Unlock instant, AI-driven research and patent intelligence for your innovation.

Authorization control method, authorization method, device and computing device

A technology of authorization control and authorization documents, applied in computing, computer security devices, instruments, etc., to avoid misappropriation, maintain copyright, prevent leakage and reuse

Active Publication Date: 2021-07-16
UNIONTECH SOFTWARE TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] To this end, the present invention provides an authorization control method, authorization method, authorization device and computing equipment to solve or at least alleviate the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization control method, authorization method, device and computing device
  • Authorization control method, authorization method, device and computing device
  • Authorization control method, authorization method, device and computing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] An exemplary embodiment of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although the exemplary embodiments of the present disclosure are shown in the drawings, it is understood that the present disclosure can be implemented in various forms and should not be restricted herein. Instead, it is provided to provide more thoroughly understood the present disclosure, and can communicate the scope of the disclosure to those skilled in the art.

[0029] figure 1 A schematic diagram of an application authorization system 100 in accordance with one embodiment of the present invention is shown.

[0030] Such as figure 1 As shown, the application authorization system 100 includes one or more client 110, and server 120 corresponding to the application. It should be noted that the application authorization system 100 of the present invention is in an offline environment that is not connected to the Internet, and the client 11...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authorization control method, comprising: receiving an authorization request sent by a client based on an application file, obtaining an application ciphertext, first signature information, and a first public key from the application file; Verify the signature information; decrypt the application ciphertext based on the second private key to obtain the device ID of the client, and generate corresponding device information based on the device ID; associate the authorization configuration information with the device information to generate an authorization file; The authorization file is sent to the client so that the client can activate the application based on the authorization file; the actual running time of the client is obtained regularly, and it is judged whether the actual running time exceeds the scheduled running time of the application to determine whether the application authorization expires. The invention also discloses the corresponding authorization method, authorization device and computing equipment. According to the authorization scheme of the present invention, it can be used in an intranet environment, and can prevent leakage and reuse of authorization information.

Description

Technical field [0001] The present invention relates to the field of application authorization, and more particularly to an authorization control method, an authorization method, an authorization device, and a computing device. Background technique [0002] With the development of Linux, Linux desktop systems have been widely used in all walks of life. At present, the domestic operating system uses the Linux kernel. Installing software on domestic operating systems, there are usually the following ways: based on source code compilation, based on off-line packages (such as DEB, RPM, etc.) installation, based on software warehouse package manager (For example, APT, Yum, Pacman, Zypper, etc.) installed based on the app store. Among them, the first two installation methods need to have a certain technical foundation, and can solve the problem of software package. Based on app store installations are generally performed by command lines, which is the most convenient installation for o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/10G06F21/60G06F21/64
CPCG06F21/105G06F21/602G06F21/64
Inventor 李墨
Owner UNIONTECH SOFTWARE TECH CO LTD