Pooling method of software encryption dog resource under cloud computing environment

A cloud computing environment and software encryption technology, applied in computing, computer security devices, program control design, etc., can solve problems such as USB dongle loss or damage, software authorization, difficult deployment and management, etc., to improve resource utilization, Reduce the probability of damage and achieve the effect of unified management

Inactive Publication Date: 2015-03-25
CHINA GASOLINEEUM ENG
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. When the user carrying the dongle does not use the corresponding software, other users cannot use the dongle to authorize the software, especially when working in a different environment such as business trips or different regions, the waste of USB dongle resources is huge
[000...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] A "pooling" method for software dongle resources in a cloud computing environment, comprising the following content:

[0027] 1. Stand-alone software installation:

[0028] (1) If the application software can be installed on the server operating system of Windows Server 2008 or later and supports multi-user mode, follow the correct software installation process on the server operating system (both physical servers and virtual servers are acceptable, It is recommended to install the software on a virtual server); if the application software cannot be installed on the above server operating system, it can be installed on Windows 7 or a higher version of the operating system, then follow the correct software installation process on the personal operating system ( Both physical PC and virtual PC are available, and it is recommended to install the software on a virtual PC.

[0029] (2) Utilize the application virtualization function provided by Citrix XenApp or XenDesktop s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a pooling method of software encryption dog resource under a cloud computing environment. The pooling method comprises the following steps: installation of stand-alone version application software and C/S architecture user side software: if the installation can be carried out on a server operating system with Windows Server 2008 or a higher version and the use of a multi-user mode is supported, carrying out software installation on the server operating system, and if the installation cannot be carried out on the server operating system, carrying out software installation on a personal operating system according to an installation procedure on the operating system of Windows 7 or a higher version; supporting the versions of IE8 or higher for a B/S architecture, and installing plug-ins needed by software; then carrying out application release; finally directly deploying encryption dogs on a physical server, and transmitting to the server or a PC to be used by client software. The pooling method realizes centralized management and centralized use of USB software encryption dogs.

Description

technical field [0001] The invention relates to a method for "pooling" software dongle resources in a cloud computing environment. Background technique [0002] At present, in the authorization method of software license, USB dongle is a relatively common security tool for identity authentication. Its size and shape are similar to a USB flash drive, and can be directly plugged into the USB interface of the computer. Each USB dongle has an independent product identification code and an independent encryption algorithm. When users use the application software with a dongle, they can only use the software normally after detecting the corresponding dongle and passing the legality verification. [0003] There are the following problems in the above-mentioned usage method: [0004] 1. When the user carrying the dongle does not use the corresponding software, other users cannot use the dongle to authorize the software, especially when working in a remote environment such as busine...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/12G06F9/445
CPCG06F9/45504G06F21/126G06F21/109
Inventor 胡耀义郭成华王鸿捷安源王颉刘杰周波
Owner CHINA GASOLINEEUM ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products