Method, client and system for software access control

An access control and client-side technology, applied in transmission systems, electrical components, instruments, etc., can solve the problems of inability to use, inconvenient to use, and increase the user's burden, so as to achieve the effect of copyright protection and convenient use.

Active Publication Date: 2012-05-30
SLICONGO MICROELECTRONICS INC
View PDF4 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] For the authorization code registration method: Generally, after the software is successfully registered, it can be used for a long time (too short a valid time will lead to frequent registration, which is inconvenient to use), and the place of use is not restricted, and the authorization code is generally fixed. (It may also be generated by the company's designated person for different computers, but this will increase the company's management costs for the software), which may lead to loss of control over the scope of use of the core software, and once the authorization code is spread, the core software will be can be used by anyone
[0008] For the server login authorization method: every time you use the software, you must enter the user name and password to log in. For a software that is mainly used within the company and is frequently used, it will increase the burden on the user, and because it can only be used in a fixed network When the company's users occasionally need to go to the production site outside the company's network environment to use the core software for a short time, it will not be available

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, client and system for software access control
  • Method, client and system for software access control
  • Method, client and system for software access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The solution of the embodiment of the present invention is mainly to combine the two authentication methods of online authentication and offline authentication, so as to improve the safety of software use and facilitate the use of authorized users.

[0046] Such as figure 1 As shown, an embodiment of the present invention proposes a software permission control method, including:

[0047] Step S101, when the user starts the client, the client encrypts the string composed of the unique identification code of the machine and the set date to generate an authorization authentication ciphertext;

[0048] Wherein, the set date is generated according to the current date of the system and preset rules, wherein, the preset rule is set according to the valid authentication period after the client software is successfully authenticated in advance, and the set date can be the current date of the system or the current date of the system. The current date minus the interval between a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method, a client and a system for software access control. The method comprises the following steps: when a user starts the client, the client encrypts a character string consisting of a local unique identification code and a set date and generates an authorization and authentication ciphertext; and the software access of the client is controlled by combining an offline authentication mode and an online authentication mode according to the authorization and authentication ciphertext generated by the client and an authorization and authentication ciphertext which is stored in an authorization and authentication file by the client. According to the method, the client and the system, the copyright of software is effective protected in a mode that the online authentication is combined with the offline authentication, and the authorized user can conveniently use the software. In the network environment specified by the user, registration and login are not required, and the software can be used without limit; in the environment besides the specified environment, the software is conditionally limited; and the software which is allowed to normally operated in the specified environment can be operated for a preset time in the same computer off the specified network operating environment, and the software is effectively limited to be copied and used among computers.

Description

technical field [0001] The invention relates to the technical field of software authority control, in particular to a software authority control method, client and system. Background technique [0002] Software copyright protection, especially core software copyright protection, is of great significance to companies. [0003] At present, most companies adopt the following two methods of copyright protection for core software: [0004] The first method: authorization code registration and use, this method is mainly to enter the authorization code provided by the company to register when using the software for the first time. After the registration is successful, the user can use it without restriction within the valid time software; [0005] The second method: server login authorization, this method is mainly to register the user's account number and password on the server side, and the user logs in according to the account password when using it. [0006] However, the abo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22H04L29/06G06F21/44
Inventor 陈斯煜
Owner SLICONGO MICROELECTRONICS INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products