CN109508517B - Selective activation method and equipment for software function module - Google Patents

Selective activation method and equipment for software function module Download PDF

Info

Publication number
CN109508517B
CN109508517B CN201811266591.1A CN201811266591A CN109508517B CN 109508517 B CN109508517 B CN 109508517B CN 201811266591 A CN201811266591 A CN 201811266591A CN 109508517 B CN109508517 B CN 109508517B
Authority
CN
China
Prior art keywords
character string
activated
code
function module
software function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811266591.1A
Other languages
Chinese (zh)
Other versions
CN109508517A (en
Inventor
闻嘉昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Sipuling Technology Co Ltd
Original Assignee
Wuhan Sipuling Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Sipuling Technology Co Ltd filed Critical Wuhan Sipuling Technology Co Ltd
Priority to CN201811266591.1A priority Critical patent/CN109508517B/en
Publication of CN109508517A publication Critical patent/CN109508517A/en
Application granted granted Critical
Publication of CN109508517B publication Critical patent/CN109508517B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the invention provides a method and equipment for selectively activating a software functional module. Wherein the method comprises the following steps: acquiring a software function module to be activated, combining a PID number and an ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code; and analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code. According to the selective activation method and device for the software function module, the PID number and the ID number of the software function module to be activated are combined, the SN code is obtained through encryption, the SN code is analyzed, the PID code is matched with the PID code of the software function module to be activated, the authorization code is finally obtained, and the software function module can be selectively activated.

Description

Selective activation method and equipment for software function module
Technical Field
The embodiment of the invention relates to the technical field of computers, in particular to a method and equipment for selectively activating a software function module.
Background
The security policy visualization analysis platform system realizes the network topology display of the network under the security domain infrastructure through the analysis and calculation of the network routing configuration, the address conversion policy and the access control policy, and enables the network security policy to be visible, controllable and manageable. With the perfect function of the security policy visualization platform, the whole platform is developing towards modularization, and the function of the software visualization platform can be modularly customized according to the requirement of a user. The current authorization control is based on the SN code generated by the system for installing the security policy visualization platform.
In the current activation mode of the policy visualization platform, software activation authentication is mainly performed by using a computer MAC address as source data to perform calculation and encryption to obtain an SN (serial number) code. However, in the Linux system, the MAC address can be set, and although the same MAC address in the same lan can cause confusion of computer network communication, deploying data visualization platforms in different network environments does not have the problem of MAC address conflict, and the same SN code can be generated by the same MAC address, so that the way of generating the SN code by using MAC is easily forged, and authorization on a single machine can be used on multiple instruments. With the function development of the security policy visualization platform, the platform is developed from the former fixed function platform into an elastic customizable function platform, and a customer can install all the functions for trial use, but can select a required module for purchase activation according to the use scene of the customer when purchasing activation, so that the cost is saved. However, when the client activates the software, the SN code generated based on the MAC address does not correctly reflect the function installed by the client, and thus, the client can only authorize the function as a whole, and cannot authorize the function accurately according to the module. Therefore, a method capable of selectively activating required software function modules is found, and particularly, the method can be applied to not only a policy visualization analysis platform system but also other software platform systems, so that the technical problem to be solved in the art is solved.
Disclosure of Invention
In view of the foregoing problems in the prior art, embodiments of the present invention provide a method and an apparatus for selectively activating a software function module.
In a first aspect, an embodiment of the present invention provides a method for selectively activating a software functional module, including: acquiring a software function module to be activated, combining a PID number and an ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code; and analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code.
Further, the combining the PID number and the ID number of the software functional module to be activated to obtain a splicing character string includes: storing the ID number in two bytes, storing the PID number in four bytes, using the two bytes storing the ID number as a header, storing the four-byte tail of the PID number, and splicing to obtain a hexadecimal character string; and the hexadecimal character string is the splicing character string.
Further, the encrypting the splicing character string to obtain the SN code includes: encrypting the splicing character string by adopting a BASE64 method to obtain an encrypted splicing character string, and encrypting the encrypted splicing character string again by adopting an AES method to obtain an SN code; and the format of the encrypted splicing character string is fixed to a psk mode.
Further, the analyzing the SN code to obtain an authorization code includes: decoding the SN code by adopting an AES method to obtain a decoded character string, decoding the decoded character string again by adopting a BASE64 method to obtain a character string to be detected, if the character string to be detected is a hexadecimal number and the byte length is six, and the first two bytes of the character string to be detected are the software function module ID, obtaining the tail four bytes of the character string to be detected, and if the tail four bytes are consistent with the PID of the corresponding software function module to be activated, generating the authorization code.
Further, the method for selectively activating the software functional module further includes: assigning the PID of the software functional module which does not need to be activated to a fixed numerical value; wherein the fixed value is used to identify that the software function module does not require activation.
Further, the method for selectively activating the software functional module further includes: and if the character string to be detected is not a hexadecimal number or the byte length is not six, determining that the software function module represented by the character string to be detected does not need to be activated.
Further, the method for selectively activating the software functional module further includes: and if the two bytes at the head of the character string to be detected are not the software function module ID, determining that the software function module represented by the character string to be detected does not need to be activated.
In a second aspect, an embodiment of the present invention provides a device for selectively activating a software function module, including:
the SN code acquisition module is used for acquiring a software function module to be activated, combining the PID number and the ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code;
and the authorization code acquisition module is used for analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code.
In a third aspect, an embodiment of the present invention provides an electronic device, including:
at least one processor; and
at least one memory communicatively coupled to the processor, wherein:
the memory stores program instructions executable by the processor, the processor invoking the program instructions to perform the method for selective activation of software functional modules provided by any of the various possible implementations of the first aspect.
In a fourth aspect, embodiments of the present invention provide a non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform a method for selective activation of software functional modules provided in any of a variety of possible implementations of the first aspect.
According to the selective activation method and device for the software function module, the PID number and the ID number of the software function module to be activated are combined, the SN code is obtained through encryption, the SN code is analyzed, the PID code is matched with the PID code of the software function module to be activated, the authorization code is finally obtained, and the software function module can be selectively activated.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, a brief description will be given below to the drawings required for the description of the embodiments or the prior art, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flowchart of a method for selectively activating software function modules according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of a selective activation device for software function modules according to an embodiment of the present invention;
fig. 3 is a schematic physical structure diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention. In addition, technical features of various embodiments or individual embodiments provided by the invention can be arbitrarily combined with each other to form a feasible technical solution, but must be realized by a person skilled in the art, and when the technical solution combination is contradictory or cannot be realized, the technical solution combination is not considered to exist and is not within the protection scope of the present invention.
The embodiment of the invention provides a selective activation method of a software function module, and referring to fig. 1, the method comprises the following steps:
101. acquiring a software function module to be activated, combining a PID number and an ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code;
102. and analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code.
On the basis of the foregoing embodiment, the method for selectively activating a software function module according to the embodiment of the present invention, which combines the PID number and the ID number of the software function module to be activated to obtain a spliced character string, includes: storing the ID number in two bytes, storing the PID number in four bytes, using the two bytes storing the ID number as a header, storing the four-byte tail of the PID number, and splicing to obtain a hexadecimal character string; and the hexadecimal character string is the splicing character string.
On the basis of the foregoing embodiment, the method for selectively activating a software function module according to the embodiment of the present invention, where encrypting the concatenated string to obtain the SN code, includes: encrypting the splicing character string by adopting a BASE64 method to obtain an encrypted splicing character string, and encrypting the encrypted splicing character string again by adopting an AES method to obtain an SN code; and the format of the encrypted splicing character string is fixed to a psk mode.
On the basis of the foregoing embodiment, the method for selectively activating a software function module provided in the embodiment of the present invention, where the analyzing the SN code to obtain an authorization code, includes: decoding the SN code by adopting an AES method to obtain a decoded character string, decoding the decoded character string again by adopting a BASE64 method to obtain a character string to be detected, if the character string to be detected is a hexadecimal number and the byte length is six (for a long character string, whether the byte length is a multiple of six can also be detected), and the first two bytes of the character string to be detected are software function module IDs (if the character string to be detected does not belong to the category of the software function module IDs, an illegal character string is determined, and processing is not carried out), obtaining the tail four bytes of the character string to be detected, and if the tail four bytes are consistent with the PIDs of the corresponding software function modules needing to be activated, generating the authorization code.
On the basis of the above embodiment, the method for selectively activating a software function module provided in the embodiment of the present invention further includes: assigning the PID of the software functional module which does not need to be activated to a fixed numerical value; wherein the fixed value is used to identify that the software function module does not require activation. Specifically, the fixed value assigned by the PID of the software function module that does not need to be activated may be "8000" in hexadecimal. It can be seen that "if the tail four bytes are consistent with the corresponding PID of the software functional module to be activated" mentioned in the foregoing embodiment, the values of the PIDs cannot include the hexadecimal number "8000" and the error identification hexadecimal number "8000F". When the PID value of a software functional module is "8000" or "8000F" as a hexadecimal number, the software functional module is considered to belong to a software functional module that does not need to be activated.
On the basis of the above embodiment, the method for selectively activating a software function module provided in the embodiment of the present invention further includes: and if the character string to be detected is not a hexadecimal number or the byte length is not six, determining that the software function module represented by the character string to be detected does not need to be activated.
On the basis of the above embodiment, the method for selectively activating a software function module provided in the embodiment of the present invention further includes: and if the two bytes at the head of the character string to be detected are not the software function module ID, determining that the software function module represented by the character string to be detected does not need to be activated.
It should be noted that the method provided by the embodiments of the present invention may be applied to a policy visualization analysis platform system.
According to the selective activation method of the software function module, the PID number and the ID number of the software function module to be activated are combined, the SN code is obtained through encryption, the SN code is analyzed, the PID code is matched with the PID code of the software function module to be activated, the authorization code is finally obtained, and the software function module can be selectively activated.
The implementation basis of the various embodiments of the present invention is realized by programmed processing performed by a device having a processor function. Therefore, in engineering practice, the technical solutions and functions thereof of the embodiments of the present invention can be packaged into various modules. Based on this reality, on the basis of the above embodiments, embodiments of the present invention provide a software functional module selective activation apparatus, which is configured to execute the software functional module selective activation method in the above method embodiments. Referring to fig. 2, the apparatus includes:
an SN code obtaining module 201, configured to obtain a software function module to be activated, combine a PID number and an ID number of the software function module to be activated to obtain a spliced character string, and encrypt the spliced character string to obtain an SN code;
and an authorization code obtaining module 202, configured to parse the SN code to obtain an authorization code, and activate the software function module to be activated by using the authorization code.
According to the selective activation device for the software function module, provided by the embodiment of the invention, the SN code acquisition module and the authorization code acquisition module are adopted, the PID number and the ID number of the software function module to be activated are combined, the SN code is obtained through encryption, the SN code is analyzed, the PID code is matched with the PID code of the software function module to be activated, the authorization code is finally obtained, and the software function module can be selectively activated.
The method of the embodiment of the invention is realized by depending on the electronic equipment, so that the related electronic equipment is necessarily introduced. To this end, an embodiment of the present invention provides an electronic apparatus, as shown in fig. 3, including: at least one processor (processor)301, a communication Interface (Communications Interface)304, at least one memory (memory)302 and a communication bus 303, wherein the at least one processor 301, the communication Interface 304 and the at least one memory 302 are configured to communicate with each other via the communication bus 303. The at least one processor 301 may call logic instructions in the at least one memory 302 to perform the following method: acquiring a software function module to be activated, combining a PID number and an ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code; and analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code.
Furthermore, the logic instructions in the at least one memory 302 may be implemented in software functional units and stored in a computer readable storage medium when sold or used as a stand-alone product. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. Examples include: acquiring a software function module to be activated, combining a PID number and an ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code; and analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (5)

1. A method for selectively activating software functional modules, comprising:
acquiring a software function module to be activated, combining a PID number and an ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code;
analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code;
combining the PID number and the ID number of the software functional module to be activated to obtain a splicing character string, wherein the splicing character string comprises:
storing the ID number in two bytes, storing the PID number in four bytes, using the two bytes storing the ID number as a header, storing the four-byte tail of the PID number, and splicing to obtain a hexadecimal character string; the hexadecimal character string is the splicing character string;
the encrypting the splicing character string to obtain the SN code comprises the following steps:
encrypting the splicing character string by adopting a BASE64 method to obtain an encrypted splicing character string, and encrypting the encrypted splicing character string again by adopting an AES method to obtain an SN code;
the analyzing the SN code to obtain an authorization code includes:
decoding the SN code by adopting an AES method to obtain a decoded character string, decoding the decoded character string again by adopting a BASE64 method to obtain a character string to be detected, if the character string to be detected is a hexadecimal number and the byte length is six, and the first two bytes of the character string to be detected are the ID of the software function module, obtaining the tail four bytes of the character string to be detected, and if the tail four bytes are consistent with the PID of the corresponding software function module to be activated, generating the authorization code;
the PID of the software functional module which does not need to be activated is given to a fixed numerical value, and the fixed numerical value is used for determining that the software functional module does not need to be activated;
if the character string to be detected is not a hexadecimal number or the byte length is not six, determining that the software function module represented by the character string to be detected does not need to be activated;
and if the two bytes at the head of the character string to be detected are not the software function module ID, determining that the software function module represented by the character string to be detected does not need to be activated.
2. The method of selective activation of software functional modules according to claim 1, wherein the format of the encrypted concatenation string is fixed to a psk mode.
3. A device for selectively activating software function modules, comprising:
the SN code acquisition module is used for acquiring a software function module to be activated, combining the PID number and the ID number of the software function module to be activated to obtain a splicing character string, and encrypting the splicing character string to obtain an SN code;
the authorization code acquisition module is used for analyzing the SN code to obtain an authorization code, and activating the software function module to be activated by adopting the authorization code;
combining the PID number and the ID number of the software functional module to be activated to obtain a splicing character string, wherein the splicing character string comprises:
storing the ID number in two bytes, storing the PID number in four bytes, using the two bytes storing the ID number as a header, storing the four-byte tail of the PID number, and splicing to obtain a hexadecimal character string; the hexadecimal character string is the splicing character string;
the encrypting the splicing character string to obtain the SN code comprises the following steps:
encrypting the splicing character string by adopting a BASE64 method to obtain an encrypted splicing character string, and encrypting the encrypted splicing character string again by adopting an AES method to obtain an SN code;
the analyzing the SN code to obtain an authorization code includes:
decoding the SN code by adopting an AES method to obtain a decoded character string, decoding the decoded character string again by adopting a BASE64 method to obtain a character string to be detected, if the character string to be detected is a hexadecimal number and the byte length is six, and the first two bytes of the character string to be detected are the ID of the software function module, obtaining the tail four bytes of the character string to be detected, and if the tail four bytes are consistent with the PID of the corresponding software function module to be activated, generating the authorization code;
the PID of the software functional module which does not need to be activated is given to a fixed numerical value, and the fixed numerical value is used for determining that the software functional module does not need to be activated;
if the character string to be detected is not a hexadecimal number or the byte length is not six, determining that the software function module represented by the character string to be detected does not need to be activated;
and if the two bytes at the head of the character string to be detected are not the software function module ID, determining that the software function module represented by the character string to be detected does not need to be activated.
4. An electronic device, comprising:
at least one processor, at least one memory, a communication interface, and a bus; wherein the content of the first and second substances,
the processor, the memory and the communication interface complete mutual communication through the bus;
the memory stores program instructions executable by the processor, the processor calling the program instructions to perform the method of any of claims 1 to 2.
5. A non-transitory computer-readable storage medium storing computer instructions that cause a computer to perform the method of any one of claims 1-2.
CN201811266591.1A 2018-10-29 2018-10-29 Selective activation method and equipment for software function module Active CN109508517B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811266591.1A CN109508517B (en) 2018-10-29 2018-10-29 Selective activation method and equipment for software function module

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811266591.1A CN109508517B (en) 2018-10-29 2018-10-29 Selective activation method and equipment for software function module

Publications (2)

Publication Number Publication Date
CN109508517A CN109508517A (en) 2019-03-22
CN109508517B true CN109508517B (en) 2021-06-29

Family

ID=65747004

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811266591.1A Active CN109508517B (en) 2018-10-29 2018-10-29 Selective activation method and equipment for software function module

Country Status (1)

Country Link
CN (1) CN109508517B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101404052A (en) * 2008-05-04 2009-04-08 北京深思洛克软件技术股份有限公司 Method for remotely activating software
CN102842000A (en) * 2012-07-18 2012-12-26 攀枝花学院 Method for realizing common software registration system
CN104112084A (en) * 2013-04-16 2014-10-22 国际商业机器公司 Execution-based license discovery and optimization method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6993664B2 (en) * 2001-03-27 2006-01-31 Microsoft Corporation Method and system for licensing a software product
US7278131B2 (en) * 2003-03-03 2007-10-02 Microsoft Corporation Compact hardware identification for binding a software package to a computer system having tolerance for hardware changes
CN107679371A (en) * 2017-09-25 2018-02-09 用友网络科技股份有限公司 Software license control method, device, computer equipment and readable storage medium storing program for executing

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101404052A (en) * 2008-05-04 2009-04-08 北京深思洛克软件技术股份有限公司 Method for remotely activating software
CN102842000A (en) * 2012-07-18 2012-12-26 攀枝花学院 Method for realizing common software registration system
CN104112084A (en) * 2013-04-16 2014-10-22 国际商业机器公司 Execution-based license discovery and optimization method and device

Also Published As

Publication number Publication date
CN109508517A (en) 2019-03-22

Similar Documents

Publication Publication Date Title
CN105577684B (en) Method, server-side, client and the system of anti-crawler capturing
CN111143869B (en) Application package processing method and device, electronic equipment and storage medium
CN106130733B (en) Update the methods, devices and systems of configuration
CN107395614A (en) Single-point logging method and system
CN106302453A (en) The processing method of data, Apparatus and system
EP2963958A1 (en) Network device, terminal device and information security improving method
US9838359B2 (en) Separation of IoT network thing identification data at a network edge device
CN107992771B (en) A kind of data desensitization method and device
CN110351281B (en) Universal data frame analysis method, device and equipment
CN108171088A (en) A kind of guard method of server hardware credibility and device based on BMC
CN108055585B (en) Data processing method, set top box upgrading method, terminal and set top box
CN108075888B (en) Dynamic URL generation method and device, storage medium and electronic equipment
CN107431620B (en) Runtime instantiation of broadcast encryption schemes
CN112734361A (en) Distributed cooperative office data processing method and system
CN109522683B (en) Software tracing method, system, computer equipment and storage medium
CN108737338A (en) A kind of authentication method and system
CN114430346A (en) Login method and device and electronic equipment
CN109508517B (en) Selective activation method and equipment for software function module
CN107577715B (en) SO file protection method and device
CN107547499A (en) Feature database collocation method and device
CN113542187A (en) File uploading and downloading method and device, computer device and medium
CN106712934B (en) Identification information generation method and device
US20170206356A1 (en) Information processing system, controlling method, and controlling computer program
CN114244600B (en) Method for interfering malicious program
CN107592217A (en) A kind of user identification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant