Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for adjusting authorization of encryption lock module

An encryption lock and source module technology, applied in the field of information security, can solve the problems of inability to adjust software or module authorization, and inability to adjust encryption lock module authorization as needed.

Active Publication Date: 2013-11-13
FEITIAN TECHNOLOGIES
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of realizing the above-mentioned authorization management, the inventor found that there are at least the following problems in the prior art: after the user purchases the authorization of the software or module, the authorization of the dongle module cannot be adjusted according to the needs, that is, the authorization of the software or module cannot be adjusted. licenses for other software or modules, nor can the authorization of that type of software or modules be adjusted to licenses for other types of software or modules

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for adjusting authorization of encryption lock module
  • Method and device for adjusting authorization of encryption lock module
  • Method and device for adjusting authorization of encryption lock module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] In order to solve the problem that the prior art cannot adjust the authorization of the dongle module as required, the embodiments of the present invention provide a method and device for adjusting the authorization of the dongle module.

[0053] Such as figure 1 As shown, the method for adjusting the authorization of the dongle module provided by Embodiment 1 of the present invention includes:

[0054] Step 101, when the user needs to convert the authorization of the source module to the authorization of the target module, obtain a second replacement value according to the first replacement value input by the user.

[0055] In this embodiment, when the user needs to convert the authorization of the source module to the authorization of the destination module, the user can input the source module number corresponding to the source module, the destination module number corresponding to the destination module, and the first replacement value. A replacement value is the m...

Embodiment 2

[0065] Such as figure 2 As shown, the method for adjusting the authorization of the dongle module provided by Embodiment 2 of the present invention includes:

[0066] Step 201, when the user needs to convert the authorization of the source module to the authorization of the destination module, it is judged whether the source authorization type of the source module is the same as the destination authorization type of the destination module.

[0067] In this embodiment, when the user needs to convert the authorization of the source module to the authorization of the destination module, the user can input the source module number corresponding to the source module, the destination module number corresponding to the destination module, and the first replacement value. A replacement value is the module value of the source module that needs to be converted; when the dongle receives the source module number, destination module number and the first replacement value, it can obtain th...

Embodiment 3

[0106] Such as Figure 10 As shown, the method for adjusting the authorization of the dongle module provided by Embodiment 3 of the present invention includes:

[0107] Step 1001, when the user needs to convert the authorization of the source module to the authorization of the destination module, judge whether the source authorization type of the source module is the same as the destination authorization type of the destination module; the specific process is the same as figure 2 The shown step 201 is similar and will not be repeated here.

[0108] Step 1002, when the source authorization type is the same as the destination authorization type, determine whether the source authorization type is an expiration date type.

[0109] In this embodiment, when the source authorization type is the same as the destination authorization type through step 1002, it is judged whether the source authorization type is an expiration date type, and when the source authorization type is an expi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for adjusting the authorization of an encryption lock module, relates to the field of information safety and solves the problem that the authorization of the encryption lock module cannot be adjusted according to a requirement in the prior art. The technical scheme provided by the invention comprises the following steps of: when a user needs to convert the authorization of a source module into the authorization of a target module, acquiring a second replacement value according to a first replacement value input by the user; acquiring a converted target module value according to the second replacement value and relevant information and acquiring a converted source module value according to the first replacement value and the relevant information; and modifying an initial source module value of the source module into the converted source module value and modifying an initial target module value of the target module into the converted target module value. The technical scheme provided by the invention can be applied to the field of encryption locks.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and device for adjusting authorization of an encryption lock module. Background technique [0002] A dongle is a hardware device connected to a parallel interface or a Universal Serial Bus (USB) interface of a computer; as a software copyright protection product, it can realize software security protection and copyright protection. Since the dongle implements software security protection and copyright protection by storing a part of the protected software code in it; therefore, when the protected software is running, it needs to call the corresponding code of the protected software in the dongle to ensure the protection of the protected software. normal operation. [0003] While realizing software security protection and copyright protection through dongles, in order to create a more convenient and flexible sales model for software developers, software developers can...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12G06F21/34
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES