Protection method permitted by webmaster and device therefor

A protection device and network management technology, applied in the field of communication, can solve problems such as low security, and achieve the effect of enhancing security

Active Publication Date: 2010-03-10
ZTE CORP
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] Aiming at the problem that the security of the network management license protection method simply adopts the License file, the present invention is proposed. For this reason, the main purpose of the present invention is to provide an improved network management license protection scheme to solve the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method permitted by webmaster and device therefor
  • Protection method permitted by webmaster and device therefor
  • Protection method permitted by webmaster and device therefor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] Embodiment 1: The license control center detects a security assurance scheme when the server is started for the first time.

[0054] When the server is started for the first time, the License control center detects whether the dongle is inserted into the server, if not, the server will stop starting, otherwise continue to check whether the license file is authorized, if there is, the server will start normally, otherwise the server will stop starting. Figure 4 is a flow chart of the server's initial start-up process according to an embodiment of the present invention, such as Figure 4 As shown, it specifically includes the following steps S401 to S404.

[0055] Step S401, determine whether the dongle exists, if yes, proceed to step S402, otherwise, proceed to step S404.

[0056] Step S402, judging whether the license file is authorized, if the judging result is yes, go to step S403, otherwise, go to step S404.

[0057] Step S403, judging whether the authorization co...

Embodiment 2

[0060] Embodiment 2: The license control center detects the security guarantee scheme when the server is not started for the first time.

[0061] When the server is not started for the first time, the License control center checks whether the dongle is inserted into the server and whether the dog is authorized. If not, it will send an alarm to the server. If yes, it will continue to check whether the license file is authorized. If it is, it will check whether the validity period of the file has expired. If yes, send an alarm to the server, otherwise end, see attached Figure 5 (Similar to the cycle detection process)

Embodiment 3

[0062] Embodiment 3: A guarantee scheme for regularly checking the security of the server for the License control center.

[0063] Figure 5 is a flowchart of server timing detection processing according to an embodiment of the present invention, such as Figure 5 As shown, it specifically includes the following steps S501 to S507.

[0064] Step S501, after the timing detection time arrives, judge whether the dongle exists, if the judgment result is yes, go to step S502, if the judgment result is no, go to step S507.

[0065] Step S502, judging whether the dongle is authorized according to the authorization parameters stored in the database, if the judging result is yes, go to step S503, if the judging result is no, go to step S507.

[0066] Step S503, judging whether the license file exists, if the judging result is yes, go to step S504, if the judging result is no, go to step S507.

[0067] Step S504, judging whether the license file is authorized according to the authori...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a protection method permitted by a webmaster and a device therefor. The method comprises: judging whether a license file and a softdog which exist in a server are whetheris authorized; if being authorized, resolving authentication parameter in the license file, and encrypting and then storing the authentication parameter into a data base of the server. The invention effectively improves the safety of webmaster software, thus better protecting the benefit of the software provider.

Description

technical field [0001] The present invention relates to the field of communications, in particular to a method and device for protecting network management licenses. Background technique [0002] Network management software is a software used to manage telecommunications network equipment. It can help users open telecommunications services, grasp the operation status of the entire network equipment, and provide tools and methods for locating problems when network equipment has problems. It can be said that the network management software is a switch to enable the operation of telecommunications network equipment. Therefore, it is very necessary for network management software providers to prevent network management software from being illegally used without compensation and their own interests from being violated. [0003] At present, most of the existing protection methods for network management licenses are to use license files. By providing the license files to users, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/62
Inventor 肖致纬
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products