CN113282888A - Offline activation method, system and storage medium of application program - Google Patents

Offline activation method, system and storage medium of application program Download PDF

Info

Publication number
CN113282888A
CN113282888A CN202110359108.XA CN202110359108A CN113282888A CN 113282888 A CN113282888 A CN 113282888A CN 202110359108 A CN202110359108 A CN 202110359108A CN 113282888 A CN113282888 A CN 113282888A
Authority
CN
China
Prior art keywords
activation
code
mobile terminal
verification
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110359108.XA
Other languages
Chinese (zh)
Other versions
CN113282888B (en
Inventor
赵惟嘉
王文超
黄国仲
夏曙东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing China Transinfo Stock Co ltd
Original Assignee
Beijing China Transinfo Stock Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing China Transinfo Stock Co ltd filed Critical Beijing China Transinfo Stock Co ltd
Priority to CN202110359108.XA priority Critical patent/CN113282888B/en
Publication of CN113282888A publication Critical patent/CN113282888A/en
Application granted granted Critical
Publication of CN113282888B publication Critical patent/CN113282888B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses an off-line activation method, a system and a storage medium of an application program, wherein the method comprises the following steps: activating the server to generate a License file according to the project information; an activation request end obtains the License file and generates a two-dimensional code according to the License file; the mobile terminal scans and analyzes the two-dimension code, and sends the input item information and the analyzed two-dimension code information to the activation server for verification; if the activation server passes the verification, generating an activation code according to a third preset rule, and sending the activation code to the mobile terminal; and the activation request terminal carries out verification according to the activation code displayed by the mobile terminal and a fourth preset rule, and if the verification is passed, the activation is successful. According to the offline activation method of the application program, the problems that a platform cannot be networked and online activation cannot be performed due to privatized deployment can be solved.

Description

Offline activation method, system and storage medium of application program
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method, a system, and a storage medium for offline activation of an application.
Background
With the continuous development of software technology, most of commercial software and shared software adopt a registration code authorization mode to ensure that the software is not stolen so as to ensure the benefits of the software. After the user installs the system, registration authorization is carried out through the network. The supplier of the software system registers the information of the user in advance, and when the user registers online, the register system of the supplier verifies the information of the user. When the user identity is valid, the registration system generates credential information, and the software system completes authorization according to the credential information.
However, the software anti-piracy and anti-copy methods in the prior art generally require a networking environment, and the software as a service (SaaS) deployed privately generally does not have networking conditions, so that the online activation method cannot be used. Therefore, how to solve the problem that the platform cannot be networked due to the privatized deployment and online activation cannot be performed is a key problem that those skilled in the art pay attention to.
Disclosure of Invention
The embodiment of the disclosure provides an off-line activation method, an off-line activation system and a storage medium of an application program. The following presents a simplified summary in order to provide a basic understanding of some aspects of the disclosed embodiments. This summary is not an extensive overview and is intended to neither identify key/critical elements nor delineate the scope of such embodiments. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is presented later.
In a first aspect, an embodiment of the present disclosure provides an offline activation method for an application, including:
activating the server to generate a License file according to the project information;
the method comprises the steps that an activation request end obtains a License file, and a two-dimensional code is generated according to the License file;
the mobile terminal scans and analyzes the two-dimension code, and sends the input item information and the analyzed two-dimension code information to the activation server for verification;
if the activation server passes the verification, generating an activation code according to a third preset rule, and sending the activation code to the mobile terminal;
and the activation request terminal carries out verification according to the activation code displayed by the mobile terminal and a fourth preset rule, and if the verification is passed, the activation is successful.
In an optional embodiment, the License file comprises an item name, an item number, a minimum selling unit contained in the item, a control point corresponding to the minimum selling unit, a control value corresponding to each control point, and a License private key generated according to the item information.
In an alternative embodiment, each item contains one or more minimum vending units, each minimum vending unit containing one or more control points.
In an optional embodiment, the activating the request end to generate the two-dimensional code according to the License file includes:
the activation request end generates a two-dimensional code according to the License file, the current time information and a first preset rule, wherein the two-dimensional code at least comprises a License private key and an activation server address.
In an optional embodiment, the scanning and analyzing of the two-dimensional code by the mobile terminal, and sending the input item information and the analyzed two-dimensional code information to the activation server for verification includes:
the mobile terminal scans and analyzes the two-dimensional code and sends the analyzed License private key to the activation server;
the mobile terminal jumps to an information input interface and sends the input project information to an activation server; and the activation server calls a License public key corresponding to the License private key generated when the License file is generated according to the received project information, analyzes the License private key by adopting the License public key, and verifies according to a second preset rule.
In an optional embodiment, if the activation server passes the verification, generating an activation code according to a third preset rule, and sending the activation code to the mobile terminal, including:
after the verification of the activation server passes, sending prompt information of successful verification to the mobile terminal;
after receiving the prompt message of successful verification, the mobile terminal sends a request message for applying an activation code to an activation server;
and the activation server generates an activation code according to a third preset rule and sends the activation code to the mobile terminal.
In an optional embodiment, the verifying, by the activation requesting terminal, according to the activation code displayed by the mobile terminal and a fourth preset rule, and if the verification passes, the activating is successful, including:
an activation code displayed on the mobile terminal is input at an activation request end;
and the activation request terminal verifies the activation code according to a fourth preset rule, and if the verification is passed, the activation is successful.
In an optional embodiment, further comprising:
and when the activation code is verified, the validity of the activation code is confirmed according to the item information and the time information of the activation request terminal.
In a second aspect, an embodiment of the present disclosure provides an offline activation system for an application, including a background server, a mobile terminal, and an activation request end, where the background server includes an activation server end;
the activation server is used for generating License files according to the project information;
the activation request terminal is used for acquiring a License file and generating a two-dimensional code according to the License file;
the mobile terminal is used for scanning and analyzing the two-dimensional code and sending the input item information and the analyzed two-dimensional code information to the activation server for verification;
the activation server is used for generating an activation code according to a third preset rule when the verification passes, and sending the activation code to the mobile terminal;
and the activation request terminal is used for verifying according to the activation code displayed by the mobile terminal and a fourth preset rule, and if the verification is passed, the activation is successful.
In a third aspect, the disclosed embodiments provide a computer-readable medium, on which computer-readable instructions are stored, where the computer-readable instructions are executable by a processor to implement the offline activation method for an application program provided in the foregoing embodiments.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
the application program offline activation method provided by the embodiment of the disclosure relates to an activation request terminal, a mobile terminal and a background server, wherein the activation request terminal can complete activation by using a license file and an activation code, and the activation authority can be embodied to a minimum functional unit. Therefore, offline activation of the activation request terminal without networking conditions is realized, and the problems that the platform cannot be networked and online activation cannot be performed due to privatized deployment are solved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a flowchart illustrating a method for offline activation of an application according to an exemplary embodiment;
FIG. 2 is a schematic diagram illustrating a method for offline activation of an application, according to an example embodiment;
FIG. 3 is a schematic diagram illustrating information entry of a mobile terminal according to an exemplary embodiment;
FIG. 4 is a diagram illustrating a mobile terminal information transmission according to an exemplary embodiment;
FIG. 5 is a schematic diagram illustrating a type of authentication information in accordance with an illustrative embodiment;
FIG. 6 is a diagram illustrating an activate code in accordance with an exemplary embodiment;
FIG. 7 is a block diagram illustrating an off-line activation system for an application in accordance with an exemplary embodiment;
FIG. 8 is a schematic diagram illustrating a computer storage medium in accordance with an exemplary embodiment.
Detailed Description
The following description and the drawings sufficiently illustrate specific embodiments of the invention to enable those skilled in the art to practice them.
It should be understood that the described embodiments are only some embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of systems and methods consistent with certain aspects of the invention, as detailed in the appended claims.
In the description of the present invention, it is to be understood that the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art. In addition, in the description of the present invention, "a plurality" means two or more unless otherwise specified. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
At present, software piracy prevention and copy prevention methods are usually realized through methods of networking activation, activation code activation, activation serial number activation and the like, a networking environment is usually needed, and private deployed SaaS software does not usually have networking conditions, so that an online activation method cannot be used. The offline activation method for the application program, provided by the embodiment of the disclosure, can realize offline activation of an activation request terminal without networking conditions, and solve the problems that a platform cannot be networked and cannot be activated online due to privatized deployment.
The method for activating an application program offline according to the embodiment of the present application will be described in detail below with reference to fig. 1 to 6. Referring to fig. 1, the method specifically includes the following steps.
And S101, activating the server to generate a License file according to the project information.
In one possible implementation, the activation service end is deployed on a background server for the activation service of the application. Specifically, the activation service end generates a License file according to the item information of the service item purchased by the user, the License file comprises an item name, an item number, a minimum selling unit contained in the item, a control point corresponding to the minimum selling unit, a control value corresponding to the control point and a private key generated according to the item information, the License file is generated based on purchase information of an application service item, the purchase information, the item number and the minimum selling unit contained in the service item can be counted by the item number of the minimum selling unit, the minimum selling unit is generally the minimum functional unit, the control point corresponding to the minimum selling unit, such as the number of users of the minimum selling unit or the maximum number of simultaneous online persons and the like can be used as the control point, and the number of the users or the number of the online persons can be used as the control value. And when the License file is generated, a pair of License private key and License public key which are matched with each other is generated at the same time, wherein the License public key is cached in the background server, and the License private key and the License file are transmitted to the service request end of the user together.
When the License file is generated by the activation server, a public key and a private key corresponding to the project are generated at the same time, and the private key can be stored in the generated License file and used for generating a verification character string in the two-dimensional code.
In one exemplary scenario, an item may contain one or more minimum vending units, and a minimum vending unit may include one or more control points, where a minimum vending unit is a minimum unit in which software may be independently sold, and a control point is a constraint imposed on a minimum vending unit, such as: can 3 people online use this minimum function of selling the unit simultaneously, the number of people online simultaneously is the control point, 3 artificial control values. The embodiments of the present disclosure are not limited to the above embodiments, and may be set by those skilled in the art.
According to the step, the activation authority can be embodied to the smallest functional unit, one activation code can simultaneously activate a plurality of smallest functional units contained in the activation request terminal, and not only aims at an integral client terminal, so that a user of the activation request terminal can conveniently select different functional modules for activation according to needs, and the activation service terminal can activate according to the item information corresponding to the activation request terminal.
S102, the License file is obtained by the activation request terminal, and the two-dimensional code is generated according to the License file.
The activation request end may include a SaaS platform, an IaaS platform, a PaaS platform, or may be software, which refers to a service platform or a software application delivered to a user.
In a possible implementation manner, the License file generated by the activation server can be transmitted to the activation request end in a manner of downloading through a U disk or a designated target address, and then the activation request end acquires and imports the License file and generates the two-dimensional code according to the License file.
Specifically, the activation request end generates a two-dimensional code according to the License file, the current platform time information and a first preset rule, wherein the two-dimensional code at least comprises a License private key and an activation server address. In an optional embodiment, the two-dimensional code may further include one or more items of project information, Mac addresses (stand-alone deployment), Mac address list (cluster deployment), coordinate addresses, system time, project numbers, and the like.
The first preset rule is a rule for generating a two-dimensional code, the two-dimensional code corresponds to license files and current platform time information and is prestored in an activation request terminal, the first preset rule and the second preset rule are a pair of rules, the second preset rule is a rule for verifying the two-dimensional code and is prestored in an activation service terminal, public and private keys are verified mainly based on a key principle, the two-dimensional code is generated by the activation request terminal according to the first preset rule, and verification is performed at the activation service terminal.
S103, the mobile terminal scans and analyzes the two-dimensional code, and sends the input item information and the analyzed two-dimensional code information to the activation server for verification.
The mobile terminal is any device capable of processing two-dimensional code information and capable of being networked, and in an exemplary scene, the mobile terminal is an intelligent device such as a mobile phone and an ipad, and specifically can be a mobile terminal-specific APP, an applet or a WeChat-like general APP.
The two-dimensional code generated by the activation request terminal is scanned and analyzed through a two-dimensional code scanning function in the mobile terminal, the License private key in the analyzed two-dimensional code is sent to the activation server terminal, and meanwhile, the mobile terminal automatically jumps to an information input interface according to the address of the activation server terminal in the analyzed two-dimensional code.
Further, item information is entered in an information entry interface of the mobile terminal, fig. 3 is a schematic diagram illustrating information entry of the mobile terminal according to an exemplary embodiment, and as shown in fig. 3, item information of "item name" and "item number" may be sequentially filled in according to a prompt, and then a button of "sending a verification code" is clicked, and the filled item information is sent to the activation server. And the secondary verification can be performed by inputting the project information on the information input interface. In a possible implementation mode, the generated two-dimensional code contains project information, the project information can be verified by analyzing the two-dimensional code, and the user inputs the project information through the information input interface, namely, the project information input by the user through the input interface and the project information corresponding to the analyzed two-dimensional code are verified for the second time.
Fig. 4 is a schematic diagram illustrating information transmission of a mobile terminal according to an exemplary embodiment, and as shown in fig. 4, the mobile terminal transmits the filled item name of "first stage of the black dragon road network platform," 1234555666 "to an activation server in a backend server, and receives a prompt of" successful transmission.
And S104, if the verification of the activation server is passed, generating an activation code according to a third preset rule, and sending the activation code to the mobile terminal.
In a possible implementation manner, after receiving the License private key sent by the mobile terminal, the activation server may temporarily store information in the License private key, and then, according to the received item information, the activation server calls the public key of the corresponding item of the License file to analyze the private key, and verifies the private key according to a second preset rule.
The second preset rule is a rule for verifying the two-dimensional code, and the first preset rule is a pair of rules which are mainly based on a secret key principle to verify public and private keys.
Optionally, when verifying the content, one or more items in the project information, Mac addresses (standalone deployment), Mac address list (cluster deployment), coordinate addresses, system time, and the like may be verified. For example, the local system time may be used as the verification content, and when the License file is generated, the License control node includes an effective time period, generates effective time period information in the License file according to the service effective time information of the project information, and compares the system platform time with the effective time in the License file, thereby controlling the time effectiveness of the activation behavior.
Further, if the activation server passes the verification, prompt information of successful verification can be sent to the mobile terminal, and after receiving the prompt information of successful verification, the mobile terminal sends request information of applying for the activation code to the activation server.
Fig. 5 is a schematic diagram of verification information according to an exemplary embodiment, and as shown in fig. 5, the mobile terminal receives prompt information of successful verification returned by the activation server, and displays a request button for "obtaining the activation code" on a prompt information interface of successful verification, and after seeing the prompt information of successful verification, the user can click a prompt box for "obtaining the activation code", and send request information for obtaining the activation code to the activation server.
Further, the activation server generates an activation code according to a third preset rule, and sends the activation code to the mobile terminal. Wherein the third preset rule is a rule for generating the activation code. When generating the activation code, the activation server may generate the activation code based on one or more items of the item information and based on an activation time interval, where the activation time interval is determined according to a second point at the time of activation plus a certain time length.
Further, the activation code may be displayed on a display interface of the mobile terminal after the mobile terminal receives the activation code, fig. 6 is a schematic diagram illustrating an activation code according to an exemplary embodiment, and as shown in fig. 6, the received activation code may be displayed on the activation code display interface of the mobile terminal.
S105, the activation request end carries out verification according to the activation code displayed by the mobile terminal and a fourth preset rule, and if the verification is passed, the activation is successful.
In a possible implementation manner, an activation code displayed on the mobile terminal is recorded into an activation request terminal, the activation request terminal performs verification according to the recorded activation code and a fourth preset rule, if the verification passes, the activation is successful, and if the verification fails, the activation fails, and the activation code can be reapplied. In an exemplary scenario, if activation fails, the mobile terminal sends request information of an activation code to the activation server again, after receiving the request information of the activation code, the activation server sends the regenerated activation code to the mobile terminal, records the latest activation code obtained on the mobile terminal into the activation request terminal, and verifies the activation request terminal again, if the verification passes, the activation succeeds, and if the verification fails, the process is repeatedly executed until the verification succeeds.
In an exemplary scenario, if the activation fails, the method further includes repeatedly performing steps S101 to S105 until the activation succeeds.
The fourth preset rule is a rule for verifying the activation code, the third preset rule is a pair of rules with the third preset rule, the third preset rule is a generation rule of the activation code and is pre-stored in the activation server, the fourth preset rule is a verification activation code and is pre-stored in the activation request terminal, the verification is mainly realized based on an off-line activation mechanism, a set of matched off-line activation verification mechanism is pre-set in the activation server terminal and the activation request terminal for delivery in advance, the activation code is generated by the activation server, and verification is carried out at the activation request terminal.
In one possible implementation, when the activation code is verified, the validity of the activation code can be confirmed by comparing the item information with the time of the activation request terminal. For example, the time interval in the project information is 2021-04-01-2021-04-30, i.e. the valid time of the application program is 1 month, if the time of the activation request end is not in the project time interval, the activation code is invalid, and the verification fails. According to this step, the effective activation time of the application program can be set at will.
According to the application program offline activation method provided by the embodiment of the disclosure, the activation request end, the mobile terminal and the background server are involved, the activation request end can complete activation by using a license file and an activation code, offline activation of the activation request end without networking conditions is realized, and the problems that a platform cannot be networked and online activation cannot be performed due to privatized deployment are solved.
In order to facilitate understanding of the method for activating an application offline according to the embodiment of the present application, the following description is made with reference to fig. 2. As shown in fig. 2, the method includes:
in a possible implementation manner, the application offline activation method provided by the embodiment of the disclosure relates to a SaaS platform, a handheld terminal, and a background server, where an activation server is deployed on the background server.
Firstly, starting an activation process, and acquiring identification information and platform time information by the SaaS platform, wherein the identification information comprises a project name, a project number, a license number and the like, the identification information can be stored in a license file, the license file is generated by an activation server according to project information purchased by a user, and then the license file is stored in the SaaS platform in a U disk or other modes.
Further, the SaaS platform generates a verification code, that is, a two-dimensional code in the embodiment of the present disclosure, according to the identifier information and the current time information in the license file and according to the "activation rule 1". Wherein. The activation rule 1 is a rule for generating a verification code, and is generated by the SaaS platform based on a key principle.
Further, a user scans a verification code through a handheld terminal, automatically jumps to an activation server of a background server, and verifies the verification code based on an activation rule 2 by the activation server, wherein the activation rule 2 is a rule for verifying the verification code, and the activation rule 1 and the activation rule 2 are a pair of rules, and public and private keys are verified mainly based on a secret key principle, are generated by a SaaS platform, and are verified at the activation server.
Further, if the verification is passed, the activation code can be generated for the project according to the activation code request information of the handheld terminal, and the activation server can generate the activation code according to an activation rule 3, wherein the activation rule 3 is a rule for generating the activation code.
Further, the background server sends the generated activation code to the handheld terminal, and the activation code can be displayed on a display interface of the handheld terminal.
Further, the user inputs the activation code displayed on the handheld terminal into the SaaS platform, and the SaaS platform verifies the activation code according to the activation rule 4. The activation rule 4 is a rule for verifying the activation code, and the activation rule 3 is a pair of rules, and is mainly realized based on an offline activation mechanism, a set of matched offline activation verification mechanism is preset in the activation server and the delivered SaaS platform in advance, the activation code is generated by the activation server, and verification is performed at the SaaS platform end. And if the verification is passed, completing the activation.
In order to facilitate understanding of the application offline activation method according to the embodiment of the present application, the following is further described with reference to an application scenario on the mobile terminal.
A1. A user scans a two-dimensional code displayed on a project management page in an activation request end through a two-dimensional code scanning tool of the mobile terminal;
A2. the mobile terminal analyzes the two-dimensional code to obtain an address of the activation server and a verification character string;
A3. the mobile terminal accesses an address of an activation server;
A4. the mobile terminal jumps to an information entry page, as shown in fig. 3, and a user can input a project name and a project number on the information entry interface;
A5. after the input is finished, the user sends a verification character string, a project name and a project number through a 'send verification code' button in the mobile terminal, and after the sending is successful, the user receives prompt information of the successful sending, as shown in fig. 4; (the server matches the project name and the project number with the system record content, verifies the verification character string, and if the information is matched, the verification is passed);
A6. when the verification is passed, the mobile terminal receives the verification passing information and jumps to a verification success page, as shown in fig. 5;
A7. after clicking an activation code acquisition button, a user sends an activation code acquisition request to a server;
A8. the mobile terminal displays the activation code information returned by the server, as shown in fig. 6.
In order to facilitate understanding of the application offline activation method according to the embodiment of the present application, the following is further described with reference to an application scenario on an activation request end.
In a possible implementation manner, the activation request end refers to a service platform delivered to a user, and first, the activation request end acquires a License file generated by the activation service end, then acquires time information of the platform end, and generates a two-dimensional code based on a first preset rule according to the License file and the time information.
In a possible implementation manner, the activation code displayed on the mobile terminal is recorded into the activation request terminal, the activation request terminal verifies the activation code based on a fourth preset rule, and if the verification is passed, the activation is successful.
In order to facilitate understanding of the application offline activation method according to the embodiment of the present application, the following is further described with reference to an application scenario on the activation server.
In a possible implementation mode, the activation server is located in a background server, firstly, the activation server generates a License file according to information such as a project name and a project number, and then transmits the License file to the activation request terminal;
further, the activation server receives the scanning information of the two-dimensional code sent by the mobile terminal, verifies the information in the two-dimensional code according to a second preset rule, mainly analyzes the private key by obtaining the public key of the corresponding item when the License file is generated based on the item information, and verifies the content in the private key. And if the verification is passed, sending the information of successful verification to the mobile terminal.
And further, receiving request information for applying for the activation code sent by the mobile terminal, generating the activation code based on a third preset rule after receiving the request information, and sending the generated activation code to the mobile terminal.
According to the application program offline activation method provided by the embodiment of the disclosure, the method relates to an activation request terminal, a mobile terminal and a background server, and solves the problems that a platform cannot be networked and cannot be activated online due to privatization deployment.
The embodiment of the present disclosure further provides an application offline activation system, where the application offline activation system is configured to execute the application offline activation method in the foregoing embodiment, and as shown in fig. 7, the application offline activation system includes a background server, a mobile terminal, and an activation request end, where the background server includes an activation server end.
Specifically, the activation server is used for generating a License file according to the project information;
the activation request terminal is used for acquiring a License file and generating a two-dimensional code according to the License file;
the mobile terminal is used for scanning and analyzing the two-dimensional code and sending the input item information and the analyzed two-dimensional code information to the activation server for verification;
the activation server is used for generating an activation code according to a third preset rule when the verification passes, and sending the activation code to the mobile terminal;
and the activation request terminal is used for verifying according to the activation code displayed by the mobile terminal and a fourth preset rule, and if the verification is passed, the activation is successful.
It should be noted that, when the application offline activation system provided in the foregoing embodiment executes the application offline activation method, only the division of the functional modules is taken as an example, and in practical applications, the functions may be distributed by different functional modules according to needs, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the functions described above. In addition, the application offline activation system provided in the above embodiment and the application offline activation method embodiment belong to the same concept, and details of implementation processes thereof are referred to in the method embodiment and are not described herein again.
Referring to fig. 8, the computer-readable storage medium is an optical disc 800, on which a computer program (i.e., a program product) is stored, and when the computer program is executed by a processor, the computer program executes the method for activating an application program in an off-line manner according to any of the embodiments.
It should be noted that examples of the computer-readable storage medium may also include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory, or other optical and magnetic storage media, which are not described in detail herein.
The computer-readable storage medium provided by the above-mentioned embodiment of the present application and the method for activating an application offline provided by the embodiment of the present application have the same advantages as the method adopted, run, or implemented by the application stored in the computer-readable storage medium.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only show some embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. An off-line activation method for an application program, comprising:
activating the server to generate a License file according to the project information;
an activation request end obtains the License file and generates a two-dimensional code according to the License file;
the mobile terminal scans and analyzes the two-dimension code, and sends the input item information and the analyzed two-dimension code information to the activation server for verification;
if the activation server passes the verification, generating an activation code according to a third preset rule, and sending the activation code to the mobile terminal;
and the activation request terminal carries out verification according to the activation code displayed by the mobile terminal and a fourth preset rule, and if the verification is passed, the activation is successful.
2. The method of claim 1, wherein the License file comprises an item name, an item number, a minimum sale unit contained in the item, a control point corresponding to the minimum sale unit, a control value corresponding to each control point, and a License private key generated according to the item information.
3. The method of claim 2,
each item contains one or more minimum vending units, each minimum vending unit containing one or more control points.
4. The method of claim 2, wherein the step of generating the two-dimensional code by the activation request terminal according to the License file comprises the following steps:
and the activation request terminal generates a two-dimensional code according to the License file, the current time information and a first preset rule, wherein the two-dimensional code at least comprises a License private key and an activation server address.
5. The method of claim 4, wherein the mobile terminal scans and parses the two-dimensional code, and sends the input item information and the parsed two-dimensional code information to the activation server for verification, comprising:
the mobile terminal scans and analyzes the two-dimensional code and sends the analyzed License private key to the activation server;
the mobile terminal jumps to an information input interface and sends the input project information to the activation server;
and the activation server calls a License public key corresponding to the License private key generated when the License file is generated according to the received project information, analyzes the License private key by adopting the License public key, and verifies according to a second preset rule.
6. The method of claim 1, wherein if the activation server verifies the activation server, generating an activation code according to a third preset rule, and sending the activation code to the mobile terminal, comprises:
after the verification of the activation server passes, sending prompt information of successful verification to the mobile terminal;
after receiving the prompt message of successful verification, the mobile terminal sends a request message for applying an activation code to an activation server;
and the activation server generates an activation code according to a third preset rule and sends the activation code to the mobile terminal.
7. The method of claim 1, wherein the activation requesting end performs verification according to the activation code displayed by the mobile terminal and a fourth preset rule, and if the verification passes, the activation is successful, including:
an activation code displayed on the mobile terminal is input at an activation request end;
and the activation request terminal verifies the activation code according to a fourth preset rule, and if the verification is passed, the activation is successful.
8. The method of claim 7, further comprising:
and when the activation code is verified, the validity of the activation code is confirmed according to the item information and the time information of the activation request terminal.
9. An off-line activation system of an application program comprises a background server, a mobile terminal and an activation request end, wherein the background server comprises the activation server end;
the activation server is used for generating License files according to the project information;
the activation request terminal is used for acquiring the License file and generating a two-dimensional code according to the License file;
the mobile terminal is used for scanning and analyzing the two-dimension code and sending the input item information and the analyzed two-dimension code information to the activation server for verification;
the activation server is used for generating an activation code according to a third preset rule when the verification passes, and sending the activation code to the mobile terminal;
and the activation request terminal is used for verifying according to the activation code displayed by the mobile terminal and a fourth preset rule, and if the verification is passed, the activation is successful.
10. A computer readable medium having computer readable instructions stored thereon which are executable by a processor to implement a method of offline activation of an application as claimed in any one of claims 1 to 8.
CN202110359108.XA 2021-04-02 2021-04-02 Offline activation method, system and storage medium of application program Active CN113282888B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110359108.XA CN113282888B (en) 2021-04-02 2021-04-02 Offline activation method, system and storage medium of application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110359108.XA CN113282888B (en) 2021-04-02 2021-04-02 Offline activation method, system and storage medium of application program

Publications (2)

Publication Number Publication Date
CN113282888A true CN113282888A (en) 2021-08-20
CN113282888B CN113282888B (en) 2024-02-06

Family

ID=77276358

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110359108.XA Active CN113282888B (en) 2021-04-02 2021-04-02 Offline activation method, system and storage medium of application program

Country Status (1)

Country Link
CN (1) CN113282888B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016120608A1 (en) * 2015-01-27 2016-08-04 Lancaster University Business Enterprises Limited Improvements relating to the authentication of physical entities
CN106657114A (en) * 2016-12-30 2017-05-10 金蝶软件(中国)有限公司 Method and system for implementing activation of product user
US20170288872A1 (en) * 2014-12-23 2017-10-05 Feitian Technologies Co., Ltd. Activating mobile terminal token method
CN107835079A (en) * 2017-11-02 2018-03-23 广州佳都数据服务有限公司 A kind of two-dimentional code authentication method and equipment based on digital certificate
WO2018115972A1 (en) * 2016-12-22 2018-06-28 Assa Abloy Ab Mobile credential with online/offline delivery
CN108763942A (en) * 2018-05-22 2018-11-06 山大地纬软件股份有限公司 Digital license based on block chain licenses device and its application method
CN109271757A (en) * 2018-08-10 2019-01-25 神州网信技术有限公司 A kind of offline Activiation method and system of software
CN109558917A (en) * 2018-11-09 2019-04-02 山西特信环宇信息技术有限公司 A kind of certificate chain electronic license system
CN109614114A (en) * 2018-11-12 2019-04-12 东软集团股份有限公司 Acquisition methods, device, readable storage medium storing program for executing and the electronic equipment of License file
CN109902450A (en) * 2019-03-14 2019-06-18 成都安恒信息技术有限公司 A kind of offline method for permitting to sign and issue management
CN110008702A (en) * 2019-03-21 2019-07-12 苏州达辰医疗科技有限公司 A kind of recovery method and system of medical software license file
CN111625802A (en) * 2019-02-27 2020-09-04 深圳光峰科技股份有限公司 Projector authorization use method
US20200380493A1 (en) * 2019-05-31 2020-12-03 Enrico Becerra Morales Method, device and system for the transfer of data

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170288872A1 (en) * 2014-12-23 2017-10-05 Feitian Technologies Co., Ltd. Activating mobile terminal token method
WO2016120608A1 (en) * 2015-01-27 2016-08-04 Lancaster University Business Enterprises Limited Improvements relating to the authentication of physical entities
WO2018115972A1 (en) * 2016-12-22 2018-06-28 Assa Abloy Ab Mobile credential with online/offline delivery
CN106657114A (en) * 2016-12-30 2017-05-10 金蝶软件(中国)有限公司 Method and system for implementing activation of product user
CN107835079A (en) * 2017-11-02 2018-03-23 广州佳都数据服务有限公司 A kind of two-dimentional code authentication method and equipment based on digital certificate
CN108763942A (en) * 2018-05-22 2018-11-06 山大地纬软件股份有限公司 Digital license based on block chain licenses device and its application method
CN109271757A (en) * 2018-08-10 2019-01-25 神州网信技术有限公司 A kind of offline Activiation method and system of software
CN109558917A (en) * 2018-11-09 2019-04-02 山西特信环宇信息技术有限公司 A kind of certificate chain electronic license system
CN109614114A (en) * 2018-11-12 2019-04-12 东软集团股份有限公司 Acquisition methods, device, readable storage medium storing program for executing and the electronic equipment of License file
CN111625802A (en) * 2019-02-27 2020-09-04 深圳光峰科技股份有限公司 Projector authorization use method
CN109902450A (en) * 2019-03-14 2019-06-18 成都安恒信息技术有限公司 A kind of offline method for permitting to sign and issue management
CN110008702A (en) * 2019-03-21 2019-07-12 苏州达辰医疗科技有限公司 A kind of recovery method and system of medical software license file
US20200380493A1 (en) * 2019-05-31 2020-12-03 Enrico Becerra Morales Method, device and system for the transfer of data

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
JINHUA MA 等: "A Blockchain-Based Application System for Product Anti-Counterfeiting", SPECIAL SECTION ON DATA MINING FOR INTERNET OF THINGS, vol. 8, pages 77642 - 77652, XP011787581, DOI: 10.1109/ACCESS.2020.2972026 *
MONIKA 等: "Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Characterization", PROCEDIA COMPUTER SCIENCE 94 ( 2016 ), pages 465 *
STEVENJON: "JAVA从原理到实现,制作License文件,可用于模块授权,程序授权等", Retrieved from the Internet <URL:https://blog.csdn.net/qq_36270361/article/details/105815781> *
倪莹莹;王晓峰;丁小未;: "基于Unity 3D的产品秘钥二维码实现", 现代计算机(专业版), no. 19, pages 35 - 39 *
彭桂林 等: "无中心化离线认证技术的应用与实践", 智能建筑与智慧城市, no. 09, pages 69 - 72 *

Also Published As

Publication number Publication date
CN113282888B (en) 2024-02-06

Similar Documents

Publication Publication Date Title
CN108156126B (en) Burning verification method and device and identity authentication method and device for Internet of things equipment
JP2022000757A5 (en)
CN101160787B (en) Method, apparatus and data download system for controlling the validity of the download transaction
CN110582769A (en) single-account multi-identity login method, device, server and storage medium
CN100472550C (en) Method for generating licence and method and apparatus for providing contents using the same
CN112149067B (en) Software authorization method, terminal equipment, authorization server and storage medium
CN111030812A (en) Token verification method, device, storage medium and server
JPH0787564A (en) Authentication system
CN111127013A (en) Decentralized data transaction method, device, equipment and medium based on block chain
CN114186199B (en) License authorization method and device
JP2001216198A (en) Method and device for issuing use permit card
US20190068588A1 (en) Authentication system
CN111460400B (en) Data processing method, device and computer readable storage medium
CN112417385A (en) Safety control method and system
CN112800392A (en) Authorization method and device based on soft certificate and storage medium
CN107682376B (en) Wind control data interaction method and device
CN111770087A (en) Service node verification method and related equipment
CN111131127B (en) Communication method based on live broadcast platform and related device
CN114139114A (en) Development and maintenance system and method based on front-end low code
CN107133499B (en) Software copyright protection method, client, server and system
CN117254969A (en) Registration authentication method for intelligent equipment accessing to Internet of things system
CN112948866A (en) Data processing method, device and equipment and readable storage medium
KR101098159B1 (en) Content distribution system and content distribution method
CN113282888A (en) Offline activation method, system and storage medium of application program
CN113761478B (en) Authorization method and device for software product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant