Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption lock setting method, client and server

An encryption lock and server-side technology, applied in the encryption lock field, can solve the problems such as the inability to use the encryption lock, the loss of distribution mode sales of the encryption lock, etc., to achieve the effect of high security, guaranteeing security, and simplifying the operation process

Active Publication Date: 2021-02-05
BEIJING SENSESHIELD TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] When the dongle enters the era of smart cards, due to the higher security requirements of users, the dongle has been required to write the user's private data when it leaves the factory. That is to say, the dongle purchased by user A from the manufacturer has been With the private data of user A attached, even if the dongle is resold to user B, user B cannot use the dongle
This form has brought a lot of trouble to manufacturers, because manufacturers cannot cooperate with distributors to maximize their benefits, especially in overseas markets, manufacturers have almost no direct sales channels, and this form of dongle is basically lost. Distribution Model Sales Opportunities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption lock setting method, client and server
  • Encryption lock setting method, client and server
  • Encryption lock setting method, client and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Various aspects and features of the present application are described herein with reference to the accompanying drawings.

[0045] It should be understood that various modifications may be made to the embodiments applied for herein. Accordingly, the above description should not be viewed as limiting, but only as exemplifications of embodiments. Those skilled in the art will envision other modifications within the scope and spirit of the application.

[0046] The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the application and, together with the general description of the application given above and the detailed description of the embodiments given below, serve to explain the embodiments of the application. principle.

[0047] These and other characteristics of the present application will become apparent from the following description of preferred forms of embodiment given as non-limiting examp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption lock setting method, a client and a server, and the method comprises the steps: receiving a lock setting permission sent by the server, writing the lock setting permission into a distributor lock, wherein the lock setting permission comprises the user information of a user of an encryption lock; sending a lock setting request to the server based on the lock setting permission in the distributor lock, and receiving private data fed back by the server based on the lock setting request, wherein the private data is generated based on user information; writingthe private data into the encryption lock to enable the encryption lock to execute operations related to the user information at least based on the private data. According to the method, a feasible encryption lock distribution mode is provided for distributors, encryption lock manufacturers do not need to deploy a part of production subsystems used for carrying out secondary setting on semi-finished encryption locks to the distributors, the operation process of carrying out secondary setting by the distributors is simplified, and high safety is achieved.

Description

technical field [0001] The present application relates to the technical field of dongles, in particular to a dongle setting method, a client and a server. Background technique [0002] Product manufacturers have successful products, and distributors have broad sales channels. If the products produced by manufacturers want to maximize profits in a certain region, the best solution is to reach a cooperation with local distributors. Manufacturers save costs and distributors earn money. Taking intermediate profits, consumers have long-term and stable purchase channels to achieve the goal of win-win. [0003] This kind of sales model also exists in the field of software protection, the most common is the distribution channel sales of hardware dongles. In the era of single-chip microcomputers, users do not have high requirements for encryption locks. They only need to obtain the lock number or the count in the lock. There is no difference between the encryption locks obtained by ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/64
CPCG06F21/602G06F21/64
Inventor 孙吉平李海鹏
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products