Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authorization method and device

A technology for authorizing information and roles, applied in the communication field, can solve problems such as poor user experience, achieve good experience, and simplify the application process and authorization process

Active Publication Date: 2019-03-29
NEW H3C TECH CO LTD
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, users need to purchase multiple license files. For example, if one master device and three backup devices are deployed, four license files need to be purchased. The user experience is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization method and device
  • Authorization method and device
  • Authorization method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The terms used in the embodiments of the present application are only for the purpose of describing specific embodiments, rather than limiting the present application. As used in this application and the claims, the singular forms "a", "the" and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.

[0035] It should be understood that although the embodiments of the present application may use terms such as first, second, and third to describe various information, such information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, without departing from the scope of the present application, first information may also be called second information, and similarly, second ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authorization method and device. The method includes obtaining a License file from an application serv; Receiving a License request message sent by an application client, wherein the License request message comprises role information of the application client, and the role information is a main role or a backup role; If the role information is the main role, judging whether the authorization quantity of the License file reaches the authorization upper limit; If so, refusing to assign authorization information to the application client; If not, allocating authorizationinformation to the application client according to the License file, and sending the authorization information to the application client, so that the application client authorizes the first operationaccording to the authorization information. Through the technical proposal of the application, the user does not need to purchase multiple License files, and the user has a better experience.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to an authorization method and device. Background technique [0002] The goal of software authorization is to allow users to use software by purchasing a license, which involves the number of software installations, usage time, and functional modules. In order to implement software authorization, an application client is deployed on the device, and the application client collects device information, such as MAC (Media Access Control Address, Media Access Control) address, etc., and sends the device information to the application server. The application server on the service provider side uses the device information to generate a license file, and sends the license file to the application client. The application client uses the license file to run the software, so as to realize the normal use of the software. [0003] If the user deploys the master device and t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/10G06F21/12
CPCG06F21/105G06F21/121
Inventor 冯林蛟
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products