Unlock instant, AI-driven research and patent intelligence for your innovation.

User lock upgrading method, device and system, electronic equipment and storage medium

A user and upgrade package technology, applied in computer security devices, electronic digital data processing, software deployment, etc., can solve the problems of untimely issuance and long time, and achieve the effect of convenient upgrade and long time-consuming upgrade.

Active Publication Date: 2021-01-29
BEIJING SENSESHIELD TECH
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The upgrade method of the above-mentioned user lock is prone to the problem that the issuance is not timely and takes a long time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User lock upgrading method, device and system, electronic equipment and storage medium
  • User lock upgrading method, device and system, electronic equipment and storage medium
  • User lock upgrading method, device and system, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] figure 1 This is a flowchart of a method for upgrading a user lock provided in Embodiment 1 of the present invention. The embodiment of the present invention is applied to a server, and this embodiment is applicable to the situation of upgrading a user lock, and the method can be executed by an upgrading device for a user lock. , the upgrading device of the user lock can be realized by software and / or hardware, and the upgrading device of the user lock can be configured on the electronic computing device, and specifically includes the following steps:

[0041] S110. Receive a user lock upgrade request sent by the user terminal.

[0042] Exemplarily, the user terminal here refers to a terminal on the user side of the software, which may be a terminal with software corresponding to the user lock, or a terminal without the software installed, which is not limited in this application. For example, the user terminal may be a mobile phone, a computer, or a tablet.

[0043] ...

Embodiment 2

[0059] figure 2 This is a flowchart of a method for upgrading a user lock provided in Embodiment 2 of the present invention, and the embodiment of the present invention may be combined with each optional solution in the foregoing embodiment. like figure 2 As shown, the method of the embodiment of the present invention specifically includes the following steps:

[0060] S210: Receive a license issuance request for a user lock sent by the developer terminal.

[0061] Exemplarily, the developer terminal refers to a terminal on the side of a software developer, and may be a terminal used by an administrator on the side of the software developer to manage user locks. For example, it may be a terminal held by business personnel on the developer side, such as a mobile phone, a computer, or a tablet.

[0062] A license issuance request may be a request to issue a license file for a certain software for a user lock.

[0063] When the user lock needs to be upgraded, for example, t...

Embodiment 3

[0086] Image 6 This is a flowchart of a method for upgrading a user lock provided in Embodiment 3 of the present invention, and the embodiment of the present invention may be combined with each optional solution in the above-mentioned embodiment.

[0087] like Image 6 As shown, the method of the embodiment of the present invention specifically includes the following steps:

[0088] S310: Receive a license issuance request for the user lock sent by the developer terminal.

[0089] Exemplarily, the license issuance request includes: first identification information and second identification information.

[0090] The first identification information here is used to uniquely identify the user on the software developer side, for example, it may be an account of a person on the software developer side.

[0091] The second identification information is used to uniquely identify a user lock, for example, information such as ID, serial number, etc. of the user lock, or hardware in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention discloses a user lock upgrading method, device and system, electronic equipment and a storage medium. The method comprises the following steps: receiving an upgrading request of a user lock sent by a user terminal; based on the upgrading request, sending at least one permission upgrading packet corresponding to the user lock to the user terminal, wherein the user terminal upgrades the user lock based on the at least one permission upgrading packet, wherein the at least one permission upgrade package is generated by calling a control lock corresponding to the userlock by the server, the control lock is physically connected with the server, or the control lock is a control lock module integrated in the server. Therefore, the effect of quickly and convenientlyupgrading the user lock is achieved.

Description

technical field [0001] Embodiments of the present invention relate to computer security technologies, and in particular, to a method, device, system, electronic device, and storage medium for upgrading a user lock. Background technique [0002] At present, some software developers on the market will use hardware locks to protect their developed software products when releasing official software products. The hardware locks here include control locks and user locks. The control locks are mastered by software developers and are used to encrypt software, issue licenses, and issue license upgrade files. User locks are used to store licenses issued by software developers. When software developers provide users with application software, they will also provide a user lock for use with the application software. The user downloads the encrypted software of the software developer on the terminal device and inserts the user lock before decryption and normal use of the software. Howe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/65G06F21/10
CPCG06F8/65G06F21/105
Inventor 孙吉平刘荣华
Owner BEIJING SENSESHIELD TECH