avoiding invasion in the authorization verification process, improving the security and protecting the intellectual property of the application program.
In a specific embodiment of the present invention, the process of encrypting the license data file to obtain an encrypted license data file includes encrypting the license data file with an RSA private key of an RSA asymmetric encryption algorithm to obtain an encrypted license data file. The process is convenient for avoiding invasion in the authorization verification process, improving the security and protecting the intellectual property of the application program.
The license data file may include an authorization period, which is set by a company developing the application, authorized device information of a server installing the application, and the like, and the authorized device information of the server installing the application is provided by a client. The future license data file may also include a temperature range of the server for installing the application program (provided that a temperature measuring module is arranged in the server for installing the application program), the server may be checked by a temperature condition, if the temperature range is exceeded, the authorization of the application software to the server is stopped for safety, and if the temperature is within the temperature range set in the license data file in the next check, the application software is authorized to the server. The content of license data files is not limited in the present invention.
In the invention, whether the license data file is encrypted to obtain an encrypted license data file or the encrypted license data file is decrypted to obtain a decrypted license data file, the content of the decrypted license data file is unchanged all the time and is consistent with the original license data file.
Among them, the RSA asymmetric encryption algorithm is currently the most powerful encryption algorithm, which is capable of resisting all the cryptographic attacks known so far, and has been recommended by ISO as a data encryption standard. The RSA asymmetric encryption algorithm is based on a very simple number theory fact: multiplying two large primes is quite easy, but it is extremely difficult to factor the product. Therefore, the invention encrypts the license data file by using the RSA private key of the RSA asymmetric encryption algorithm to obtain the encrypted license data file.
In the specific embodiment shown in fig. 1, the authorization verification method for an application program of the present invention includes a process S103, importing an encrypted license data file into the application program, and decrypting the encrypted license data file by using the encrypted license authorization verification component to obtain a decrypted license data file. The process decrypts the encrypted license data file to facilitate further authorization verification based on the decrypted license data file.
In a specific embodiment of the present invention, the process of decrypting the encrypted license data file by using the encrypted license authorization verification component to obtain the decrypted license data file includes decrypting the encrypted license data file by using an RSA public key of an RSA asymmetric encryption algorithm to obtain the decrypted license data file. The process decrypts the encrypted license data file to facilitate further authorization verification based on the decrypted license data file.
Among them, the RSA asymmetric encryption algorithm is currently the most powerful encryption algorithm, which is capable of resisting all the cryptographic attacks known so far, and has been recommended by ISO as a data encryption standard. The RSA asymmetric encryption algorithm is based on a very simple number theory fact: multiplying two large primes is quite easy, but it is extremely difficult to factor the product. Therefore, the invention decrypts the encrypted license data file by utilizing the RSA public key of the RSA asymmetric encryption algorithm to obtain the decrypted license data file.
In the specific embodiment shown in fig. 1, the authorization verification method for an application program of the present invention includes a process S104, according to a decrypted license data file, using an encrypted license authorization verification component to verify a server to be verified for installing the application program, and if the verification is passed, determining the server to be verified as an authorization server, and authorizing all or part of the working content of the application program to be run by the authorization server. The process checks the server to be checked, has high flexibility, and prevents the unauthorized starting of the application program so as to protect the intellectual property of the application program.
In a specific embodiment of the present invention, when the decrypted license data file includes the authorization period of the application program, the process of verifying the server to be verified for installing the application program by using the encrypted license authorization verification component according to the decrypted license data file includes verifying whether the current time exceeds the authorization period by using the encrypted license authorization verification component. The process checks the authorization deadline to prevent unauthorized starting of the application program so as to protect the intellectual property of the application program.
Specifically, referring to fig. 2, a schematic diagram of a specific example of an application program authorization checking method provided by the present invention is provided, where in the specific example, a license data file includes only an authorization period of an application program, that is, a decrypted license data file also includes only an authorization period of an application program, in the example, an encrypted license data file is obtained by encrypting the license data file, in actual application, a staff member on the side of developing software sends the encrypted license data file to a client, the client or the staff member imports the encrypted license data file into a root directory of the application program, and the encrypted license authorization checking component may perform authorization checking when the application program is started or a timing checking task is started, firstly, the encrypted license authorization checking component reads the encrypted license data file in the application program, and if the encrypted license data file is not included, the verification fails, and the program is exited and cannot be used. If the encrypted license data file is included, the encrypted license data file is decrypted to obtain the decrypted license data file, and the decrypted license data file only comprises the authorization period of the application program, so that only the authorization period is required to be checked, if the current time of the server with the application program is within the authorization period, the check is successful, the application program is authorized for the server, and if the current time of the server with the application program is not within the authorization period, the check is failed, and the program is exited and cannot be used.
In a specific embodiment of the present invention, when the decrypted license data file includes authorization device information of a server authorized to install the application program, a process of verifying a server to be verified for installing the application program by using the encrypted license authorization verification component according to the decrypted license data file includes obtaining device information of the server to be verified by using the encrypted license authorization verification component; and comparing and checking the equipment information and the authorized equipment information of the server to be checked by using the encrypted license authorization checking component. The process verifies the authorized device information to prevent unauthorized starting of the application program so as to protect the intellectual property of the application program.
Specifically, referring to fig. 3, a schematic diagram of a specific example of an application authorization verification method provided by the present invention is provided, where in the specific example, license data files only include authorization device information of a server authorized to install an application, that is, decrypted license data files also include authorization device information of a server authorized to install an application, in the example, encrypted license data files are obtained by encrypting license data files, in actual application, a staff member on the side of developing software sends encrypted license data files to a client, the client or staff member imports encrypted license data files into a root directory of an application, an encrypted license authorization verification component can perform authorization verification when the application is started or a timing verification task is started, and first the encrypted license authorization verification component reads the encrypted license data files in the application, if the encrypted license data files are not included, verification fails, and the application is exited and cannot be used. If the encrypted license data file is included, the encrypted license data file is decrypted to obtain the decrypted license data file, and the decrypted license data file only comprises the authorization equipment information of the server for authorizing the installation of the application program, so that only the authorization equipment information is required to be checked, if the equipment information of the server to be checked is consistent with the authorization equipment information, the verification is successful, the application program is authorized for the server, if the equipment information of the server to be checked is inconsistent with the authorization equipment information, the verification fails, and the program is exited and cannot be used.
In a specific embodiment of the present invention, the process of obtaining the device information of the server to be verified by using the encrypted license authorization verification component includes that the encrypted license authorization verification component obtains the device information of the server to be verified by using the dmidecode command group or the WMIC command group, so that the verification work is further completed according to the device information of the server to be verified.
Specifically, the encrypted license authorization verification component in the liunx environment acquires the device information of the server to be verified by using a dmidecode command group, and the dmidecode command group can acquire the information about hardware aspects under the Linux system. Where dmidecode is compliant with the SMBIOS/DMI standard, to dump DMI (Desktop Management Interface) information of the machine in a readable manner, the information output by which includes BIOS, system, motherboard, processor, memory, cache, etc. The encrypted license authorization verification component in Windows environment utilizes a WMIC command group to acquire the equipment information of the server to be verified, WMIC is an extended WMI (Windows Management Instrumentation, windows management specification), provides support for executing system management from a command line interface and a batch command script, provides a powerful and friendly command line interface for WMIC, and is convenient for acquiring the equipment information of the server to be verified.
In a specific embodiment of the present invention, when the decrypted license data file includes authorization equipment information of a server authorized to install the application program and an authorization period of the application program, a process of verifying the server to be verified for installing the application program by using the encrypted license authorization verification component according to the decrypted license data file includes verifying whether a current time exceeds the authorization period by using the encrypted license authorization verification component, if not, acquiring the equipment information of the server to be verified by using the encrypted license authorization verification component, and comparing and verifying the equipment information of the server to be verified and the authorization equipment information by using the encrypted license authorization verification component. The process verifies the authorization deadline and the authorized equipment information to prevent the unauthorized starting of the application program so as to protect the intellectual property of the application program.
The step of obtaining the device information of the server to be verified by using the encrypted license authorization verification component is the same as the step in the above example, and will not be described herein.
Specifically, referring to fig. 4, a schematic diagram of a specific example of an application authorization verification method provided by the present invention is provided, where in the specific example, a license data file includes an authorization period of an application and authorization device information of a server authorized to install the application, that is, the decrypted license data file also includes an authorization period of the application and authorization device information of the server authorized to install the application, in the example, the license data file is encrypted to obtain an encrypted license data file, in practical application, a staff member on the side of developing software sends the encrypted license data file to a client, the client or the staff member imports the encrypted license data file into a root directory of the application, and the encrypted license authorization verification component can perform authorization verification when the application is started or a timing verification task is started, first, the encrypted license authorization verification component reads the encrypted license data file in the application, if the encrypted license data file is not included, and the verification fails, and the program exits and cannot be used. If the encrypted license data file is contained, the encrypted license data file is decrypted to obtain the decrypted license data file. The encrypted license data file comprises the authorization period of the application program and the authorization equipment information of the server for authorizing the installation of the application program, the encrypted license authorization verification component firstly verifies the authorization period, if the current time of the server with the application program is not in the authorization period, the verification fails, the program is withdrawn and cannot be used, if the current time of the server with the application program is in the authorization period, the verification succeeds, the encrypted license authorization verification component continues to verify the authorization equipment information, if the equipment information of the server to be verified is consistent with the authorization equipment information, the verification succeeds, the server is authorized for the application program, and if the equipment information of the server to be verified is inconsistent with the authorization equipment information, the verification fails, the program is withdrawn and cannot be used.
In the process S104 of the present invention, if the verification is passed, the server to be verified is determined as an authorization server, and the authorization server is authorized to run all or part of the working content of the application program. The authorization verification method of the application program can authorize and verify a single working module or a plurality of working modules. For example, the application program of the invention comprises a payment management module, a sales volume statistics module, a logistics management module and the like, but a company of a developer of the application program only sets authority for the payment management module, the sales volume statistics module, the logistics management module and the like can be used without limitation, so that when verification is carried out, if the verification is not passed, the application program only closes the use authority of the payment management module, other work modules can be normally used, and if the verification is passed, the use authority of all the work modules of the application program is opened.
FIG. 5 is a schematic diagram of an embodiment of an authorization check device for an application of the present invention.
In the specific embodiment shown in fig. 5, the authorization verification device for an application of the present invention includes a module 501, a module 502, a module 503, and a module 504.
Fig. 5 illustrates a module 501, which represents an integrated module for integrating the cryptographic license authorization verification component within an application. This module facilitates reducing the cost of license authorization verification.
Specifically, in order to protect the intellectual property of the application program, timeliness and controllability of externally authorized deployment application are ensured, meanwhile, the externally deployed application is prevented from being copied and stolen, unauthorized transplanting deployment is prevented, an encryption license authorization component integrated with a basic development framework is realized through autonomous development, and an encryption license authorization verification component is integrally arranged in the externally deployed application program.
Fig. 5 shows a block 502 that illustrates an encryption module configured to encrypt a license data file to obtain an encrypted license data file. The module is convenient for avoiding invasion in the authorization verification process, improving the security and protecting the intellectual property of the application program.
In a specific embodiment of the present invention, the working content of the encryption module further includes encrypting the license data file by using an RSA private key of an RSA asymmetric encryption algorithm to obtain an encrypted license data file. The process is convenient for avoiding invasion in the authorization verification process, improving the security and protecting the intellectual property of the application program.
A decryption module is shown in fig. 5 as module 503, and is configured to import the encrypted license data file into the application program, and decrypt the encrypted license data file using the encrypted license authorization verification component to obtain a decrypted license data file. The module decrypts the encrypted license data file so as to further perform authorization verification according to the decrypted license data file.
In a specific embodiment of the present invention, the working content of the decryption module further includes decrypting the encrypted license data file using an RSA public key of an RSA asymmetric encryption algorithm to obtain a decrypted license data file. The process decrypts the encrypted license data file to facilitate further authorization verification based on the decrypted license data file.
The module 504 shown in fig. 5 is a verification authorization module, which is configured to verify, according to the decrypted license data file, a server to be verified for installing the application program by using the encrypted license authorization verification component, and if the verification is passed, determine the server to be verified as an authorization server, and authorize all or part of the working content of the application program to run by the authorization server. The module checks the server to be checked, has high flexibility, and prevents the unauthorized starting of the application program so as to protect the intellectual property of the application program.
In an embodiment of the present invention, referring to the schematic diagram of an embodiment of the authorization check device for an application program provided in fig. 6 of the present invention, the above check authorization module further includes an authorization period check sub-module 601, where the working content is that when the decrypted license data file includes the authorization period of the application program, the process of checking, by using the encrypted license authorization check module, the server to be checked for installing the application program according to the decrypted license data file includes checking, by using the encrypted license authorization check module, whether the current time exceeds the authorization period. The process checks the authorization deadline to prevent unauthorized starting of the application program so as to protect the intellectual property of the application program.
In a specific embodiment of the present invention, referring to the schematic diagram of a specific example of the authorization verification device for an application program provided in fig. 6 of the present invention, the verification authorization module further includes a device information verification sub-module 602, where the working content of the verification authorization module is that, when the decrypted license data file includes authorization device information of a server authorized to install the application program, the process of verifying, by using the encrypted license authorization verification component, the server to be verified for installing the application program according to the decrypted license data file includes obtaining the device information of the server to be verified by using the encrypted license authorization verification component; and comparing and checking the equipment information and the authorized equipment information of the server to be checked by using the encrypted license authorization checking component. The process verifies the authorized device information to prevent unauthorized starting of the application program so as to protect the intellectual property of the application program.
In an embodiment of the present invention, referring to the schematic diagram of an embodiment of the authorization verification device for an application program provided in fig. 6 of the present invention, the device information verification sub-module 602 further includes a device information obtaining unit 602-1, where the working content is that the encrypted license authorization verification component obtains the device information of the server to be verified by using the dmidecode command group or the WMIC command group, and this process is convenient for further completing the verification work according to the device information of the server to be verified.
In a specific embodiment of the present invention, the verifying the working content of the authorization module further includes, when the decrypted license data file includes authorization device information of a server authorized to install the application program and an authorization period of the application program, verifying, according to the decrypted license data file, the server to be verified for installing the application program by using the encrypted license authorization verification component includes verifying whether the current time exceeds the authorization period by using the encrypted license authorization verification component, if not, obtaining device information of the server to be verified by using the encrypted license authorization verification component, and comparing and verifying the device information of the server to be verified and the authorization device information by using the encrypted license authorization verification component. The above-mentioned authorization period checking sub-module 601, device information checking sub-module 602 and device information obtaining unit 602-1 are applied in the process, and the authorization period and the authorized device information are checked, so as to prevent the unauthorized starting of the application program, and thus, the intellectual property of the application program is protected.
By applying the authorization verification device for the application program, the problems of high invasiveness and poor integration of the existing license authorization verification component are solved, the cost of license authorization verification is reduced, the flexibility is high, the application program is prevented from being started without authorization, and the intellectual property of the application program is protected.
The authorization verification device for the application program provided by the invention can be used for executing the authorization verification method for the application program described in any one of the embodiments, and the implementation principle and the technical effect are similar, and are not repeated here.
In another embodiment of the invention, a computer readable storage medium storing computer instructions is characterized in that the computer instructions are operative to perform the authorization verification method of an application program described in any of the embodiments. Wherein the storage medium may be directly in hardware, in a software module executed by a processor, or in a combination of the two.
A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium.
The processor may be a central processing unit (English: central Processing Unit; CPU; for short), or other general purpose processor, digital signal processor (English: digital Signal Processor; for short DSP), application specific integrated circuit (English: application Specific Integrated Circuit; ASIC; for short), field programmable gate array (English: field Programmable Gate Array; FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof, etc. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.
In one embodiment of the invention, a computer device includes a processor and a memory storing computer instructions, wherein: the processor operates the computer instructions to perform the authorization check method of the application described in any of the embodiments.
In the embodiments provided in this application, it should be understood that the disclosed systems and methods may be implemented in other ways. For example, the system embodiments described above are merely illustrative, e.g., the partitioning of elements is merely a logical functional partitioning, and there may be additional partitioning in actual implementation, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not implemented. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
The foregoing is only examples of the present application, and is not intended to limit the scope of the patent application, and all equivalent structural changes made by the specification and drawings of the present application, or direct or indirect application in other related technical fields, are included in the scope of the patent protection of the present application.
Claims (10)
1. A method for verifying the authorization of an application program, comprising,
an encryption license authorization verification component is integrated in the application program;
encrypting the license data file to obtain an encrypted license data file;
importing the encrypted license data file into the application program, and decrypting the encrypted license data file by utilizing the encrypted license authorization verification component to obtain a decrypted license data file;
and verifying the server to be verified for installing the application program by utilizing the encrypted license authorization verification component according to the decrypted license data file, and determining the server to be verified as an authorization server if the verification is passed, and authorizing the authorization server to run all or part of the working content of the application program.
2. The method for verifying the authorization of an application program as recited in claim 1, wherein the process of encrypting the license data file to obtain an encrypted license data file comprises,
encrypting the license data file by using an RSA private key of an RSA asymmetric encryption algorithm to obtain the encrypted license data file;
the process of decrypting the encrypted license data file using the encrypted license authorization verification component to obtain a decrypted license data file includes,
and decrypting the encrypted license data file by using the RSA public key of the RSA asymmetric encryption algorithm to obtain the decrypted license data file.
3. The method for authorization verification of an application of claim 1, wherein,
the decrypted license data file comprises an authorization period of the application program;
the process of verifying the server to be verified for installing the application program by utilizing the encrypted license authorization verification component according to the decrypted license data file comprises the steps of,
and checking whether the current time exceeds the authorization period by using the encryption license authorization checking component.
4. The method for authorization verification of an application of claim 1, wherein,
the decrypted license data file comprises authorization equipment information of a server authorized to install the application program;
the process of verifying the server to be verified for installing the application program by utilizing the encrypted license authorization verification component according to the decrypted license data file comprises the steps of,
acquiring equipment information of the server to be verified by utilizing the encryption license authorization verification component;
and comparing and checking the equipment information of the server to be checked and the authorized equipment information by using the encrypted license authorization checking component.
5. The method for verifying the authorization of an application program as recited in claim 3, wherein the decrypted license data file further includes authorization device information for authorizing the server to install the application program;
the process of verifying the server to be verified for installing the application program by utilizing the encrypted license authorization verification component according to the decrypted license data file comprises the steps of,
and checking whether the current time exceeds the authorization period by using the encryption license authorization checking component, if not, acquiring the equipment information of the server to be checked by using the encryption license authorization checking component, and comparing and checking the equipment information of the server to be checked and the authorization equipment information by using the encryption license authorization checking component.
6. The method for authorization verification of an application program as recited in claim 4 or 5, wherein the process of obtaining device information of the server to be verified using the encrypted license authorization verification component includes,
and the encryption license authorization verification component acquires the equipment information of the server to be verified by utilizing a dmidecode command group or a WMIC command group.
7. An authorization check device for an application program, comprising,
the integrated module is used for integrating and setting an encryption license authorization verification component in the application program;
the encryption module is used for encrypting the license data file to obtain an encrypted license data file;
the decryption module is used for importing the encrypted license data file into the application program, decrypting the encrypted license data file by utilizing the encrypted license authorization verification component, and obtaining a decrypted license data file;
and the verification authorization module is used for verifying the server to be verified for installing the application program by utilizing the encryption license authorization verification component according to the decrypted license data file, and if the verification is passed, determining the server to be verified as an authorization server, and authorizing the authorization server to run all or part of the working content of the application program.
8. The apparatus for verifying the authorization of an application of claim 6, further comprising,
the verification authorization module comprises an authorization period verification sub-module and an equipment information verification sub-module;
the equipment information verification sub-module comprises an equipment information acquisition unit.
9. A computer readable storage medium storing computer instructions operable to perform the method of authorization verification of an application of any one of claims 1 to 6.
10. A computer device comprising a processor and a memory, the memory storing computer instructions, wherein the processor operates the computer instructions to perform the authorization verification method of an application of any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110609120.1A CN113326480B (en) | 2021-06-01 | 2021-06-01 | Authorization verification method, device, medium and equipment for application program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110609120.1A CN113326480B (en) | 2021-06-01 | 2021-06-01 | Authorization verification method, device, medium and equipment for application program |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113326480A CN113326480A (en) | 2021-08-31 |
CN113326480B true CN113326480B (en) | 2024-02-20 |
Family
ID=77423352
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110609120.1A Active CN113326480B (en) | 2021-06-01 | 2021-06-01 | Authorization verification method, device, medium and equipment for application program |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113326480B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118378237B (en) * | 2024-04-26 | 2024-10-18 | 北京京航计算通讯研究所 | Dynamic authentication method for microservice component based on development platform |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101853349A (en) * | 2010-05-24 | 2010-10-06 | 覃云川 | Digital product license management system |
CN102547671A (en) * | 2010-12-08 | 2012-07-04 | 中国电信股份有限公司 | Method and system for authorization detection for application program |
CN104700002A (en) * | 2013-12-05 | 2015-06-10 | 航天信息软件技术有限公司 | Software protecting, authorizing and registering method |
CN106570353A (en) * | 2016-09-30 | 2017-04-19 | 山东浪潮商用系统有限公司 | WEB-based license verification method, apparatus and system |
CN109392310A (en) * | 2016-04-14 | 2019-02-26 | 荣布斯系统集团公司 | The system for verifying unmanned vehicle integrality |
CN109639644A (en) * | 2018-11-13 | 2019-04-16 | 东软集团股份有限公司 | Authority checking method, apparatus, storage medium and electronic equipment |
CN110162936A (en) * | 2019-05-31 | 2019-08-23 | 北京比特安索信息技术有限公司 | A kind of use authorization method of software content |
CN112417379A (en) * | 2020-11-10 | 2021-02-26 | 迈普通信技术股份有限公司 | Cluster license management method and device, authorization server and storage medium |
CN112528236A (en) * | 2020-12-18 | 2021-03-19 | 深圳竹云科技有限公司 | Application software authorization method based on virtual machine |
CN112632476A (en) * | 2020-12-31 | 2021-04-09 | 四川虹微技术有限公司 | Algorithm authorization protection method and device, integrated circuit chip and electronic equipment |
CN112733166A (en) * | 2021-01-08 | 2021-04-30 | 湖南同有飞骥科技有限公司 | license authentication and authorization function realization method and system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10044701B2 (en) * | 2016-05-24 | 2018-08-07 | Vantiv, Llc | Technologies for token-based authentication and authorization of distributed computing resources |
-
2021
- 2021-06-01 CN CN202110609120.1A patent/CN113326480B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101853349A (en) * | 2010-05-24 | 2010-10-06 | 覃云川 | Digital product license management system |
CN102547671A (en) * | 2010-12-08 | 2012-07-04 | 中国电信股份有限公司 | Method and system for authorization detection for application program |
CN104700002A (en) * | 2013-12-05 | 2015-06-10 | 航天信息软件技术有限公司 | Software protecting, authorizing and registering method |
CN109392310A (en) * | 2016-04-14 | 2019-02-26 | 荣布斯系统集团公司 | The system for verifying unmanned vehicle integrality |
CN106570353A (en) * | 2016-09-30 | 2017-04-19 | 山东浪潮商用系统有限公司 | WEB-based license verification method, apparatus and system |
CN109639644A (en) * | 2018-11-13 | 2019-04-16 | 东软集团股份有限公司 | Authority checking method, apparatus, storage medium and electronic equipment |
CN110162936A (en) * | 2019-05-31 | 2019-08-23 | 北京比特安索信息技术有限公司 | A kind of use authorization method of software content |
CN112417379A (en) * | 2020-11-10 | 2021-02-26 | 迈普通信技术股份有限公司 | Cluster license management method and device, authorization server and storage medium |
CN112528236A (en) * | 2020-12-18 | 2021-03-19 | 深圳竹云科技有限公司 | Application software authorization method based on virtual machine |
CN112632476A (en) * | 2020-12-31 | 2021-04-09 | 四川虹微技术有限公司 | Algorithm authorization protection method and device, integrated circuit chip and electronic equipment |
CN112733166A (en) * | 2021-01-08 | 2021-04-30 | 湖南同有飞骥科技有限公司 | license authentication and authorization function realization method and system |
Also Published As
Publication number | Publication date |
---|---|
CN113326480A (en) | 2021-08-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5526450B2 (en) | Method for changing hardware configuration, method for enabling hardware configuration change at a remote location, and apparatus therefor | |
US8677144B2 (en) | Secure software and hardware association technique | |
US6539480B1 (en) | Secure transfer of trust in a computing system | |
EP1422591B1 (en) | Program update method and server | |
US8874922B2 (en) | Systems and methods for multi-layered authentication/verification of trusted platform updates | |
CN101251879B (en) | Methods and apparatus for protecting data | |
US8886964B1 (en) | Protecting remote asset against data exploits utilizing an embedded key generator | |
US8893295B2 (en) | Secure and private location | |
CN107004083B (en) | Device key protection | |
US20120304311A1 (en) | Tokenized Resource Access | |
US20050283601A1 (en) | Systems and methods for securing a computer boot | |
US9225530B2 (en) | Secure crypto-processor certification | |
US10303880B2 (en) | Security device having indirect access to external non-volatile memory | |
US9147076B2 (en) | System and method for establishing perpetual trust among platform domains | |
EP1763721A1 (en) | Systems and methods for performing secure communications between an authorized computing platform and a hardware component | |
WO2013107362A1 (en) | Method and system for protecting data | |
US9280687B2 (en) | Pre-boot authentication using a cryptographic processor | |
CN106936588B (en) | Hosting method, device and system of hardware control lock | |
US20190325137A1 (en) | Secure boot | |
CN108335105B (en) | Data processing method and related equipment | |
CN109804598B (en) | Method, system and computer readable medium for information processing | |
CN116566613A (en) | Securing communications with a secure processor using platform keys | |
US10686596B2 (en) | Mutually authenticated adaptive management interfaces for interaction with sensitive infrastructure | |
TW200820076A (en) | Portable mass storage with virtual machine activation | |
CN113326480B (en) | Authorization verification method, device, medium and equipment for application program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |