CN102622538A - Method and system for software licensing control - Google Patents

Method and system for software licensing control Download PDF

Info

Publication number
CN102622538A
CN102622538A CN2011100341939A CN201110034193A CN102622538A CN 102622538 A CN102622538 A CN 102622538A CN 2011100341939 A CN2011100341939 A CN 2011100341939A CN 201110034193 A CN201110034193 A CN 201110034193A CN 102622538 A CN102622538 A CN 102622538A
Authority
CN
China
Prior art keywords
authorization
network terminal
network
software
soft ware
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011100341939A
Other languages
Chinese (zh)
Other versions
CN102622538B (en
Inventor
郑燕冰
邓建伟
陈龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201110034193.9A priority Critical patent/CN102622538B/en
Publication of CN102622538A publication Critical patent/CN102622538A/en
Application granted granted Critical
Publication of CN102622538B publication Critical patent/CN102622538B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention discloses a method and system for software licensing control, wherein the method comprises the steps of: judging whether an effective software license exists in a local network terminal; if the effective software license exists in the local network terminal, controlling software licensing via the network terminal according to the license type, otherwise, controlling the software licensing via a network licensing server. Free choices of multiple licensing modes are provided for customers due to the two-stage licensing control method, in which a user is controlled by the network terminal according to the effective license and ineffective licensing is subject to immediate licensing control of the network licensing server, the operable licensing management capacity is provided for operators, the service efficiency is increased, and the problem of inconvenience caused to users in use of the single licensing mode is solved.

Description

Soft ware authorization control method and system
Technical field
The present invention relates to SaaS (Software as a Service) application, especially, relate to a kind of soft ware authorization control method and system.
Background technology
In Internet service fast-developing today, conventional telecommunications field and Internet service be also in fusion apace, and the tide of the software store operation mode that is started by apple expands to various telecom operation system by field of mobile phones gradually.On the other hand, internet works software and communication traffic are also carrying out integrated services on each possible professional key points such as user interface, desktop, terminal, platform, brought the fusion of internet operating mode and telecommunication service operating mode thus.
In the process of this fusion, authorize exactly in a very important field.The empowerment management of internet works software and communication applications has different more; This is because internet works software and telecommunication service are all established one's own system on service management, customer service and charging mode, makes the mandate of internet works software mandate and communication applications adopt different patterns separately.
The classification of soft ware authorization pattern has a variety of; Wherein, with relevant the having of authorization control: (1) comprises mandate (client agreement mandate), the mandate of apparatus bound, the mandate of IP address binding, the mandate of domain name binding and the mandate that OEM binds etc. that (hereinafter to be referred as authorization type) client binds by the classification of type of licensing authentication; (2) comprise agreement mandate, hardware binding mandate etc. by the control mode classification.Above authorization type and authorization control mode can be divided into two kinds of interim mandate and duly authorized according to ageing unification again.Internet works software adopts the agreement mandate more, is convenient to the propagation and the use of software, and the control mode of hardware binding is adopted in telecommunication service more, relies on terminals such as phone, mobile phone to carry out authorization control (particularly traditional communication traffic of personal user, enterprise customer).
These two kinds of authorization control modes all have relative merits separately; For example; The agreement authorization control is simple, use extensively, be easy to quick popularization, but poor to the controllability as the user of operation object, used by piracy easily; Except the continuous upgrade software of needs, generally all take the mode of disposable mandate.And the hardware binding mandate that telecom operators adopt has very strong control dynamics but reduced the dirigibility that software uses.Telecom operators adopt these two kinds of patterns of hardware binding mandate to use the mode of binding mandate jointly to the mandate of The software adopted agreement, communication traffic on individual business at present, and business has had very fast development.But, the huge SME users of enterprise customer's this respect, particularly quantity; The network terminal of the user of agreement mandate and hardware binding mandate is not quite identical; Can't simply bundle and authorize, adopt unlimited authorization can't guarantee benefits of operators again, therefore make slow progress.
Can see simultaneously that no matter be to adopt which kind of authorization type or authorization control mode, present authorization control all is to control on one point; Or client or the terminal or the network platform; These reference mark independently operate, and it doesn't matter between mutually, causes various authorizations not transform mutually; Cause the user when using software and using, to be limit thus, can not carry out freely selecting and conversion according to business characteristic and user personality by the backstage authorization.Therefore a lot of is that the business model operator that can operate (for example can not provide in the internet works software industry; Enterprise customer's elder generation uses the back enterprise model of individual earlier and the pay-per-use pattern of the pattern of afterwards opening, small enterprise), this just greatly reduces the user experience that operator provides software operation.
Summary of the invention
The technical matters that the present invention will solve provides a kind of soft ware authorization control method and system, and the flexible selection of various software authorization can be provided for the client.
According to an aspect of the present invention, proposed a kind of soft ware authorization control method, comprised and judge whether network terminal this locality exists effective soft ware authorization; If there is effective soft ware authorization in network terminal this locality, then by the network terminal software is carried out authorization control according to authorization type, otherwise, by network authorization server software is carried out authorization control.
Based on an embodiment of the inventive method, this method is initiated the soft ware authorization application by the network terminal to network authorization server after also being included in and obtaining software; By network authorization server user profile is checked, after passed examination, generated licensing or hardware binding, and the licensing that generates to network terminal granting.
According to another embodiment of the inventive method, after this method also is included in and obtains soft ware authorization, change authorization to the network authorization server request through the network terminal or the new network terminal; Network authorization server is carried out soft ware authorization according to selected authorization.
Another embodiment according to the inventive method; When passing through the network terminal to network authorization server request change authorization; The step of carrying out soft ware authorization according to selected authorization comprises the modification application of reception authorization, and modification application and user profile are checked; After passed examination, generate new permit or upgrade hardware binding; After the former network terminal is successfully destroyed former licence, provide new permit to the network terminal.
Embodiment again according to the inventive method; Through the new network terminal during to network authorization server request change authorization; The step of carrying out soft ware authorization according to selected authorization comprises the modification application of reception authorization, and modification application and user profile are checked; After passed examination, generate licence or hardware binding, and issue license to the new network terminal.
According to an embodiment again of the inventive method, after this method also is included in and receives the software request for utilization, whether there is change to network authorization server inquiry licence by the new network terminal; Do not have at licence under the situation of change, judge by the new network terminal whether this locality exists effective licence.
According to a further aspect in the invention; A kind of soft ware authorization control system has also been proposed; Comprise the network terminal; Be used for existing under the situation of effective soft ware authorization, software carried out authorization control, and under the situation of the local no effective soft ware authorization of the network terminal, initiate authorized application to network authorization server according to authorization type in network terminal this locality; Network authorization server links to each other with the network terminal, is used for the application and the change of management software mandate, and under the situation of the local no effective soft ware authorization of the network terminal, software is carried out authorization control.
An embodiment of system according to the invention, the network terminal comprises enquiry module, is used for whether having change to network authorization server inquiry licence; Judge module links to each other with enquiry module, is used for whether having effective soft ware authorization in the situation that licence does not have the change network terminal this locality that judges; Local Control Module links to each other with judge module, is used for existing under the situation of effective soft ware authorization in network terminal this locality, according to authorization type software is carried out authorization control.
Another embodiment of system according to the invention, network authorization server comprises the application receiver module, is used to receive the soft ware authorization application from the network terminal; The permission generation module links to each other with the application receiver module, is used for user profile is checked, after passed examination, generates licence or hardware binding, and to the licence of network terminal granting generation.
The another embodiment of system according to the invention, application receiver module also are used to receive the change authorization application from the network terminal or the new network terminal; The permission generation module also is used for checking changing the authorization application, after passed examination, generates new permit or upgrade hardware binding according to selected authorization.
Soft ware authorization control method provided by the invention and system; The user is controlled according to effective mandate by the network terminal; The secondary authorization control mode of instant authorization control is carried out in invalid mandate by network authorization server is that the user provides freely selecting of various software authorization; For operator provides the empowerment management ability that can run, improved efficiency of service, solved the awkward problem of user under the single licensing mode.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part.In the accompanying drawings:
Fig. 1 is the schematic flow sheet of an embodiment of the inventive method.
Fig. 2 is the schematic flow sheet of another embodiment of the inventive method.
Fig. 3 is the structural representation of the another embodiment of the inventive method.
Fig. 4 is the inventive method schematic flow sheet of an embodiment again.
Fig. 5 is the inventive method schematic flow sheet of an embodiment again.
Fig. 6 is the schematic flow sheet of authorized application instance in the inventive method.
Fig. 7 is the schematic flow sheet that the inventive method Central Plains network terminal is initiated authorization modification application instance.
Fig. 8 is the schematic flow sheet that authorization modification application instance is initiated at the inventive method www.chinanews.com network terminal.
Fig. 9 is the schematic flow sheet of two-stage authorization control instance in the inventive method.
Figure 10 is the structural representation of an embodiment of soft ware authorization control system of the present invention.
Figure 11 is the structural representation of another embodiment of soft ware authorization control system of the present invention.
Figure 12 is the structural representation of the another embodiment of soft ware authorization control system of the present invention.
Embodiment
With reference to the accompanying drawings the present invention is more comprehensively described, exemplary embodiment of the present invention wherein is described.Exemplary embodiment of the present invention and explanation thereof are used to explain the present invention, but do not constitute improper qualification of the present invention.
Below be illustrative to the description only actually of at least one exemplary embodiment, never as any restriction to the present invention and application or use.
Soft ware authorization control method that the present invention proposes and system can be decomposed into the local authorization control of the network terminal and the network authorization control two-stage of network authorization server with authorization control; Authorization type according to the user; At first carry out the authorization control of the network terminal; When the network terminal is not effectively authorized, carry out authorization control through network authorization server again.Further, the authorization of the network terminal can also change according to user's request.
Fig. 1 is the schematic flow sheet of an embodiment of the inventive method.
As shown in Figure 1, this embodiment can may further comprise the steps:
S102, the network terminal judge whether this locality exists effective soft ware authorization, that is, and effectively licence or effectively hardware binding;
S104 if there is effective soft ware authorization in network terminal this locality, then carries out authorization control by the network terminal to software according to authorization type, otherwise, by network authorization server software is carried out authorization control.
Wherein, authorization type can comprise that the developer authorizes (developer license), apparatus bound mandate (server license), IP address binding mandate (IP license), domain name to bind the mandate (user license) and the mandate of OEM mode of authorizing (domain license), client to bind.
Particularly, the developer authorizes, and promptly each uses this Development of Software person need buy a developer license, and the normally quantitative restriction of this mandate is not limited to certain concrete people; Also can use the computer mode of this software to limit through restriction, concrete principle be similar.Usually issue does not limit this authorization to product.
The apparatus bound mandate is usually to the software product that is used for the b/s pattern; Use equipment of the every installation of software product of software just to need to buy a server license, some software product also is subdivided into the mandate (backup_server license) to backup server, the mandate (development_server license) of exploitation server and the mandate that the client uses server (client license) etc.
The mandate of IP address binding, promptly software product will be bound a fixed IP addresses.
Domain name is bound and is authorized, and promptly software product will be bound a fixed domain name (like sme.com).
The mandate that the client binds promptly, is used this software product to the stand-alone application program product that directly moves in client usually, and computing machine of every installation all must be paid a copyright fee to software businessman.
The mandate of OEM mode, promptly whenever selling a cover product all need be to the certain copyright fee of this software businessman payment, and concrete price needs and businessman directly consults.
Wherein, The use that the developer authorizes product has nothing to do; It is identical that apparatus bound, IP address binding, domain name are bound the authorization essence of binding with OEM; The object of only checking during authorization control is according to device id, IP address of equipment, equipment domain name and different (OEM is the apparatus bound that equipment will authorize sale when dispatching from the factory); Therefore, the angle from authorization control can be summed up as two big class authority modes with it: client agreement mandate (user license) and product are bound and are authorized (server license/IP license/domain license).
To above-mentioned authorization, corresponding authorization control mode can have following three kinds:
Protocol mode (License Agreement): a kind of mode of controlling mandate that external software product adopts mostly, all copyright related contents have all been done strict qualification through agreement;
The hardware binding mode: the client who buys product must provide the relevant information of the hardware device that uses this software product, for example, network interface card sequence number, hardware ID, IP address etc., relevant authorization code will with the one or more bindings in these hardware parameters;
Hardware encipher mode: be the common a kind of mode of controlling copyright of home products, must attach installed hardware (like softdog etc.) when being installed to software product on the computing machine, can control piracy effectively.And this hardware encipher mode generally is used for copyright is had the occasion of special security requirements; Unsuitable operator adopts; Therefore mainly adopt client agreement mandate, the product binding of agreement control mode to authorize (the product agreement generates agreement based on corresponding information) and adopt the product of hardware binding mode to bind mandate (no authorized agreement is checked hardware information in the use) in the present invention.
This embodiment is controlled the user according to effective mandate by the network terminal; The secondary authorization control mode of instant authorization control is carried out in invalid mandate by network authorization server is that the user provides freely selecting of various software authorization; The empowerment management ability that can run is provided for operator; Improve efficiency of service, solved the awkward problem of user under the single licensing mode.
Fig. 2 is the schematic flow sheet of another embodiment of the inventive method.
As shown in Figure 2, this embodiment can may further comprise the steps:
S202 after obtaining software, initiates the soft ware authorization application by the network terminal to network authorization server, and wherein, this authorized application can comprise ID, user type, software I D and authorization, alternatively, can also comprise Termination ID;
S204 is checked user profile by network authorization server, after passed examination, generates licence or hardware binding, and the licence that generates to network terminal granting;
Particularly, network authorization server and CRM carry out alternately alternatively, can also checking casual user's application, terminal legality, user terminal uniformity etc. based on the different of user type and authorization type so that User Status is checked; For example; If casual user's (CRM does not store this user's information) just need initiate casual user's application to set up holding account earlier to CRM; This is that this holding account is confirmed the term of validity based on the product strategy that CRM confirms because some software product possibly allow user's free download on probation;
S206 judges whether network terminal this locality exists effective soft ware authorization;
S208 if there is effective soft ware authorization in network terminal this locality, then carries out authorization control by the network terminal to software according to authorization type, otherwise, by network authorization server software is carried out authorization control.
This embodiment can use the situation of software to control effectively in this locality to the user by the network terminal after the user obtains soft ware authorization.
Fig. 3 is the structural representation of the another embodiment of the inventive method.
As shown in Figure 3, this embodiment can may further comprise the steps:
S302 after obtaining soft ware authorization, changes authorization through the former network terminal or the new network terminal to the network authorization server request, and network authorization server is carried out soft ware authorization according to selected authorization;
Particularly; Through the former network terminal during to network authorization server request change authorization; Can receive authorization modification application (comprise software I D, Termination ID and new authorization in this modification application, alternatively, can also comprise ID and user type); Modification application and user profile (for example, User Status) are checked; After passed examination, generate new permit or upgrade hardware binding; After the former network terminal is successfully destroyed former licence, provide new permit to the former network terminal;
Through the new network terminal during to network authorization server request change authorization; Can receive the authorization modification application; To modification application and user profile (for example; The user account number state alternatively, can also comprise user profile, new terminal legitimacy and new account terminal consistency) check; After passed examination, generate licence or hardware binding, and issue license to the new network terminal;
To the change License Check; At first, check, if the result who tables look-up then changes for allowing change according to the change strategy in following " authorization transition relation table " based on former license type, former control mode and new license type, new license method; If the result who tables look-up is not for having; Then do not allow change, if table look-up the result for based on strategy, then can be by operator based on the configuration and with the development increase and the refinement authorization of business voluntarily of operation strategy;
Figure BDA0000046450920000081
Table 1
Wherein, Strategy allows to refer to because the scope of authority before changing is not reciprocity; May make the situation of user benefit loss or operator's interests loss; But the probability of loss occurrence and the size of loss are in limited range, and operator can and be aided with other means (for example, the user signs liability statement etc.) based on price strategy and market strategy and select to be configured to allow or do not allow;
The terminal attaching decision is meant when hardware binding is controlled; Because network needs some information at real-time inspection terminal to control; Therefore this terminal must be operator all the equipment of end message also can be provided to operator (strategic server), just can select hardware binding control;
S304 judges whether network terminal this locality exists effective soft ware authorization;
S306 if there is effective soft ware authorization in network terminal this locality, then carries out authorization control by the network terminal to software according to authorization type, otherwise, by network authorization server software is carried out authorization control.
This embodiment allows the user freely to change authorization according to demand, and the selection for the user provides multiple authorization has solved the awkward problem of user under the single licensing mode.And, also not limiting the network terminal of initiating the request of change authorization in this embodiment, it can be the former network terminal or the new network terminal, has improved the dirigibility of authorization change to a great extent.
Fig. 4 is the inventive method schematic flow sheet of an embodiment again.
As shown in Figure 4, this embodiment can may further comprise the steps:
Whether S402 after receiving the software request for utilization, exists change by the new network terminal to network authorization server inquiry licence;
S404 does not have at licence under the situation of change, judges whether network terminal this locality exists effective soft ware authorization, under the situation of licence change, finishes current flow process;
S406 if there is effective soft ware authorization in network terminal this locality, then carries out authorization control by the network terminal to software according to authorization type, otherwise, by network authorization server software is carried out authorization control.
In this embodiment; If after utilizing new network terminal change authorization; Can whether guarantee effectively that the employed soft ware authorization of the new network terminal is effective through the local soft ware authorization of the inspection network terminal; Prevent after the user changes the network terminal, still to use old mandate, prevented the abuse of soft ware authorization to a great extent.
Fig. 5 is the inventive method schematic flow sheet of an embodiment again.
As shown in Figure 5, this embodiment can may further comprise the steps:
S502 can initiate authorized application through certain nonspecific network terminal after the user obtains software, wherein, this nonspecific network terminal is meant the terminal of not carrying out hardware binding.
Particularly, can obtain soft ware authorization through process as shown in Figure 6:
S502a, network authorization server receives the authorized application from the user, wherein, can comprise ID, user type, software I D and authorization in this authorized application message, alternatively, can also comprise Termination ID;
S502b; Network authorization server is after receiving authorized application; With CRM alternately so that User Status is checked, alternatively, possibly also need carry out casual user's application, terminal legality inspection and user terminal consistency check based on user type and authorization type;
S502c, after above-mentioned passed examination, network authorization server generates licence or hardware binding;
S502d, network authorization server is issued license to the network terminal.
S504; After obtaining soft ware authorization; Can initiate the authorization modification application by the former network terminal or the new network terminal, network authorization server receive after the modification application user and the network terminal (when hardware binding time) detected after, authorize according to the authorization of selecting.
Particularly, the former network terminal can be initiated the authorization change through process as shown in Figure 7:
S504a1, network authorization server receives the authorization modification application from the user;
S504b1; Network authorization server checks change permission, and checks with the account state alternately with CRM, owing to can comprise end message in the accounts information; Therefore the legitimacy and the consistency check meeting of the former network terminal are accomplished simultaneously; When only initiating to bind first at nonspecific terminal, the legitimacy and the consistance at just possible individual inspiration terminal, alternatively; Can also change user profile; The content of user profile change generally comprises accounts information, former authorization type, former authorization control mode, new authorization type and new authorization control mode according to the difference to some extent of the mode before and after authorizing a change, and can also comprise the term of validity, client terminal quantity, Termination ID, IP and domain name etc. according to the difference of authorization;
S504c1, after passed examination, network authorization server generates new permit or upgrades hardware binding;
S504d1, network authorization server is sent former licence to the former network terminal and is destroyed request;
S504e1, the former network terminal send the destruction success message to network authorization server after successfully destroying former licence;
S504f1, network authorization server is provided new permit to the former network terminal.
In an instantiation; To initiating the user of modification application; At first judge the terminal of former licensing status and initiation request; If former mandate expires, or former mandate for interim authorize, or former mandate be the hardware binding mandate, or former mandate be that the terminal of agreement mandate and initiation request is former authorization terminal, then accept the change request; Next whether the new authorization according to above-mentioned table 1 former authorization of inspection and request exists the transition relation; If there is transition relation, then change strategy, and whether inquire about former terminal to CRM consistent with user account with the new terminal ownership according to top transition relation condition inspection, check and then carry out next step as if concerning, otherwise refuse an application and provide reason through transition; Check to CRM whether account status satisfies the needs of new authorization, whether is normal users state (for example, no arrearage, no shutdown) like the postpaid service user, and whether prepaid user's account has enough remaining sums etc.; If the agreement mandate, inspection generates new ticket for authorization through the back in network authorization server; If hardware binding then directly changes the authorization terminal binding relationship, the hardware binding end that authorizes a change; Like former mandate is the agreement mandate, then returns the permission that authorizes a change of the former network terminal, and the former network terminal is destroyed former ticket for authorization; After the former network terminal reported ticket for authorization to destroy, network authorization server issued new ticket for authorization.
When using new network terminal application to change authorization; Former permission is uncontrollable, and the authorization that only allows former permission can not impact changes new authorization into, and this is because authorization can not arbitrarily change; Need decide according to the strategy and the rationality of operation; Generally speaking be exactly former license method with new license method operation angle quite (for example, it is identical to charge), then do not have influence; The former permission scope of application is less than the new permission scope of application, and the user agrees to pay by new mode, then do not have influence; Former permission to use scope surpasses the new permission scope of application and former permission can't be guaranteed cancellation, then is influential, and the change of having ready conditions specifies as follows:
(1) if former authorization control type is agreement control; Former authorization type is the undue client agreement mandate of the term of validity (not limitting quantity); The hardware binding control mode of the apparatus bound at certain terminal that changes this client at present and had; Therefore the service condition of so former permission is in fact more wide in range than the permissive condition after the change, even former permission can't be destroyed, also can the legitimacy of authorizing not impacted (this kind situation pilosity be born in the enterprise software need be carried to when using outside the enterprise);
(2) former permission is the IP binding mandate under the agreement control mode; Need change to the apparatus bound mandate under the agreement control mode at present, allow on the different machines that uses identical IP address, to use because IP binds, and apparatus bound be strict more; Therefore the user uses two kinds of permissions to go beyond the scope of present apparatus bound simultaneously before just might appearing at former License Expiration; If but the same price of employing is authorized to these two kinds by operator, says that from the operation angle change of these two kinds of authorizations does not bring extra revenue losses to operator so; Operator allows to change from strategy for the convenience of the user.This can think that also former permission can not impact;
(3) former permission is that undue client under the agreement control mode binds mandate; Existing user wants to change into the apparatus bound mandate under the hardware binding control mode for cost saving; If so former permission is not destroyed; Then the user can pay apparatus bound expense money with regard to the unconfined use of former permission agreement capable of using; Therefore for avoiding this kind situation, operator may require before the expiration of contract of former permission, not allow to change to new authorization or settled accounts the back that finishes in former permission to allow change according to this user's account situation.
The idiographic flow of new network terminal application change authorization is as shown in Figure 8:
S504a2, network authorization server receives the authorization modification application from the user;
S504b2, network authorization server checks change permission, and with CRM alternately with the inspection Account Status, alternatively, can also change user profile, the new terminal legitimacy is checked, the consistance at new account terminal is checked;
S504c2 after passed examination, generates new permit or upgrades hardware binding;
S504d2, network authorization server is issued license to the new network terminal.
S506, after authorizing completion, the user initiates software and uses when asking, and the network terminal and network authorization server are carried out this locality control and network control to mandate respectively according to the subscriber authorisation mode, and idiographic flow is as shown in Figure 9:
S506a, the network terminal receives the software request for utilization from the user;
S506b, whether the network terminal is inquired about local licence to network authorization server and is updated;
S506c, the network terminal receive the result that network authorization server is returned, do not upgrade if there is licence, and the step below then continuing, otherwise, process ends, the user can not use this software;
S506d, whether inspection network terminal this locality exists effective licence;
S506e if there is effective licence in this locality, then directly controls the use of user to software by the network terminal, and this process can be called 1 grade of control;
S506f if there is not effective licence in this locality, then initiates authorized application by the network terminal to network authorization server, and this process can be called 2 grades of permission applications;
S506g, when adopting the hardware binding mode, network authorization server is checked the hardware information of the network terminal;
S506h, when adopting agreement license method, network authorization server and CRM carry out alternately with the inspection customer information;
S506i, network authorization server and CRM carry out alternately with inspection User Status and remaining sum, and account is checked;
S506j after passed examination, generates temporary permit;
S506k, network authorization server is provided temporary permit to the network terminal, to realize 2 grades of controls;
S506l uses the situation of software to control according to the temporary permit that receives to the user by the network terminal, if this temporary permit has clear and definite time tag; Then network terminal check system clock was controlled with the realization time; Arrive the back at the time reference mark and force to finish to use (for example, Sorry, your ticket has not enough value for IP phone), effective if this temporary permit is this; The network terminal need detect the software user mode, after withdrawing from, permission is changed into expired.
The authorization control mode that this embodiment adopted is different from existing authorization terminal control and unified network authorization control, is a kind of new method of two-stage control.Can realize the software application mandate between the authorization, between the different terminals and the transfer between the enterprises user through the division to the network terminal and network authorization server authorization control responsibility, the convenience of the comprehensive utilization network terminal and the high controllability of network authorization server have formed the authorization service system that can support the operation system flexible configuration.The authorization of this embodiment not only can be authorized with downward but also can change authorization according to user's demand at any time for operator provides the multiple charge mode of software under various User Status.
Figure 10 is the structural representation of an embodiment of soft ware authorization control system of the present invention.
Shown in figure 10, the system 10 of this embodiment can comprise:
Network Termination #1 1; Be used for existing under the situation of effective soft ware authorization in network terminal this locality; According to authorization type software is carried out authorization control; And under the situation of the local no effective soft ware authorization of the network terminal, initiate authorized application to network authorization server; Wherein, authorization type can comprise that the developer authorizes (developer license), apparatus bound mandate (server license), IP address binding mandate (IP license), domain name to bind the mandate (user license) and the mandate of OEM mode of authorizing (domain license), client to bind;
Network authorization server 12 links to each other with Network Termination #1 1, is used for the application and the change of management software mandate, and under the situation of the local no effective soft ware authorization of the network terminal, software is carried out authorization control.
In an instantiation, the network terminal is the hardware carrier that software uses, and preserves licence, carries out authorization control according to valid license, and the permission application is initiated in invalid permission immediately; Network authorization server is the network authentication authoring system that operator provides, application and change that can administration of licences, and the software of invalid licence used control; CRM preserves user's ordering information and user account information, and the inspection interface of user account state is provided, and is responsible for account's change (for example, provisional account transfers formal account to).
This embodiment is controlled the user according to effective mandate by the network terminal; The secondary authorization control mode of instant authorization control is carried out in invalid mandate by network authorization server is that the user provides freely selecting of multiple authorization; The empowerment management ability that can run is provided for operator; Improve efficiency of service, solved the awkward problem of user under the single licensing mode.
Figure 11 is the structural representation of another embodiment of soft ware authorization control system of the present invention.
Shown in figure 11, to compare with embodiment among Figure 10, the network terminal 21 in the system 20 of this embodiment can comprise:
Enquiry module 211 is used for whether having change to network authorization server inquiry licence;
Judge module 212 links to each other with enquiry module 211, is used for whether having effective soft ware authorization in the situation that licence does not have the change network terminal this locality that judges, that is, effectively licence or effectively hardware binding;
Local Control Module 213 links to each other with judge module 212, is used for existing under the situation of effective soft ware authorization in network terminal this locality, according to authorization type software is carried out authorization control.
In this embodiment; If after utilizing new network terminal change authorization; Can whether guarantee effectively that the employed soft ware authorization of the new network terminal is effective through the local soft ware authorization of the inspection network terminal; Prevent after the user changes the network terminal, still to use old mandate, prevented the abuse of soft ware authorization to a great extent.
Figure 12 is the structural representation of the another embodiment of soft ware authorization control system of the present invention.
Shown in figure 12, to compare with embodiment among Figure 10, the network authorization server 31 in the system 30 of this embodiment can comprise:
Application receiver module 311 is used to receive the soft ware authorization application from the network terminal;
Permission generation module 312 links to each other with application receiver module 311, is used for user profile is checked, after passed examination, generates licence or hardware binding, and to the licence of network terminal granting generation.
In an embodiment again of soft ware authorization control system of the present invention, the application receiver module also is used to receive the change authorization application from the former network terminal or the new network terminal; The permission generation module also is used for checking changing the authorization application, after passed examination, generates new permit or upgrade hardware binding according to selected authorization.
The instantiation that the embodiment of above-mentioned soft ware authorization control system carries out the two-stage authorization control can no longer repeat at this with reference to the embodiment of aforementioned software authentication control method.
Though specific embodiments more of the present invention are specified through example, it should be appreciated by those skilled in the art that above example only is in order to describe, rather than in order to limit scope of the present invention.It should be appreciated by those skilled in the art, can under situation about not departing from the scope of the present invention with spirit, above embodiment be made amendment.Scope of the present invention is limited accompanying claims.

Claims (10)

1. a soft ware authorization control method is characterized in that, comprising:
Judge whether network terminal this locality exists effective soft ware authorization;
If there is effective soft ware authorization in said network terminal this locality, then by the said network terminal software is carried out authorization control according to authorization type, otherwise, by network authorization server software is carried out authorization control.
2. method according to claim 1 is characterized in that, said method also comprises:
After obtaining software, initiate the soft ware authorization application to said network authorization server by the said network terminal;
By said network authorization server user profile is checked, after passed examination, generated licence or hardware binding, and the licence that generates to said network terminal granting.
3. method according to claim 1 is characterized in that, said method also comprises:
After obtaining soft ware authorization, change authorization to said network authorization server request through the said network terminal or the new network terminal;
Said network authorization server is carried out soft ware authorization according to selected authorization.
4. method according to claim 3 is characterized in that, through the said network terminal during to said network authorization server request change authorization, said step of carrying out soft ware authorization according to selected authorization comprises:
Receive the authorization modification application, modification application and user profile are checked;
After passed examination, generate new permit or upgrade hardware binding;
After the said former network terminal is successfully destroyed former licence, provide new permit to the said network terminal.
5. method according to claim 3 is characterized in that, through the new network terminal during to said network authorization server request change authorization, said step of carrying out soft ware authorization according to selected authorization comprises:
Receive the authorization modification application, modification application and user profile are checked;
After passed examination, generate licence or hardware binding, and issue license to the said new network terminal.
6. method according to claim 5 is characterized in that, said method also comprises:
After receiving the software request for utilization, whether there is change to said network authorization server inquiry licence by the said new network terminal;
Do not have at licence under the situation of change, judge by the said new network terminal whether this locality exists effective licence.
7. a soft ware authorization control system is characterized in that, comprising:
The network terminal; Be used for existing under the situation of effective soft ware authorization in said network terminal this locality; Based on authorization type software is carried out authorization control, and under the situation of the local no effective soft ware authorization of the said network terminal, initiate authorized application to network authorization server;
Network authorization server links to each other with the said network terminal, is used for the application and the change of management software mandate, and under the situation of the local no effective soft ware authorization of the said network terminal, software is carried out authorization control.
8. system according to claim 7 is characterized in that, the said network terminal comprises:
Enquiry module is used for whether having change to said network authorization server inquiry licence;
Judge module links to each other with said enquiry module, is used for whether having effective soft ware authorization in the situation that licence the does not have a change said network terminal this locality that judges;
Local Control Module links to each other with said judge module, is used for existing under the situation of effective soft ware authorization in said network terminal this locality, according to authorization type software is carried out authorization control.
9. system according to claim 7 is characterized in that, said network authorization server comprises:
The application receiver module is used to receive the soft ware authorization application from the said network terminal;
The permission generation module links to each other with said application receiver module, is used for user profile is checked, after passed examination, generates licence or hardware binding, and to the licence of said network terminal granting generation.
10. system according to claim 9 is characterized in that,
Said application receiver module also is used to receive the change authorization application from the said network terminal or the new network terminal;
Said permission generation module also is used for checking changing the authorization application, after passed examination, generates new permit or upgrade hardware binding according to selected authorization.
CN201110034193.9A 2011-02-01 2011-02-01 Software authorization control method and system Active CN102622538B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110034193.9A CN102622538B (en) 2011-02-01 2011-02-01 Software authorization control method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110034193.9A CN102622538B (en) 2011-02-01 2011-02-01 Software authorization control method and system

Publications (2)

Publication Number Publication Date
CN102622538A true CN102622538A (en) 2012-08-01
CN102622538B CN102622538B (en) 2015-08-19

Family

ID=46562453

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110034193.9A Active CN102622538B (en) 2011-02-01 2011-02-01 Software authorization control method and system

Country Status (1)

Country Link
CN (1) CN102622538B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103984884A (en) * 2014-05-30 2014-08-13 广东轩辕网络科技股份有限公司 Method and system for licensing software
CN104392150A (en) * 2014-10-28 2015-03-04 用友优普信息技术有限公司 Software authorization superposition control device and software authorization superposition control method
CN105550566A (en) * 2015-12-06 2016-05-04 北京天云融创软件技术有限公司 Method for enabling multiple users to share software authorization USB (Universal Serial Bus) device
CN105956426A (en) * 2016-04-26 2016-09-21 上海斐讯数据通信技术有限公司 Application program authority authentication and authorization method and intelligent equipment
CN106951741A (en) * 2017-03-15 2017-07-14 北京深思数盾科技股份有限公司 A kind of software license management method and device
CN106953917A (en) * 2017-03-22 2017-07-14 北京深思数盾科技股份有限公司 Method of data synchronization and system
CN107122630A (en) * 2017-04-26 2017-09-01 新华三技术有限公司 device authorization management method and device
CN108259163A (en) * 2016-12-29 2018-07-06 北京博瑞彤芸文化传播股份有限公司 The authorization method of terminal device
CN108600151A (en) * 2018-02-28 2018-09-28 华为技术有限公司 A kind of data communication method, equipment and system
CN111339523A (en) * 2020-02-21 2020-06-26 深圳英飞拓智能技术有限公司 Authorization method and device of embedded device
US10867014B2 (en) 2015-05-27 2020-12-15 Siemens Aktiengesellschaft Device and method for adapting the use of an apparatus

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1555644A (en) * 2001-08-13 2004-12-15 �����ɷ� System and method for licensing applications on wireless devices over a wireless network
CN1556943A (en) * 2002-07-15 2004-12-22 ������������ʽ���� Client terminal, software control method, and control program
CN101008973A (en) * 2006-01-24 2007-08-01 富士施乐株式会社 System, method and storage medium for license management
US7752139B2 (en) * 2005-12-27 2010-07-06 Michael Noel Hu Method and system for managing software licenses and reducing unauthorized use of software
US20100293103A1 (en) * 2009-05-12 2010-11-18 Microsoft Corporation Interaction model to migrate states and data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1555644A (en) * 2001-08-13 2004-12-15 �����ɷ� System and method for licensing applications on wireless devices over a wireless network
CN1556943A (en) * 2002-07-15 2004-12-22 ������������ʽ���� Client terminal, software control method, and control program
US7752139B2 (en) * 2005-12-27 2010-07-06 Michael Noel Hu Method and system for managing software licenses and reducing unauthorized use of software
CN101008973A (en) * 2006-01-24 2007-08-01 富士施乐株式会社 System, method and storage medium for license management
US20100293103A1 (en) * 2009-05-12 2010-11-18 Microsoft Corporation Interaction model to migrate states and data

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015180272A1 (en) * 2014-05-30 2015-12-03 广东轩辕网络科技股份有限公司 Software licensing method and system
CN103984884A (en) * 2014-05-30 2014-08-13 广东轩辕网络科技股份有限公司 Method and system for licensing software
CN104392150A (en) * 2014-10-28 2015-03-04 用友优普信息技术有限公司 Software authorization superposition control device and software authorization superposition control method
CN104392150B (en) * 2014-10-28 2017-09-05 用友优普信息技术有限公司 The superposing control apparatus and method of soft ware authorization
CN107636660B (en) * 2015-05-27 2021-10-15 西门子交通有限责任公司 Apparatus and method for adapting the use of a device
US10867014B2 (en) 2015-05-27 2020-12-15 Siemens Aktiengesellschaft Device and method for adapting the use of an apparatus
CN105550566B (en) * 2015-12-06 2019-03-29 北京天云融创软件技术有限公司 A kind of method of multiple users share soft ware authorization USB device
CN105550566A (en) * 2015-12-06 2016-05-04 北京天云融创软件技术有限公司 Method for enabling multiple users to share software authorization USB (Universal Serial Bus) device
CN105956426A (en) * 2016-04-26 2016-09-21 上海斐讯数据通信技术有限公司 Application program authority authentication and authorization method and intelligent equipment
CN108259163A (en) * 2016-12-29 2018-07-06 北京博瑞彤芸文化传播股份有限公司 The authorization method of terminal device
CN108259163B (en) * 2016-12-29 2020-10-02 北京博瑞彤芸文化传播股份有限公司 Authorization method of terminal equipment
CN106951741A (en) * 2017-03-15 2017-07-14 北京深思数盾科技股份有限公司 A kind of software license management method and device
CN106953917B (en) * 2017-03-22 2018-08-21 北京深思数盾科技股份有限公司 Method of data synchronization and system
CN106953917A (en) * 2017-03-22 2017-07-14 北京深思数盾科技股份有限公司 Method of data synchronization and system
CN107122630B (en) * 2017-04-26 2020-07-17 新华三技术有限公司 Equipment authorization management method and device
CN107122630A (en) * 2017-04-26 2017-09-01 新华三技术有限公司 device authorization management method and device
CN108600151B (en) * 2018-02-28 2020-09-08 华为技术有限公司 Data communication method, equipment and system
CN108600151A (en) * 2018-02-28 2018-09-28 华为技术有限公司 A kind of data communication method, equipment and system
CN111339523A (en) * 2020-02-21 2020-06-26 深圳英飞拓智能技术有限公司 Authorization method and device of embedded device
CN111339523B (en) * 2020-02-21 2024-04-23 深圳英飞拓仁用信息有限公司 Authorization method and device for embedded equipment

Also Published As

Publication number Publication date
CN102622538B (en) 2015-08-19

Similar Documents

Publication Publication Date Title
CN102622538B (en) Software authorization control method and system
CN102724647B (en) Method and system for access capability authorization
JP5296066B2 (en) Method, system and apparatus for content licensing
CN103164792B (en) Payment services supplying method on wireless terminal and relevant device and system
EP1517258A2 (en) Content download to wireless devices
US20120041878A1 (en) Method And System For Authenticating Software License
CA2401691A1 (en) Method for using software products that are offered via a network
CN110046477B (en) Industrial application software verification and authorization method, system, medium and client/server
CN101647219A (en) Mechanism for secure rehosting of licenses
CN103188238A (en) Activation method and system of payment account
JP2006309489A (en) System, server and terminal for settlement, value management unit, mobile communication terminal, settlement method and program
JP2006268641A (en) Authentication method and authentication system
CN1668060A (en) An automatic prepaying method for mobile terminal
CN103124252B (en) Client application access authentication treating method and apparatus
KR20200093873A (en) Apparatus and method for managing sharing of vehicles
CN102270326A (en) Authentication charging system and method based on intelligent network payment value added service
CN101702715A (en) Permission control point, permission control method and system of application software
WO2002067160A1 (en) Control transfer system
CN103581202A (en) Merchant token cross authentication method based on identity authentication platform
CN100589376C (en) Digital copyright management method for downloading service
CN105809446A (en) Safety payment method and system
CN102088354B (en) Software licensing authentication method based on digital mobile communication
JP4519812B2 (en) Connection control device, payment user device, receiving user device, connection control program, payment user program, and receiving user program
US20050160064A1 (en) Confirming user rights in distribution of application programs
KR100623293B1 (en) Method for authenticating the subscriber of mobile terminal using callback message

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant