Method for issuing, using and protecting controllable component

A component and software component technology, applied in the direction of program/content distribution protection, instrument, electronic digital data processing, etc., can solve problems such as potential safety hazards, inability to release and use control of components, and inability to protect users of software components, so as to ensure security Effect

Inactive Publication Date: 2010-12-08
NO 709 RES INST OF CHINA SHIPBUILDING IND CORP
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Software componentization technology has begun to flourish, but there is still a lack of effective protection methods for how to use and publish components. Now more and more components run by themselves to obtain permission for component operation through its own license method
This method can only protect the interests of component producers, but cannot control the release and use of the entire component, and cannot protect software component users
[0005] In addition, component technology has brought about innovations in software development and use methods, but there is no unified management of component use and release in some industries, so there will be some safety hazards in use and operation, and it is not possible to ensure that component producers and the interests of customers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for issuing, using and protecting controllable component
  • Method for issuing, using and protecting controllable component
  • Method for issuing, using and protecting controllable component

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] according to Figure 1-3 As shown, a controllable component release and use protection method includes: five roles need to be established, and the five roles are:

[0053] Role 1: Program Administrator SHCEME ADMINISTRATOR(SA)

[0054] Role 2: ORIGINAL SOFTWARE PRODUCTOR (OSP)

[0055] Role 3: COMPONENT PRODUCTOR (CP)

[0056] Role 4: COMPONENT SERVER (CS)

[0057] Role 5: Software component user COMPONENT USER (CU)

[0058] The roles are mutually authorized, and the components are effectively controlled in the process of release and use through digital certificates, signatures, and encryption methods, so that only the software produced by the recognized original software manufacturer OSP can use legal components. The approved component publishing server CS can issue legal components to software component users CU; software component users CU can apply for legal software components only when they get software from the legal original software manufacturer OSP.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for issuing, using and protecting a controllable component. The method comprises the following steps that: five roles need to be established; all the roles are mutually authorized; the component is effectively controlled in the process of issuing and using the component in the ways of digital certificates, signatures and encryption; only software produced by a recognized original software producer OSP can use a legal component, and only a recognized component issuing server CS can issue the legal component to a software component user CU; and the software component user CU can apply for the legal software component only by acquiring the software from a legal original software producer OSP. The method has the advantages that the software producer can be qualified for producing the legal software by the scheme so as to ensure that the produced software can use the legal software component, and the component produced by the software component producer can be finally used by the user after being submitted to a component issuer and signed to ensure legal sources of the component.

Description

technical field [0001] The invention relates to the technical field of computer software, in particular to a controllable software component release and use protection method. Background technique [0002] Software reusability is the key to the prosperous development of the software industry, and to achieve software reusability, "software componentization" is the basis for realizing this goal. With the development of technology and time, component-oriented software development and application is a new trend of software development. [0003] The component-based development of software inevitably puts forward new requirements for the release, use and protection of software components. There are various protection methods used in software today. According to the physical protection method, it can be divided into soft protection and hard protection. The soft protection is protected by the software's own authentication mechanism and registration mechanism, while the hard prote...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/10
Inventor 黄伟赵恒李峻林古尚利陆炜
Owner NO 709 RES INST OF CHINA SHIPBUILDING IND CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products