A method and a server for software backend authentication

An authentication server and background authentication technology, which is applied in the field of MAC address authentication technology, can solve problems such as disregarding the production situation of hardware manufacturers, difficulty in agreeing, high authorization fees, etc., to achieve a good cooperation atmosphere, eliminate speculation, and eliminate damage.

Active Publication Date: 2013-03-20
HAIMEN BIWEI INTPROP SERVICE CO LTD
View PDF8 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] This strategy simplifies the software design and does not need to know the production situation of the hardware manufacturer. However, if the manufacturer randomly uses or reuses the MAC address, it will still bring software failure processing costs.
[0007] 2. The software authorization fee is charged at one time, regardless of the production situation of the hardware manufacturer
[0008] This strategy completely transfers the risk to the hardware manufacturer. Considering the input-output ratio, it is difficult for the hardware manufacturer to agree to a higher licensing fee. However, if the licensing fee is too low, it will bring pressure on the input and output of the software manufacturer. difficult to reach consensus
[0009] 3. The software authorization fee is priced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and a server for software backend authentication
  • A method and a server for software backend authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] In this example, the software manufacturer embeds a non-detachable active authentication feature in the terminal software by releasing an upgrade package to the embedded software version previously released to the hardware manufacturer.

[0053] Please refer to figure 1 , figure 2 As shown, the authentication server in this example is a high-performance server built on the basis of Windows Server operating system, Microsoft SQL Server and . Detection module, heartbeat module, receiving module and display module, etc.

[0054] After the terminal is connected, once its network detection module detects that there is a valid Internet connection, the heartbeat module immediately initiates a heartbeat authentication request, that is, the authentication request is initiated periodically, for example, once every 60 seconds. The GET request of the protocol specification, the request command line contains the following parameters: protocol type, host domain name to be sent to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method and a server for software backend authentication, and a terminal. The method for software backend authentication comprises: MAC filing, an authentication server establishes a filing database of the built-in network card physical address MAC of the terminal in a storage module in advance; MAC resolution and determination, when an authentication request from the terminal is received, a resolution module of the authentication server resolves the physical address of the built-in network card physical address MAC of the terminal, a match query with information in the filing database is performed, and based on the obtained matching result, a response module of the authentication server is instructed to give the terminal a corresponding response instruction; and response instruction, based on the decision of the resolution module, the response module sends the corresponding response instruction to the terminal. By adopting the technical solution of the present invention, conflicts of network card physical addresses MAC of terminals are prevented at the application level, possible software troubleshooting cost is directly reduced to zero, and at the same time, software copyright infringement acts damaging the interests of software vendors are completely eradicated.

Description

【Technical field】 [0001] The invention relates to the field of network communication, in particular to a MAC address authentication technology. 【Background technique】 [0002] In the prior art, in order to enable common electronic consumer products to have the ability to connect to the Internet, various access methods can be provided, among which access to LAN via RJ45 is a relatively mature technology. The RJ45 jack is the standard interface of a wired network card. Electronic consumer products using this Internet access method must have a built-in wired network card, and the wired network card device uses the physical address MAC uniformly managed by IEEE to identify the device's global uniqueness in Internet communication. sex. The use of MAC addresses requires a unified application to the management agency to avoid conflicts. Manufacturers such as desktop computers and notebooks have produced related equipment for a long time, and most of them can comply with this regu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 何迪荃杜军
Owner HAIMEN BIWEI INTPROP SERVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products