CN108256297A - The authority checking method on probation of software - Google Patents

The authority checking method on probation of software Download PDF

Info

Publication number
CN108256297A
CN108256297A CN201611243120.XA CN201611243120A CN108256297A CN 108256297 A CN108256297 A CN 108256297A CN 201611243120 A CN201611243120 A CN 201611243120A CN 108256297 A CN108256297 A CN 108256297A
Authority
CN
China
Prior art keywords
software
terminal equipment
probation
days
enabled instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611243120.XA
Other languages
Chinese (zh)
Other versions
CN108256297B (en
Inventor
陈家制
葛俊鹏
汪秀兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Borui Tongyun Technology Co.,Ltd.
Original Assignee
Beijing Borui Tong Yun Culture Communication Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Borui Tong Yun Culture Communication Ltd By Share Ltd filed Critical Beijing Borui Tong Yun Culture Communication Ltd By Share Ltd
Priority to CN201611243120.XA priority Critical patent/CN108256297B/en
Publication of CN108256297A publication Critical patent/CN108256297A/en
Application granted granted Critical
Publication of CN108256297B publication Critical patent/CN108256297B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)
  • Stored Programmes (AREA)

Abstract

The present embodiments relate to a kind of authority checking method on probation of software, including:First terminal equipment receives software and tries out enabled instruction;Include software I D using enabled instruction;According to the pre-stored software installation time in software I D acquisition systems;Whether the current time that determining reception software tries out enabled instruction is later than the software installation time;If being later than the software installation time, the login record whether in the historical log stored in system record with current date is determined according to current time;If so, it then generates login authentication confirmation message and/or login interface display data is called to be shown;If not provided, obtain temporary Authorization time threshold;Temporary Authorization time threshold includes the number of days for allowing to log in;Determine whether the number of days effectively logged in historical log record reaches the number of days for allowing to log in;If not up to allowing the number of days logged in, generate login authentication confirmation message and/or login interface display data is called to be shown.

Description

The authority checking method on probation of software
Technical field
The present invention relates to a kind of authority checking methods on probation of field of communication technology more particularly to software.
Background technology
In order to which user is helped to understand software function and ensures the equity of software works simultaneously, most software all provides on probation Function, and there is provided the trial periods.
Traditional Software probation period setting, typically since the software installation time until setting number of days on probation.And Due to the particularity of terminal device, the software of some and terminal device binding have already been mades installation in manufacture, and by Activation on probation has also been carried out in testing requirement, Software probation period is caused to will appear following several situations:
Firstth, on terminal device to user hand also for some time, lead to when user uses for the first time the trial period just Terminate or shorten the available trial period;
Secondth, start system time on probation in software initial activation, time zone when being used with user is inconsistent, Yong Huxu The modification of system time is carried out, and changing terminal device system time can cause the trial period to terminate;
Software probation period is reinstalled after third, terminal device software unloading to restart to calculate so that user can obtain Indefinite software is obtained using the trial period, damages the interests of software developer.
Invention content
It, can the purpose of the present invention is in view of the drawbacks of the prior art, providing a kind of authority checking method on probation of software Effective software for calculation tries out the time of mandate, that is, meets the demand normally on probation of user, and has ensured the interests of software developer.
In view of this, an embodiment of the present invention provides a kind of authority checking method on probation of software, including:
First terminal equipment receives software and tries out enabled instruction;It is described to include software I D using enabled instruction;
According to the pre-stored software installation time in the software I D acquisition systems;
It determines to receive whether the current time that the software tries out enabled instruction is later than the software installation time;
If being later than the software installation time, remembered according to the historical log that the current time determines to store in system Whether there is the login record of current date in record;
If so, it then generates login authentication confirmation message and/or login interface display data is called to be shown;
If not provided, obtain temporary Authorization time threshold;The temporary Authorization time threshold includes the number of days for allowing to log in;
Determine whether the number of days effectively logged in the historical log record reaches the number of days for allowing to log in;
If the not up to described number of days for allowing to log in generates login authentication confirmation message and/or calls login interface Display data is shown.
Preferably, if the not up to described number of days for allowing to log in, the method further include:
The current date is added in into the historical log record.
Preferably, if the current time is earlier than the software installation time, the method further includes:
Login authentication failure prompt message is generated, and is shown.
If it is further preferred that the current time, earlier than the software installation time, the method further includes:
Generation temporary Authorization command for stopping is sent to server;The temporary Authorization command for stopping includes first terminal equipment International Mobile Station Equipment Identification IMEI information;
The server deletes first terminal equipment described in ephemeral data list according to the temporary Authorization command for stopping IMEI information.
It is further preferred that before first terminal equipment reception software tries out enabled instruction, the method is also wrapped It includes:
The first terminal equipment receives software enabled instruction, and the first terminal is obtained according to the software enabled instruction The IMEI information of equipment;
Access request message is sent to the server;The access request message carries the first terminal equipment IMEI information;
The application server is carried out according to the IMEI information of the first terminal equipment in the database server Match query;
When identical IMEI information is not present in match query to the database server, generates the software and try out Enabled instruction, and it is sent to the first terminal equipment.
The authority checking method on probation of software provided in an embodiment of the present invention provides a kind of authority checking side on probation of software Method effectively can try out time of mandate by software for calculation, that is, meet the demand normally on probation of user, and ensure software developer Interests.
Description of the drawings
Fig. 1 is the flow chart of the authority checking method on probation of software provided in an embodiment of the present invention;
Fig. 2 is the generation method flow chart that software provided in an embodiment of the present invention tries out enabled instruction.
Specific embodiment
Purpose, technical scheme and advantage to make the embodiment of the present invention are clearer, below in conjunction with the embodiment of the present invention In attached drawing, the technical solution in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is Part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art All other embodiments obtained without creative efforts shall fall within the protection scope of the present invention.
Fig. 1 is the authority checking method flow diagram on probation of software provided in an embodiment of the present invention, as shown in Figure 1, including:
Step 110, first terminal equipment receives software and tries out enabled instruction;
Specifically, include software I D using enabled instruction.This is the basis that first terminal equipment is had been mounted in software Upper execution.Terminal device described in this example is preferably mobile terminal, including smart mobile phone, tablet computer etc..
Software tries out the generation of enabled instruction can be in the case where there is network connection and in the case of without network connection It is different.
In the case of with network connection, it can realize that software is tried out by performing following step 111- steps 114 The generation of enabled instruction, it is specific as shown in Figure 2.
Step 111, first terminal equipment receives software enabled instruction, and first terminal equipment is obtained according to software enabled instruction IMEI information;
Specifically, the manufacturer of manufacture mobile terminal before every user terminal dispatches from the factory, can all give every mobile terminal to distribute International Mobile Station Equipment Identification (International Mobile Equipment Identity, IMEI), IMEI is for distinguishing The mark of mobile terminal stores in the terminal, available for monitoring stolen or invalid mobile terminal.Manufacturer is distributing During IMEI, it should ensure that the IMEI of every mobile terminal is different.
Step 112, access request message is sent to server;
Specifically, first terminal equipment sends out access request message according to software enabled instruction.Access request message carries The IMEI information of first terminal equipment.
Step 113, application server is inquired according to the IMEI information of first terminal equipment in database server Matching;
Specifically, the method that authority checking is carried out with the software of hardware binding is preferably directed in the embodiment of the present invention, because This can be verified by the exclusive identification code of terminal device to carry out soft ware authorization on terminal device.It is pre- in database server First it is stored with the IMEI information of authorized terminal device.
After application server receives access request message, access request message is parsed, therefrom extraction is related Information.Wherein application service can extract the IMEI information of the first user terminal from access request message, and identification should Whether IMEI information is with being already recorded in database server.
Step 114, when identical IMEI information is not present in match query to database server, generation software is tried out Enabled instruction, and it is sent to first terminal equipment.
If specifically, illustrate the software there are during identical IMEI information in match query to database server To first terminal device authorization, then license confirmation information is directly returned to, thus first terminal equipment can be true according to authorizing Recognize information and directly open software.
And in the case of no network connection, when first terminal equipment receives software enabled instruction input by user When, the key whether with the software can be inquired from the local storage of first terminal equipment first.If so, then explanation should Software has been authorized to use, and illustrates that the software is also uncommitted if not.Uncommitted situation is only discussed herein.
When inquire there is no the key of software in local storage when, first terminal equipment according to receive software startup refer to Generation software is enabled to try out enabled instruction.
Regardless of whether with network connection, the software that input or generation are received in first terminal equipment tries out enabled instruction Later, the authority checking on probation to software can be all performed as follows.
Step 120, according to the pre-stored software installation time in software I D acquisition systems;
Specifically, when software is installed, the system of user terminal can automatic logging software set-up time, wherein wrapping Include the set-up time for the first time.If user's uninstall carries out second of installation again, for the first time the set-up time be also still recorded in system In.The software installation time stored in system can be got by trying out the corresponding software I D of enabled instruction according to software. The described software installation time herein preferably refers to the set-up time for the first time of software.
Step 130, whether the current time that determining reception software tries out enabled instruction is later than the software installation time;
Specifically, when receiving enabled instruction on probation, system can record the receiving time of enabled instruction on probation, i.e., herein Described current time.The software installation time whether can be later than by judging that software tries out the receiving time of enabled instruction, come User is avoided to change system time to bypassing the situation of trial period between the software installation date.If software tries out enabled instruction Receiving time earlier than the software installation time, then it is considered that must be that user changed system time.
If the receiving time that software tries out enabled instruction is later than the software installation time, step 140 is performed, if earlier than The software installation time performs step 190.
Step 140, determine whether there is current date in the historical log stored in system record according to current time Login record;
Specifically, it is stored with historical log record in systems, including each login before current log in Date.The purpose of inquiry is to determine whether the date on the same day had carried out login.If the date on the same day had stepped on Record, it is within the effective trial period to illustrate current date.Therefore, if when the login for having current date in historical log record Record then performs step 150, generates login authentication confirmation message and/or login interface display data is called to be shown, so as to Directly mandate login is carried out in a manner of on probation.
If not provided, performing step 160, temporary Authorization time threshold is obtained;
Specifically, temporary Authorization threshold value refers to the defined trial period duration that software developer sets.In usual feelings Under condition, trial period duration refers to continuous a period of time, such as since software installation or since first logging into software Continuous 15 days.
But in this example, it is specified that temporary Authorization time threshold is the number of days for allowing login on probation, this number of days can be It is discontinuous.Because in the application scenarios of software and hardware binding, the manufacturer or retailer of terminal device need to carry out software Prepackage, it is also possible to need to carry out login detection to the software of prepackage, if this results in being tried out according to the conventional method The calculating of phase can cause trial period when terminal device reaches in user hand that may all have finished on, influence user's It is normal on probation.It is so preferably on probation as temporary Authorization time threshold, such as regulation using discontinuous number of days in this example Phase is 15 days, then it represents that user can use software at arbitrary 15 days in a manner of on probation.
Step 170, determine whether the number of days effectively logged in historical log record reaches the number of days for allowing to log in;
Specifically, the effective login number of days recorded in being recorded according to historical log, on probation whole to determine whether to have reached Only condition.
If not up to allowing the number of days logged in, step 180 is performed, login authentication confirmation message is generated and/or calls and step on Record interface display data are shown, and current date is added in historical log record.
If reaching the number of days for allowing to log in, illustrate it is on probation be over, execution step 190 at this time.
Step 190, generation login authentication failure prompt message, and show.
Further, in the case of with network connection, first terminal equipment can also generate temporary Authorization command for stopping It is sent to server.Temporary Authorization command for stopping includes the IMEI information of first terminal equipment, and server is according to temporary Authorization end Only the IMEI information of first terminal equipment in ephemeral data list is deleted in instruction, so as to be set in server end realization to first terminal Standby software tries out record and the management of mandate.
The authority checking method on probation of software provided in an embodiment of the present invention, for a kind of authority checking side on probation of software Method, it is proposed that a kind of new software tries out time management mode, effectively can try out time of mandate by software for calculation, that is, meet and use The demand normally on probation at family, and ensured the interests of software developer.
Professional should further appreciate that, be described with reference to the embodiments described herein each exemplary Unit and algorithm steps can be realized with the combination of electronic hardware, computer software or the two, hard in order to clearly demonstrate The interchangeability of part and software generally describes each exemplary composition and step according to function in the above description. These functions are performed actually with hardware or software mode, specific application and design constraint depending on technical solution. Professional technician can realize described function to each specific application using distinct methods, but this realization It is it is not considered that beyond the scope of this invention.
The step of method or algorithm for being described with reference to the embodiments described herein, can use hardware, processor to perform The combination of software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only memory (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field In any other form of storage medium well known to interior.
Above-described specific embodiment has carried out the purpose of the present invention, technical solution and advantageous effect further It is described in detail, it should be understood that the foregoing is merely the specific embodiment of the present invention, is not intended to limit the present invention Protection domain, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should all include Within protection scope of the present invention.

Claims (5)

1. a kind of authority checking method on probation of software, which is characterized in that the method includes:
First terminal equipment receives software and tries out enabled instruction;It is described to include software I D using enabled instruction;
According to the pre-stored software installation time in the software I D acquisition systems;
It determines to receive whether the current time that the software tries out enabled instruction is later than the software installation time;
If being later than the software installation time, determined in the historical log stored in system record according to the current time Whether there is the login record of current date;
If so, it then generates login authentication confirmation message and/or login interface display data is called to be shown;
If not provided, obtain temporary Authorization time threshold;The temporary Authorization time threshold includes the number of days for allowing to log in;
Determine whether the number of days effectively logged in the historical log record reaches the number of days for allowing to log in;
If the not up to described number of days for allowing to log in, generates login authentication confirmation message and/or login interface is called to show Data are shown.
2. the authority checking method on probation of software according to claim 1, which is characterized in that if not up to described permission The number of days of login, the method further include:
The current date is added in into the historical log record.
3. the authority checking method on probation of software according to claim 1, which is characterized in that if the current time is not The software installation time is later than, the method further includes:
Login authentication failure prompt message is generated, and is shown.
4. the authority checking method on probation of software according to claim 3, which is characterized in that if the current time is not The software installation time is later than, the method further includes:
Generation temporary Authorization command for stopping is sent to server;The temporary Authorization command for stopping includes the state of first terminal equipment Move device identification IMEI information in border;
The server deletes first terminal equipment described in ephemeral data list according to the temporary Authorization command for stopping IMEI information.
5. the authority checking method on probation of software according to claim 4, which is characterized in that in the first terminal equipment Before reception software tries out enabled instruction, the method further includes:
The first terminal equipment receives software enabled instruction, and the first terminal equipment is obtained according to the software enabled instruction IMEI information;
Access request message is sent to the server;The access request message carries the IMEI letters of the first terminal equipment Breath;
The application server is inquired according to the IMEI information of the first terminal equipment in the database server Matching;
When identical IMEI information is not present in match query to the database server, generates the software and try out startup Instruction, and it is sent to the first terminal equipment.
CN201611243120.XA 2016-12-29 2016-12-29 Trial authorization verification method of software Active CN108256297B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611243120.XA CN108256297B (en) 2016-12-29 2016-12-29 Trial authorization verification method of software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611243120.XA CN108256297B (en) 2016-12-29 2016-12-29 Trial authorization verification method of software

Publications (2)

Publication Number Publication Date
CN108256297A true CN108256297A (en) 2018-07-06
CN108256297B CN108256297B (en) 2020-07-14

Family

ID=62719775

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611243120.XA Active CN108256297B (en) 2016-12-29 2016-12-29 Trial authorization verification method of software

Country Status (1)

Country Link
CN (1) CN108256297B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114626067A (en) * 2021-06-25 2022-06-14 江苏航天龙梦信息技术有限公司 Temporary firmware control method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1305151A (en) * 1999-12-08 2001-07-25 开利公司 Software safety mechanism
CN1758586A (en) * 2004-10-07 2006-04-12 株式会社日立制作所 Time stamp service system and checking server for time stamp information and computer software
CN102034059A (en) * 2010-12-02 2011-04-27 东莞宇龙通信科技有限公司 Method and device for managing application program and terminal
CN103365675A (en) * 2012-04-02 2013-10-23 鸿富锦精密工业(深圳)有限公司 Demoware processing system and method
US20150223191A1 (en) * 2014-01-31 2015-08-06 Qualcomm Incorporated Methods and systems for discovery of home node b gateway support of positioning

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1305151A (en) * 1999-12-08 2001-07-25 开利公司 Software safety mechanism
CN1758586A (en) * 2004-10-07 2006-04-12 株式会社日立制作所 Time stamp service system and checking server for time stamp information and computer software
CN102034059A (en) * 2010-12-02 2011-04-27 东莞宇龙通信科技有限公司 Method and device for managing application program and terminal
CN103365675A (en) * 2012-04-02 2013-10-23 鸿富锦精密工业(深圳)有限公司 Demoware processing system and method
US20150223191A1 (en) * 2014-01-31 2015-08-06 Qualcomm Incorporated Methods and systems for discovery of home node b gateway support of positioning

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114626067A (en) * 2021-06-25 2022-06-14 江苏航天龙梦信息技术有限公司 Temporary firmware control method

Also Published As

Publication number Publication date
CN108256297B (en) 2020-07-14

Similar Documents

Publication Publication Date Title
US11669338B2 (en) Device locator disable authentication
US9432339B1 (en) Automated token renewal using OTP-based authentication codes
US10230722B2 (en) Trusted status transfer between associated devices
US11004124B2 (en) Method for signing up a user to a service for controlling at least one vehicle functionality by means of a user terminal
CN109784031B (en) Account identity verification processing method and device
US10144391B2 (en) Electronics unit, method carried out in an electronics unit of said type, method for sharing a time frame between a server and an electronics unit, and method for synchronizing a server and an electronics unit
US8195124B2 (en) Apparatus and methods for managing time sensitive application privileges on a wireless device
CN106572081B (en) The method of logon rights verifying
US9680814B2 (en) Method, device, and system for registering terminal application
CN110855598A (en) Terminal application management method, terminal device, cloud server and storage medium
US20110250867A1 (en) Method and apparatus for restricting network access in a mobile communication terminal
CN108259163B (en) Authorization method of terminal equipment
CN111177741A (en) Pre-authorization data access method and device based on enterprise browser
EP3079329B1 (en) Terminal application registration method, device and system
CN111786995B (en) Account password management method, management middleware, system, equipment and storage medium
CN108256297A (en) The authority checking method on probation of software
CN109389720B (en) Intelligent door lock permission processing method and device
CN108259424B (en) Authorization verification method of terminal equipment
RU2679187C2 (en) Method, device for setting system data and terminal
KR101580548B1 (en) Method to manage security algorithm for ecu of vehicle
CN113806720B (en) Software authentication method, system and storage medium supporting offline scene
JP6828960B2 (en) Communication devices, management servers, security systems, control methods and programs
CN107995625B (en) Mobile terminal, method for calling out contact person, storage medium and credit SIM card
US20180198797A1 (en) Method of managing profiles in a secure element
EP4026357B1 (en) System, method, and computer program for protecting against unintentional deletion of an esim from a mobile device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 100020 Beijing, East Third Ring Road, North Road, a building, floor 1702, room 17, room 26

Patentee after: Beijing Borui Tongyun Technology Co.,Ltd.

Address before: 100020 Beijing, East Third Ring Road, North Road, a building, floor 1702, room 17, room 26

Patentee before: BEIJING BRAY TONGYUN CULTURE COMMUNICATION Co.,Ltd.

CP01 Change in the name or title of a patent holder