Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A virtual desktop licensing method based on the combination of software and hardware

A virtual desktop, software and hardware technology, applied in the field of virtual desktop authorization, can solve the problems of hardware replication, inability to modify, loss, etc., to simplify the deployment process, improve security strength, and prevent reverse cracking.

Active Publication Date: 2022-04-29
湖南麒麟信安科技股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 2. The developer password, with a length of 24 bytes, can only write and delete files in the UKey (such as creating files and deleting files), but cannot obtain any data in the UKey, set the number of retries for the developer password, When the number of consecutive incorrect input reaches the maximum limit, the developer password will be locked, and UKey will no longer be able to be used
[0008] 3. Hardware serial number, UKey has a 64-bit (8 bytes) global unique hardware serial number, which cannot be modified
However, since UKey is a hardware object, there are also cases of loss and theft, especially the risk of being copied by hardware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A virtual desktop licensing method based on the combination of software and hardware
  • A virtual desktop licensing method based on the combination of software and hardware
  • A virtual desktop licensing method based on the combination of software and hardware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be further described below in conjunction with the accompanying drawings and specific preferred embodiments, but the protection scope of the present invention is not limited thereby.

[0049] Such as figure 1 As shown, the present invention performs secondary development on UKey equipment, and configures a UKey security module in the UKey equipment, so that the authorization code and UKey serial number are encrypted by the UKey security module to obtain the key file, and the key file is decrypted by the UKey security module to obtain the corresponding key file. The license information and UKey serial number. The UKey security module is a security component that encapsulates the core encryption and decryption algorithm and code into a C51 program, generates a binary file after compilation, and runs inside the UKey. When initializing each new UKey device, the developer ID and developer password will be automatically set, and the UKey security mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virtual desktop authorization method based on the combination of software and hardware, including: encrypting the authorization information into an authorization code, running the UKey security module to encrypt the authorization code and the UKey serial number and writing them into the UKey security area, and storing the customer name and The authorization code is issued to the customer; obtain the customer name and authorization code, if the customer name and the customer name analyzed by the authorization code are the same, run the UKey security module to read the information in the UKey security area and decrypt it, if the decryption result is the same as the license information analyzed by the authorization code and The UKey serial number is the same, save the authorization code and license information; read the license information, if the license period is valid and the number of virtual desktop authorizations is less than the maximum number of virtual desktops, the virtual desktop is allowed to start and the number of virtual desktop authorizations is updated, and the virtual desktop is released when the virtual desktop is shut down. Occupied virtual desktop entitlements. The invention does not need to collect hardware feature codes, and avoids the risk of UKey being copied by illegal hardware after being lost or stolen.

Description

technical field [0001] The invention relates to virtual desktop authorization, in particular to a virtual desktop authorization and licensing method based on the combination of software and hardware. Background technique [0002] Licensing is a relatively common means of rights protection for software distribution, that is, an ID card for genuine software, the essence of which is to prevent copying and piracy, and to charge according to functions. At present, the vast majority of commercial software and shareware are licensed to ensure that the software itself is not stolen, in order to ensure their own interests. [0003] Different from ordinary software, cloud desktop products are generally quoted according to the number of virtual desktops, so the license information must include the maximum number of virtual desktops. [0004] Most vendors in the cloud desktop field choose a licensing scheme based on pure software protection. The license is a fixed-length serial number ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/451G06F21/31G06F21/34
CPCG06F9/452G06F21/34G06F21/31
Inventor 胡智峰孙利杰陈松政刘文清杨涛
Owner 湖南麒麟信安科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products