Unlock instant, AI-driven research and patent intelligence for your innovation.

Computer program product and license verification method

A technology of computer programs and authentication methods, which is applied in the field of authorization code authentication, and can solve problems such as the failure to connect to the server and user troubles

Inactive Publication Date: 2017-10-24
SYNOLOGY INC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in some cases, the monitoring system needs to be set up in a closed network for some security or non-security-related reasons, so that the server of the monitoring system cannot connect to the external network for authorization code authentication, thus causing confusion for users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer program product and license verification method
  • Computer program product and license verification method
  • Computer program product and license verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Please refer to figure 1 , which is a system architecture diagram according to an embodiment of the present invention. Such as figure 1 As shown, the system includes a mobile device 110, a monitoring system 120, and an authentication server 130, wherein the mobile device 110 includes at least a processor 112 and a storage component 114 storing a computer program product 115, and the monitoring system 120 includes a target server 122 and a plurality of monitors 124_1˜124_N. In this embodiment, the mobile device 110 may be a smart phone or a tablet computer, and the computer program product 115 stored in the storage component 114 may be a mobile application program (APP) downloaded from other servers, and the processor 112 Executing the computer program product 115 can complete the operations in the subsequent embodiments of the present invention; in addition, the monitoring system 120 is a closed network system, that is, the monitoring system 120 cannot connect to the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A license verification method executed via a mobile device includes: encrypting a serial number of a target server with a license to generate a license activation request, and sending the license activation request to an activation server; receiving an activation result from the activation server, where the activation result is generated from the activation server in response to the license activation request; and sending the activation result to the activation server for determining whether to enter an installation process associated with the license or not. A third party is used to authenticate an authorization code, and authentication step of the authorization code is separated from the installation procedure of the monitor, the convenience of the user can be balanced while ensuring that the authorization code is not misused and dispersed.

Description

technical field [0001] The invention relates to an authorization code authentication method, in particular to an authorization code authentication method executed by a third party. Background technique [0002] Servers currently on the market for monitoring systems usually only support a small number of monitors, and if users need to increase the number of monitors supported, they need to purchase an authorization code from the server manufacturer, and in order to avoid the authorization code Abuse or outflow, the user needs to connect the server to the authentication server of the external network to authenticate and activate the authorization code before the authorization code can take effect. However, in some cases, the monitoring system needs to be installed in a closed network for some security or non-security-related reasons, so that the server of the monitoring system cannot connect to the external network for authorization code authentication, thus causing troubles f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0281H04L63/0876H04L2463/101G06F21/121G06Q50/184G06Q2220/18H04L9/3247H04W60/00H04W12/03H04L63/0428
Inventor 詹智钧
Owner SYNOLOGY INC