Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for preventing enterprise product authorization file from being leaked

An authorization file, enterprise technology, applied in computer security devices, program/content distribution protection, instruments, etc., can solve the problem that authorization files cannot be verified online, cannot be connected to the Internet, and have no hardware address.

Active Publication Date: 2021-10-19
北京顶象技术有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, for many financial companies, the company's internal network restrictions cannot be connected to the Internet, so the authorization file itself may not be able to be verified online
If it is not verified online, it is difficult to control the authorization file from being used multiple times
There are also situations where the authorization file is bound to the hardware address, but this cannot support the situation of system migration; and now many systems are deployed in containers, and there is no stable hardware address for binding

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for preventing enterprise product authorization file from being leaked
  • Method and device for preventing enterprise product authorization file from being leaked
  • Method and device for preventing enterprise product authorization file from being leaked

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0033] In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer" etc. The indicated orientation or positional relationship is based on the orientation or positional relationship shown in the drawings, and is only for the convenience of describing the present invention and simplifying the description, rather than indicating or implying that the referred device or element must have a specific orientation, or i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for preventing enterprise product authorization files from being leaked, and the method comprises the following steps: S1, carrying out the deployment of a system through a system deployment module, and forming a deployment environment; S2, binding the authorization file with the deployment environment; S3, after the system obtains the authorization file, verifying the authorization file with the deployment environment; and S4, if the verification is passed, determining that the authorization file can be used; if verification fails, determining that the authorization file cannot be used. Through the method and the device, the authorization file and the deployment environment are bound, the authorization file has no leakage risk, and the use limitation of the authorization file can also be realized under the condition of no networking.

Description

technical field [0001] The invention relates to the fields of computer and information technology and industrial control security, in particular to a method and device for preventing enterprise product authorization documents from leaking out. Background technique [0002] For enterprise-oriented software, the issue of reuse and leakage of authorized files needs to be considered. Leakage or abuse of authorization files is a great loss to the enterprise. Java-based software products are generally release packages composed of compiled files. class, and the source code is easily decompiled by tools such as JAD, and part of the code is re-implemented accordingly to skip license verification. In view of this, in the prior art, the difficulty of being cracked is generally increased in the process of compiling or class loading, or restricted through network verification. [0003] At present, when the enterprise authorization document is verified, it can be restricted through onli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/10G06F21/60
CPCG06F21/10G06F21/602G06F21/604G06F2221/2141
Inventor 杜威张晓科陈树华
Owner 北京顶象技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products