Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for controlling software access rights

A technology of access rights and control methods, applied in the field of information security, can solve problems such as heavy workload and update, and achieve the effects of easy migration and expansion, freedom of distribution, and high flexibility

Inactive Publication Date: 2018-10-09
SICHUAN FEIXUN INFORMATION TECH CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that when the number of employees is large, the workload is relatively large; the second is that when the employee's position is changed, the corresponding relationship needs to be updated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for controlling software access rights
  • Method and system for controlling software access rights
  • Method and system for controlling software access rights

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034]In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the specific implementation manners of the present invention will be described below with reference to the accompanying drawings. Obviously, the accompanying drawings in the following description are only some embodiments of the present invention, and those skilled in the art can obtain other accompanying drawings based on these drawings and obtain other implementations.

[0035] In order to make the drawing concise, each drawing only schematically shows the parts related to the present invention, and they do not represent the actual structure of the product. In addition, to make the drawings concise and easy to understand, in some drawings, only one of the components having the same structure or function is schematically shown, or only one of them is marked. Herein, "a" not only means "only one", but also means "more than one".

[0036] The present...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for controlling software access rights, wherein the method comprises: a step S20 that the terminal sends access data to the control server through the router; a step S30 that the control server adds a network identifier to the access data; a step S40 that the control server sends the access data and the network identifier to the data server; and a stepS50 that the data server obtains corresponding feedback data according to the access data and the network identifier, and sends the feedback data to the terminal through the control server and the router. The system includes a terminal, a router, a control server, and a data server. The invention adds a network identifier to the access data of the software by the control server, so that the data server feeds back the data of corresponding rights through the network identifier, thereby realizing the purpose of managing the rights of the software.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for controlling software access rights. Background technique [0002] Data encryption is very necessary and important, especially in the process of work, if the technical data is not encrypted, some core technologies will be leaked and cause serious losses to the company. Data encryption for the workplace comes in the following ways. One is to take the approach of encrypting only the software and not the device. The disadvantage of this method is that the user may use a personal terminal to work, and it is obviously unreasonable to encrypt the software in the personal device at this time. Another method is that the encryption system adopts a fixed IP or MAC method, that is, employees are assigned a fixed IP when they join the job, and the server side maintains a huge amount of correspondence between IP addresses or MAC addresses and employees, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/0876H04L63/10H04L63/123
Inventor 孟庆如
Owner SICHUAN FEIXUN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products