CN112596740A - Program deployment method and device - Google Patents

Program deployment method and device Download PDF

Info

Publication number
CN112596740A
CN112596740A CN202011595041.1A CN202011595041A CN112596740A CN 112596740 A CN112596740 A CN 112596740A CN 202011595041 A CN202011595041 A CN 202011595041A CN 112596740 A CN112596740 A CN 112596740A
Authority
CN
China
Prior art keywords
user server
program
license
certificate
container
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011595041.1A
Other languages
Chinese (zh)
Inventor
郁丛军
夏曙东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing China Transinfo Stock Co ltd
Original Assignee
Beijing China Transinfo Stock Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing China Transinfo Stock Co ltd filed Critical Beijing China Transinfo Stock Co ltd
Priority to CN202011595041.1A priority Critical patent/CN112596740A/en
Publication of CN112596740A publication Critical patent/CN112596740A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files

Abstract

The invention discloses a program deployment method and a device, wherein the method comprises the following steps: acquiring a configuration file for creating a container and creating the container, wherein a project program is installed in the container; starting a container to run a project program; sending a license application containing user server information to an authorization server through a project program so that the authorization server generates a license certificate according to the user server information; and receiving the license from the authorization server, so that the project program calls the license to verify when receiving the access request, and processing the access request after successful verification. By combining containerization management and permission authorization, namely, the project program is carried in the container to run, the coupling degree between the project program and the machine environment is reduced, the deployment workload of operation and maintenance personnel is reduced, the efficiency is improved, in addition, the use of the project program is managed in a permission authorization mode, the deployed project can be prevented from being copied to other machines for multiple users to use, and the problem of software piracy is avoided.

Description

Program deployment method and device
Technical Field
The invention relates to the technical field of computers, in particular to a program deployment method and device.
Background
At present, when a project program is deployed, some components depending on the project are often installed according to the environment of a user server, or when the project is required to be migrated to a new environment, the project program is deployed according to the new environment, so that the time and labor cost for deployment are spent, some users even copy a plurality of deployed projects to other machines for use by a plurality of users, and the problem of software piracy is caused.
Disclosure of Invention
The present invention is directed to a program deployment method and apparatus that address the above-described deficiencies of the prior art, and the object is achieved by the following means.
The first aspect of the present invention provides a program deployment method, which is applied to a user server, and includes:
acquiring a configuration file for creating a container, and creating the container according to the configuration file, wherein a project program is installed in the container;
starting the container to run the project program;
sending a license application containing user server information to an authorization server through the project program so that the authorization server generates a license certificate according to the user server information;
and receiving and storing the license certificate from the authorization server, so that the project program calls the license certificate to verify when receiving the access request, and processes the access request after the verification is successful.
A second aspect of the present invention provides a program deployment method, which is applied to an authorization server, and includes:
receiving a permission application sent by a user server, wherein the permission application comprises user server information;
inquiring whether the user server information exists in a preset authorization configuration table or not;
if so, generating a license certificate by using the user server information, and encrypting the license certificate by using a locally stored private key;
and sending the encrypted license certificate to a user server corresponding to the user server information, so that the license certificate is called for verification when the item program running in the container of the user server receives an access request, and the access request is processed after the verification is successful.
A third aspect of the present invention provides a program deployment apparatus, which is applied to a user server, and includes:
the system comprises a deployment container module, a configuration file generation module and a configuration file generation module, wherein the deployment container module is used for acquiring the configuration file used for creating a container and creating the container according to the configuration file, and a project program is installed in the container;
a container starting module, configured to start the container to run the project program;
the application authorization module is used for sending a permission application containing the user server information to an authorization server through the project program so that the authorization server generates a permission certificate according to the user server information;
and the receiving module is used for receiving and storing the license certificate from the authorization server so as to call the license certificate for verification when the project program receives the access request and process the access request after the verification is successful.
A fourth aspect of the present invention provides a program deployment apparatus, which is applied to an authorization server, and includes:
the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a permission application sent by a user server, and the permission application comprises user server information;
the query module is used for querying whether the user server information exists in a preset authorization configuration table or not;
the certificate generation module is used for generating a license certificate by using the user server information when the user server information is inquired, and encrypting the license certificate by using a locally stored private key;
and the certificate sending module is used for sending the encrypted license certificate to the user server corresponding to the user server information so as to call the license certificate for verification when the item program running in the container of the user server receives an access request, and process the access request after the verification is successful.
A fifth aspect of the invention proposes a machine-readable storage medium having stored thereon a computer program which, when executed by a processor, carries out the steps of the method according to the first or second aspect.
Based on the program deployment method and apparatus described in the first to fourth aspects, the present invention has the following advantages:
by combining containerization management and permission authorization, namely, the project program is carried in a container to run, the coupling degree between the project program and the machine environment is reduced, the deployment workload of operation and maintenance personnel is reduced, the deployment efficiency is improved, in addition, the use of the project program is managed in a permission authorization mode, the deployed project can be prevented from being copied to other machines for multiple users to use, and the problem of software piracy is avoided.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention. In the drawings:
FIG. 1 is a flowchart illustrating one embodiment of a method of program deployment in accordance with one illustrative embodiment of the present invention;
FIG. 2 is a flowchart illustrating another method of program deployment in accordance with an exemplary embodiment of the present invention;
FIG. 3 is a diagram illustrating a hardware configuration of a server in accordance with an exemplary embodiment of the present invention;
FIG. 4 is a schematic block diagram of a program deployment device according to an exemplary embodiment of the present invention;
fig. 5 is a schematic structural diagram of another program deployment apparatus according to an exemplary embodiment of the present invention.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present invention. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
In order to solve the problems of inconsistent deployment environment, low deployment efficiency and stolen software use copyright, the invention provides an improved program deployment method, which combines containerization management and permission authorization, namely, a project program is loaded in a container to run so as to reduce the coupling degree between the project program and a machine environment, reduce the deployment workload of operation and maintenance personnel and improve the deployment efficiency.
The program deployment method of the present invention will be described in detail with reference to specific embodiments.
The first embodiment is as follows:
fig. 1 is a flowchart illustrating an embodiment of a program deployment method applied to a user server for deploying a project program according to an exemplary embodiment of the present invention, as shown in fig. 1, the program deployment method including the steps of:
step 101: and acquiring a configuration file for creating a container, and creating the container according to the configuration file, wherein the container is provided with a project program.
The configuration file may be in a format of yaml, and information such as a memory for controlling the container, an environmental variable, and health check is recorded in the configuration file. In the configuration file, an image file corresponding to the boot container is specified. Different image files may enable the started container to perform different functions.
It should be noted that the configuration file also defines the installation package of the project program and the configuration file of the program, so that the project program is installed in the container after the container is created according to the configuration file.
The configuration file of the program records configuration information required for the operation of the project program, such as a public key for decrypting the license certificate, a storage directory of the license certificate, an address of the authorization server, and the like.
Step 102: and starting the container to run the project program.
Wherein, the container is started by executing the container starting command, and after the container is started, the item program in the container is started.
Step 103: and sending a license application containing the user server information to the authorization server through the project program so that the authorization server generates a license certificate according to the user server information.
The user server information may include information such as an ip (Internet Protocol) Address, a mac (Media Access Control Address), a motherboard serial number, and a cpu (Central Processing Unit) serial number.
In one embodiment, by providing a listener in the project program, the project program can determine whether a valid license credential exists on the user server before sending the license application to the authorization server, and if not, execute the process of step 103.
The specific determination process may include: firstly, judging whether a storage directory in a program configuration file stores a license certificate or not, if so, judging whether the license certificate is expired or not according to the current system time, if not, judging whether equipment information contained in the license certificate is user server information or not, and if so, determining that a valid license certificate exists on a user server; if no license certificate exists or the license certificate expires or the device information included in the license certificate is not the user server information, it is determined that a valid license certificate does not exist on the user server.
The license certificate generated by the authorization server based on the user server information includes device information (i.e., user server information), validity period information, and the like. The validity period information refers to the length of time that the project program on the user server can be used.
Step 104: and receiving and storing the license certificate from the authorization server, so that the project program calls the license certificate to verify when receiving the access request, and processes the access request after the verification is successful.
Based on the information contained in the program configuration file described in step 101, the license certificate received by the user server is stored in the storage directory recorded in the program configuration file, so that the project program calls the license certificate in the storage directory to check each time the project program receives an access request, the access request is processed only after the check is successful, and if the check is failed, any access to the project program is shielded, thereby effectively avoiding the problem of software piracy.
It should be noted that, for the process of invoking a license to verify when the project program receives the access request, the determination principle of the valid license described in the above step 103 may be adopted, that is, the project program determines whether a license exists locally in the user server, if so, determines whether the license is expired according to the current system time, if not, continues to determine whether the device information included in the license is the user server information, if so, determines that the verification is successful, and if no license exists, or the license is expired, or the device information included in the license is not the user server information, determines that the verification is failed.
Because the license certificate contains the validity period information, the current system time can be compared with the validity period information, and if the current system time is within the range of the validity period information, the license certificate is not expired.
It should be further noted that, in order to ensure the security of the license, the license stored on the user server is encrypted, so before determining whether the license expires according to the current system time, the project program needs to acquire the program configuration file stored in the container and decrypt the license by using the public key in the program configuration file.
So far, the flow shown in fig. 1 is completed, through the deployment flow shown in fig. 1, containerization management and permission authorization are combined, that is, the project program is loaded in a container to run, so as to reduce the coupling degree between the project program and the machine environment, reduce the deployment workload of operation and maintenance personnel, improve the deployment efficiency, and in addition, through the use of the permission authorization mode to manage the project program, the deployed project can be prevented from being copied to other machines for use by a plurality of users, and the problem of software piracy is avoided.
Example two:
fig. 2 is a flowchart illustrating another program-deploying method applied to an authorization server for generating a license certificate for a user server according to an exemplary embodiment of the present invention, and based on the embodiment illustrated in fig. 1, as illustrated in fig. 2, the program-deploying method includes the following steps:
step 201: and receiving a permission application sent by the user server, wherein the permission application comprises user server information.
The user server information includes information such as an ip (Internet Protocol) Address, a mac (Media Access Control Address), a motherboard serial number, and a cpu (Central Processing Unit) serial number.
Step 202: and inquiring whether the user server information exists in a preset authorization configuration table, if so, executing the step 203, and if not, ending the current process.
Wherein, the authorization configuration table records the device information allowing to use the copyright of the project program.
Step 203: a license certificate is generated using the user server information and encrypted using a locally stored private key.
In an embodiment, for the process of generating the license certificate by using the user server information, the pre-configured certificate validity period information may be obtained first, and then the license certificate may be generated by using the user server information and the certificate validity period information.
The generated license includes user server information, validity period information, and the like. In order to ensure the security of the license certificate, the license certificate needs to be encrypted by using a private key generated in advance locally.
Illustratively, the private key may include an algorithm of the key, a password of the key, and owner information (first and last name, organization unit name, organization name, city or area name, state or province name, two-letter country code of the unit).
Step 204: and sending the encrypted license certificate to a user server corresponding to the user server information so that the license certificate is called for verification when the item program running in the container of the user server receives the access request, and the access request is processed after the verification is successful.
So far, the flow shown in fig. 2 is completed, through the deployment flow shown in fig. 2, containerization management and permission authorization are combined, that is, the project program is loaded in a container to run, so as to reduce the coupling degree between the project program and the machine environment, reduce the deployment workload of operation and maintenance personnel, improve the deployment efficiency, and in addition, through the use of the permission authorization manner of the authorization server to manage the project program, the deployed project can be prevented from being copied to other machines for use by a plurality of users, and the problem of software piracy is avoided.
Fig. 3 is a hardware configuration diagram of a server according to an exemplary embodiment of the present invention, the server including: a communication interface 401, a processor 402, a machine-readable storage medium 403, and a bus 404; wherein the communication interface 401, the processor 402 and the machine-readable storage medium 403 communicate with each other via a bus 404.
When the server is a user server, the processor 402 reads and executes the machine-executable instructions in the machine-readable storage medium 403 corresponding to the control logic of the program deployment method shown in fig. 1, which is described in detail with reference to the embodiment shown in fig. 1 and will not be described again here.
When the server is an authorized server, the processor 402 reads and executes the machine-executable instructions in the machine-readable storage medium 403 corresponding to the control logic of the program deployment method shown in fig. 2, which is described in detail with reference to the embodiment shown in fig. 2 and will not be described again here.
The machine-readable storage medium 403 referred to in this disclosure may be any electronic, magnetic, optical, or other physical storage device that can contain or store information such as executable instructions, data, and the like. For example, the machine-readable storage medium may be: volatile memory, non-volatile memory, or similar storage media. In particular, the machine-readable storage medium 403 may be a RAM (Random Access Memory), a flash Memory, a storage drive (e.g., a hard disk drive), any type of storage disk (e.g., an optical disk, a DVD, etc.), or similar storage medium, or a combination thereof.
The invention also provides an embodiment of a program deployment device corresponding to the embodiment of the program deployment method.
Fig. 4 is a flowchart illustrating an embodiment of a program deployment apparatus according to an exemplary embodiment of the present invention, where the program deployment apparatus is applied to a user server, and as shown in fig. 4, the program deployment apparatus includes:
a container deployment module 410, configured to obtain a configuration file for creating a container, and create the container according to the configuration file, where a project program is installed in the container;
a start container module 420 for starting the container to run the project program;
an application authorization module 430, configured to send a license application including the user server information to an authorization server through the project program, so that the authorization server generates a license certificate according to the user server information;
the receiving module 440 is configured to receive and store the license credential from the authorization server, so that the project program invokes the license credential to perform verification when receiving the access request, and processes the access request after successful verification.
In an optional implementation manner, the receiving module 440 is specifically configured to, in a process of invoking the license certificate to perform verification when the item program receives an access request, determine, by the item program, whether the license certificate exists locally in the user server; if yes, judging whether the license certificate is expired according to the current system time; if not, judging whether the equipment information contained in the license certificate is the user server information; if yes, determining that the verification is successful; and if the license certificate does not exist or expires or the device information contained in the license certificate is not the information of the user server, determining that the verification fails.
In an optional implementation, the apparatus further comprises:
a decryption module, configured to, before the receiving module 440 determines whether the license certificate is expired according to the current system time, obtain, by the project program, a program configuration file stored in the container, and decrypt, by using a public key in the program configuration file, the license certificate.
Fig. 5 is a flowchart illustrating another embodiment of a program deployment apparatus according to an exemplary embodiment of the present invention, where the program deployment apparatus is applied to an authorization server, and as shown in fig. 5, the program deployment apparatus includes:
a receiving module 510, configured to receive a license application sent by a user server, where the license application includes user server information;
a query module 520, configured to query whether the user server information exists in a preset authorization configuration table;
a certificate generation module 530, configured to, when the user server information is queried, generate a license certificate using the user server information, and encrypt the license certificate using a locally stored private key;
the certificate sending module 540 is configured to send the encrypted license certificate to the user server corresponding to the user server information, so that when the access request is received by the item program running in the container of the user server, the license certificate is called for verification, and the access request is processed after verification is successful.
In an optional implementation manner, the certificate generating module 530 is specifically configured to obtain preconfigured certificate validity information in the process of generating a license certificate by using the user server information; and generating a license certificate by using the user server information and the certificate validity period information.
The implementation process of the functions and actions of each unit in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the invention. One of ordinary skill in the art can understand and implement it without inventive effort.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This invention is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (10)

1. A program deployment method applied to a user server, the method comprising:
acquiring a configuration file for creating a container, and creating the container according to the configuration file, wherein a project program is installed in the container;
starting the container to run the project program;
sending a license application containing user server information to an authorization server through the project program so that the authorization server generates a license certificate according to the user server information;
and receiving and storing the license certificate from the authorization server, so that the project program calls the license certificate to verify when receiving the access request, and processes the access request after the verification is successful.
2. The method of claim 1, wherein invoking the license credential for verification when the project program receives an access request comprises:
the project program judges whether a license certificate exists locally in the user server;
if yes, judging whether the license certificate is expired according to the current system time;
if not, judging whether the equipment information contained in the license certificate is the user server information;
if yes, determining that the verification is successful;
and if the license certificate does not exist or expires or the device information contained in the license certificate is not the user server information, determining that the verification fails.
3. The method of claim 2, prior to determining whether the license credential has expired based on a current system time, comprising:
and the project program acquires the program configuration file stored in the container and decrypts the license certificate by using the public key in the program configuration file.
4. A program deployment method applied to an authorization server, the method comprising:
receiving a permission application sent by a user server, wherein the permission application comprises user server information;
inquiring whether the user server information exists in a preset authorization configuration table or not;
if so, generating a license certificate by using the user server information, and encrypting the license certificate by using a locally stored private key;
and sending the encrypted license certificate to a user server corresponding to the user server information, so that the license certificate is called for verification when the item program running in the container of the user server receives an access request, and the access request is processed after the verification is successful.
5. The method of claim 4, wherein generating a license credential using the user server information comprises:
acquiring pre-configured certificate validity information;
and generating a license certificate by using the user server information and the certificate validity period information.
6. A program deployment apparatus, applied to a user server, the apparatus comprising:
the system comprises a deployment container module, a configuration file generation module and a configuration file generation module, wherein the deployment container module is used for acquiring the configuration file used for creating a container and creating the container according to the configuration file, and a project program is installed in the container;
a container starting module, configured to start the container to run the project program;
the application authorization module is used for sending a permission application containing the user server information to an authorization server through the project program so that the authorization server generates a permission certificate according to the user server information;
and the receiving module is used for receiving and storing the license certificate from the authorization server so as to call the license certificate for verification when the project program receives the access request and process the access request after the verification is successful.
7. The apparatus according to claim 6, wherein the receiving module is specifically configured to, in a process of invoking the license credential for verification when the project program receives the access request, determine, by the project program, whether the license credential exists locally on the user server; if yes, judging whether the license certificate is expired according to the current system time; if not, judging whether the equipment information contained in the license certificate is the user server information; if yes, determining that the verification is successful; and if the license certificate does not exist or expires or the device information contained in the license certificate is not the information of the user server, determining that the verification fails.
8. A program deployment apparatus, applied to an authorization server, the apparatus comprising:
the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a permission application sent by a user server, and the permission application comprises user server information;
the query module is used for querying whether the user server information exists in a preset authorization configuration table or not;
the certificate generation module is used for generating a license certificate by using the user server information when the user server information is inquired, and encrypting the license certificate by using a locally stored private key;
and the certificate sending module is used for sending the encrypted license certificate to the user server corresponding to the user server information so as to call the license certificate for verification when the item program running in the container of the user server receives an access request, and process the access request after the verification is successful.
9. The apparatus according to claim 8, wherein the certificate generation module is specifically configured to, in the process of generating the license certificate by using the user server information, obtain preconfigured certificate validity information; and generating a license certificate by using the user server information and the certificate validity period information.
10. A machine readable storage medium, having stored thereon a computer program which, when executed by a processor, carries out the steps of the method of program deployment of any of claims 1 to 3 or claims 4 to 5.
CN202011595041.1A 2020-12-28 2020-12-28 Program deployment method and device Pending CN112596740A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011595041.1A CN112596740A (en) 2020-12-28 2020-12-28 Program deployment method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011595041.1A CN112596740A (en) 2020-12-28 2020-12-28 Program deployment method and device

Publications (1)

Publication Number Publication Date
CN112596740A true CN112596740A (en) 2021-04-02

Family

ID=75204137

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011595041.1A Pending CN112596740A (en) 2020-12-28 2020-12-28 Program deployment method and device

Country Status (1)

Country Link
CN (1) CN112596740A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113742660A (en) * 2021-08-11 2021-12-03 阿里巴巴新加坡控股有限公司 Application program permission management system and method
CN113946799A (en) * 2021-12-21 2022-01-18 深圳佑驾创新科技有限公司 Application program source code protection method and server
CN114221769A (en) * 2021-11-12 2022-03-22 联奕科技股份有限公司 Software authorization permission control method and device based on container
CN114422618A (en) * 2021-12-31 2022-04-29 北京千方科技股份有限公司 IOT platform protocol adaptation method, device, equipment and medium based on cloud protogenesis
CN114817868A (en) * 2022-06-30 2022-07-29 深圳市科力锐科技有限公司 License verification method, device, equipment and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140108794A1 (en) * 2012-10-16 2014-04-17 Citrix Systems, Inc. Controlling mobile device access to secure data
WO2016188730A1 (en) * 2015-05-27 2016-12-01 Siemens Aktiengesellschaft Device and method for adapting the use of an apparatus
CN106534148A (en) * 2016-11-29 2017-03-22 北京元心科技有限公司 Access control method and device for application
CN107797807A (en) * 2016-08-29 2018-03-13 阿里巴巴集团控股有限公司 Generate method, apparatus, terminal, server and the system of container
CN108664771A (en) * 2017-03-28 2018-10-16 鸿富锦精密电子(天津)有限公司 Security system for software and method
CN109241705A (en) * 2018-08-29 2019-01-18 中科鼎富(北京)科技发展有限公司 A kind of software authorization method and system
CN110389832A (en) * 2019-06-21 2019-10-29 深圳市汇川技术股份有限公司 ZooKeeper container cluster dispositions method, system, equipment and storage medium
CN110708310A (en) * 2019-09-30 2020-01-17 杭州数梦工场科技有限公司 Tenant-level authority management method, device and equipment
CN111079091A (en) * 2019-11-21 2020-04-28 中国民航信息网络股份有限公司 Software security management method and device, terminal and server
CN111708991A (en) * 2020-06-17 2020-09-25 腾讯科技(深圳)有限公司 Service authorization method, service authorization device, computer equipment and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140108794A1 (en) * 2012-10-16 2014-04-17 Citrix Systems, Inc. Controlling mobile device access to secure data
WO2016188730A1 (en) * 2015-05-27 2016-12-01 Siemens Aktiengesellschaft Device and method for adapting the use of an apparatus
CN107797807A (en) * 2016-08-29 2018-03-13 阿里巴巴集团控股有限公司 Generate method, apparatus, terminal, server and the system of container
CN106534148A (en) * 2016-11-29 2017-03-22 北京元心科技有限公司 Access control method and device for application
CN108664771A (en) * 2017-03-28 2018-10-16 鸿富锦精密电子(天津)有限公司 Security system for software and method
CN109241705A (en) * 2018-08-29 2019-01-18 中科鼎富(北京)科技发展有限公司 A kind of software authorization method and system
CN110389832A (en) * 2019-06-21 2019-10-29 深圳市汇川技术股份有限公司 ZooKeeper container cluster dispositions method, system, equipment and storage medium
CN110708310A (en) * 2019-09-30 2020-01-17 杭州数梦工场科技有限公司 Tenant-level authority management method, device and equipment
CN111079091A (en) * 2019-11-21 2020-04-28 中国民航信息网络股份有限公司 Software security management method and device, terminal and server
CN111708991A (en) * 2020-06-17 2020-09-25 腾讯科技(深圳)有限公司 Service authorization method, service authorization device, computer equipment and storage medium

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113742660A (en) * 2021-08-11 2021-12-03 阿里巴巴新加坡控股有限公司 Application program permission management system and method
CN113742660B (en) * 2021-08-11 2023-07-25 阿里巴巴新加坡控股有限公司 Application program license management system and method
CN114221769A (en) * 2021-11-12 2022-03-22 联奕科技股份有限公司 Software authorization permission control method and device based on container
CN113946799A (en) * 2021-12-21 2022-01-18 深圳佑驾创新科技有限公司 Application program source code protection method and server
CN113946799B (en) * 2021-12-21 2022-03-18 深圳佑驾创新科技有限公司 Application program source code protection method and server
CN114422618A (en) * 2021-12-31 2022-04-29 北京千方科技股份有限公司 IOT platform protocol adaptation method, device, equipment and medium based on cloud protogenesis
CN114422618B (en) * 2021-12-31 2024-01-02 北京千方科技股份有限公司 Cloud-protogenesis-based IOT platform protocol adaptation method, device, equipment and medium
CN114817868A (en) * 2022-06-30 2022-07-29 深圳市科力锐科技有限公司 License verification method, device, equipment and storage medium
CN114817868B (en) * 2022-06-30 2022-09-16 深圳市科力锐科技有限公司 License verification method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN112596740A (en) Program deployment method and device
US10439804B2 (en) Data encrypting system with encryption service module and supporting infrastructure for transparently providing encryption services to encryption service consumer processes across encryption service state changes
US9864608B2 (en) Client authentication during network boot
CN102508791B (en) Method and device for encrypting hard disk partition
KR101000191B1 (en) Secure software updates
CN110213276B (en) Authorization verification method under micro-service architecture, server, terminal and medium
KR101966767B1 (en) System for managing encryption keys for cloud services
CA2616981C (en) System and method for managing encrypted content using logical partitions
JP2010514000A (en) Method for securely storing program state data in an electronic device
CA2982539A1 (en) Method of operating a computing device, computing device and computer program
CN112433817B (en) Information configuration method, direct storage access method and related device
CN107066346B (en) Data backup method, data recovery method and device
US11516194B2 (en) Apparatus and method for in-vehicle network communication
CN111737232A (en) Database management method, system, device, equipment and computer storage medium
CN112954000A (en) Privacy information management method and system based on block chain and IPFS technology
WO2020034881A1 (en) Method and apparatus for activating trusted execution environment
CN113609514B (en) Cloud hard disk encryption and decryption method, device and system and readable storage medium
CN111290884A (en) Data backup method and device for cash register equipment
CN115714678A (en) Authentication method and device of terminal equipment
CN109409112A (en) A kind of disk binding method and device
CN110674514B (en) Hard disk grading method, device and system
CN114329574B (en) Encrypted partition access control method and system based on domain management platform and computing equipment
CN110620752B (en) Logo replacing method and device, electronic equipment and storage medium
CN115022065B (en) License authentication method and system
CN117094016B (en) Encryption method and device based on Guomai Linux kernel file system data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination