Unlock instant, AI-driven research and patent intelligence for your innovation.

User lock upgrade method, device, system, electronic equipment and storage medium

A user and upgrade package technology, applied in computer security devices, electronic digital data processing, instruments, etc., can solve the problems of untimely issuance and long time-consuming, etc., and achieve the effect of convenient upgrade and solving the problem of long time-consuming upgrade

Active Publication Date: 2021-11-05
BEIJING SENSESHIELD TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The upgrade method of the above-mentioned user lock is prone to the problem that the issuance is not timely and takes a long time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User lock upgrade method, device, system, electronic equipment and storage medium
  • User lock upgrade method, device, system, electronic equipment and storage medium
  • User lock upgrade method, device, system, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] figure 1 The flow chart of the user lock upgrade method provided by Embodiment 1 of the present invention, the embodiment of the present invention is applied to the server, and this embodiment is applicable to the situation of upgrading the user lock, and the method can be executed by the upgrade device of the user lock The upgrading device of the user lock can be realized by software and / or hardware, and the upgrading device of the user lock can be configured on an electronic computing device, specifically including the following steps:

[0041] S110. Receive the upgrade request of the user lock sent by the user terminal.

[0042] Exemplarily, the user terminal here refers to the terminal on the software user side, which may be a terminal with software corresponding to the user lock, or a terminal without the software installed, which is not limited in this application. For example, the user terminal may be a mobile phone, a computer, or a tablet.

[0043] The upgrad...

Embodiment 2

[0059] figure 2 It is a flow chart of the method for upgrading a user lock provided by Embodiment 2 of the present invention. The embodiment of the present invention can be combined with various alternative solutions in the foregoing embodiments. like figure 2 As shown, the method of the embodiment of the present invention specifically includes the following steps:

[0060] S210. Receive the license issuance request of the user lock sent by the developer terminal.

[0061] Exemplarily, the developer terminal refers to a terminal at the software developer side, and may be a terminal used by a manager at the software developer side to manage user locks. For example, it may be a terminal held by the business personnel on the developer side, for example, it may be a mobile phone, a computer, or a tablet.

[0062] The license issuance request may be a request to issue a license file of a certain software for the user key.

[0063] When the user lock needs to be upgraded, for ...

Embodiment 3

[0086] Image 6 It is a flow chart of the method for upgrading a user lock provided by Embodiment 3 of the present invention. The embodiment of the present invention can be combined with various alternative solutions in the foregoing embodiments.

[0087] like Image 6 As shown, the method of the embodiment of the present invention specifically includes the following steps:

[0088] S310. Receive the license issuance request of the user lock sent by the developer terminal.

[0089] Exemplarily, the license issuance request includes: first identification information and second identification information.

[0090] The first identification information here is used to uniquely identify the user on the software developer side, for example, may be an account of a person on the software developer side.

[0091] The second identification information is used to uniquely identify a user lock, for example, it may be information such as ID and serial number of the user lock, or hardwar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a user lock upgrading method, device, system, electronic equipment and storage medium. The method includes: receiving an upgrade request of a user lock sent by a user terminal; based on the upgrade request, sending at least one license upgrade package corresponding to the user lock to the user terminal, so that the user terminal is based on at least one The license upgrade package upgrades the user lock; wherein, the at least one license upgrade package is generated by the server calling a control lock corresponding to the user lock; the control lock is physically connected to the server, Alternatively, the control lock is a control lock module integrated in the server. In order to achieve the effect of quickly and conveniently upgrading the user lock.

Description

technical field [0001] The embodiment of the present invention relates to computer security technology, and in particular to a user lock upgrading method, device, system, electronic equipment and storage medium. Background technique [0002] At present, some software developers on the market will use hardware locks to protect their developed software products when releasing official software products. The hardware lock here includes a control lock and a user lock. The control lock is controlled by the software developer and is used to encrypt the software, issue licenses, and issue license upgrade files. The user lock is used to store the license issued by the software developer. When software developers provide users with application software, they will also provide a user lock to cooperate with the application software. The user downloads the encrypted software of the software developer on the terminal device and inserts the user lock to decrypt it and use the software no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F8/65G06F21/10
CPCG06F8/65G06F21/105
Inventor 孙吉平刘荣华
Owner BEIJING SENSESHIELD TECH