Software system module independent authorization control method and device

A technology of software system and authorization control, which is applied in the direction of computer security devices, instruments, program/content distribution protection, etc. It can solve the problems that value-added services cannot be independently authorized, and the date of use license cannot be controlled, so as to increase income and ensure version security. Effect

Active Publication Date: 2010-10-20
YONYOU NETWORK TECH
View PDF3 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the value-added service part of the ERP system, different authorization documents restrict different license dates and cannot be controlled
[0008]

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software system module independent authorization control method and device
  • Software system module independent authorization control method and device
  • Software system module independent authorization control method and device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0031] The embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0032] It should be understood that the present invention can be applied to the authorization of the entire software system, a certain function module of the software, and a certain function point, and provides an authorization control mechanism flexibly, safely and reliably.

[0033] Table 1 is a schematic diagram of the separate authorization form of the functional modules of the present invention. As shown in Table 1, it is possible to individually control the usage rights of the user application XXX module and YYY module, and provide different permission time for setting XXX module and YYY module. figure 1 It is only an exemplary description and is not used to limit the present invention. In terms of specific applications, no matter the form or details, corresponding changes can be made.

[0034] Module name

[0035] Table 1

[0036] figure 1 It is a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software system module independent authorization control method and a device, wherein the method comprises the following steps: displaying files to be authorized in a visual interface; handling the authorization application on the files to be authorized; generating approval files of the files to be authorized and carrying out encryption treatment on the approval files; carrying out decryption processing on the approval files for interpreting the files to be authorized and carrying out authorization verification processing on the files to be authorized; and determining use interfaces capable of being invoked by the files to be authorized according to the results of the authorization verification processing for providing the use authorization. Thereby, the invention provides effective control on the independent authorization of a system, a function model and a function point for thus ensuring the version security of the software.

Description

technical field [0001] The present invention generally relates to the field of enterprise resource planning (Enterprise Resource Planning, referred to as ERP) software authorization protection, and more specifically, relates to a software capable of performing flexible authorization control on software systems and their independent functional modules or function points. System module independent authorization control method and apparatus. Background technique [0002] Due to the reproducibility and repeatability of software, software developers and programmers have always suffered from illegal software duplication and pirated software products. Although there are many software authorization and protection methods, such as serial number method, function restriction program insertion, key file protection, etc., the determination of these methods is also obvious. They are either complex in algorithm, high in production cost, or easy to be cracked. , weak protection. [0003] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/12
Inventor 孙晓军周春星
Owner YONYOU NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products