Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Software authorization method and software authorization system based on block chain

A technology of software authorization and blockchain, which is applied in the field of blockchain, can solve problems such as dependence and inability to achieve authorization control, and achieve the effect of increasing speed, improving training convergence speed, and facilitating intelligent control

Active Publication Date: 2022-05-10
GUANGZHOU ZHUOYUAN VIRTUAL REALITY TECH CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While these softwares bring convenience and fun to people's daily life and work, they also produce some unfavorable hidden dangers.
For example, the vast majority of software does not have a set of intelligent user control and use authorization mechanisms. For some software that is not suitable for minors to use or not suitable for minors to use for a long time, it is impossible to achieve accurate authorization control. The way most rely on parents' perceived control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software authorization method and software authorization system based on block chain
  • Software authorization method and software authorization system based on block chain
  • Software authorization method and software authorization system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0086] In order to make the purpose, technical scheme and advantages of the embodiment of the application clearer, the technical scheme in the embodiment of the application will be clearly and completely described below in combination with the attached drawings in the embodiment of the application. Obviously, the described embodiments are part of the embodiments of the application, not all of the embodiments. The components of the embodiments of the present application generally described and shown in the drawings herein may be arranged and designed in a variety of different configurations.

[0087] See Figure 1 , Figure 1 The node 400 and the software authorization Library of the system can provide a schematic diagram of the node 400 and the software authorization Library of the system. The sample library node 100, the annotation node 200, the verification node 300 and the application node 400 can communicate with each other through the network. The sample library node 100 can be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

According to the software authorization method and the software authorization system based on the block chain provided by the invention, by combining a block chain technology, the sample library node releases the information of the to-be-labeled sample in the software authorization system, so that a large number of labeling nodes can participate in the labeling work of the sample; the method comprises the following steps: firstly, marking a plurality of marking nodes, then performing statistical verification by a verification node according to marking result information provided by the plurality of marking nodes to determine a final sample tag, finally training a preset AI model according to a marked sample through an application node, and identifying a target object by using the trained AI model to obtain object features of the target object. And according to the object features, performing software authorization on the target object for the use permission of the target software. Therefore, intelligent software authorization for the target software can be realized based on the AI model obtained by sample training, and intelligent control of the target software for use permissions of different user groups can be facilitated.

Description

technical field [0001] The application relates to the technical field of blockchain, in particular to a software authorization method and software authorization system based on blockchain. Background technology [0002] With the rapid development of mobile Internet technology and computer software technology, a variety of network software have sprung up in the network, such as online game software, video software, music software, social software and so on. While these software bring convenience and fun to people's daily life and work, they will also produce some adverse hidden dangers. For example, the vast majority of software does not have a set of intelligent user control and authorization mechanism. For some software that is not suitable for minors to use or for minors to use for a long time, accurate authorization control cannot be achieved. Most of the existing methods rely on parental control. summary of the invention [0003] In order to overcome the above shortcomings i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06F21/32G06F21/31G06F21/64G06V10/774G06V40/16G06K9/62G10L15/06
CPCG06F21/45G06F21/32G06F21/31G06F21/64G10L15/063G06F2221/2141G06F18/214
Inventor 刘卓张寄望廖嘉峰
Owner GUANGZHOU ZHUOYUAN VIRTUAL REALITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products