Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protecting method of client procedure and service platform

A client program and service platform technology, which is applied in the protection method and service platform field of client programs, can solve problems such as inconvenient, inability to activate on other devices, invalidation of activation codes, etc.

Active Publication Date: 2015-04-29
NEW FOUNDER HLDG DEV LLC +1
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are still defects in restricting the user's use rights through serial numbers or activation codes. For example, other users who obtain serial numbers or activation codes can also obtain the use rights of the client program through verification.
In addition, the serial number method can be used for multiple verifications, that is, the shared serial number can be used by multiple users, which has no effect on the protection of the client program.
With the activation code method, after the user activates the client program on one device, the activation code will become invalid and cannot be activated on other devices. Even the same user can only activate the client program on this device. The client program has usage rights, and this user cannot use it on other devices, which is very inconvenient for some users who use the client program on more than one device in different time periods
[0004] Existing methods do not limit the use authority of the client program by binding the user to the device. After a user obtains the use authority of the client program, it can be used by multiple users. Users who have obtained the authorization can use the client program all the time, and do not provide support for major upgrades of the client program. Therefore, it has not yet provided a flexible and efficient way to limit the usage rights of the client program. The client program developed by developers combining wisdom and labor for effective protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protecting method of client procedure and service platform
  • Protecting method of client procedure and service platform
  • Protecting method of client procedure and service platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] This embodiment provides a client program protection method, the steps are as follows figure 1 As shown, it specifically includes the following steps:

[0039]Step S1, setting a first corresponding relationship between a user and more than one terminal device; or setting a second corresponding relationship between more than one user in the user group and more than one terminal device in the terminal group.

[0040] Step S2, assigning preset permissions to users or user groups.

[0041] Step S3, receiving the request for using the client program sent by the terminal device, and judging whether the terminal device corresponds to a user who has been assigned a preset authority or whether it is a user group who has been assigned a preset authority according to the first relationship or the second correspondence If yes, the terminal device in the corresponding terminal group is allowed to use the client program on the terminal device, otherwise the client program is not all...

Embodiment 2

[0068] This embodiment also provides a service platform for protecting client programs, the schematic diagram of which is shown in figure 2 As shown, it includes: a relationship setting unit 21 , an authority setting unit 22 and an execution unit 23 .

[0069] The relationship setting unit 21 is used to set a first corresponding relationship between a user and more than one terminal device; or set a second corresponding relationship between more than one user in the user group and more than one terminal device in the terminal group.

[0070] The authority setting unit 22 is used for assigning preset authority to users or user groups.

[0071] Execution unit 23 is used to receive the use request of the client program sent by the terminal device, and judge whether the terminal device corresponds to a user who has been assigned a preset permission or whether it is a user who has been assigned a preset permission according to the first relationship or the second correspondence re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a protecting method of a client procedure. The method comprises the following steps: setting the corresponding relation of a user and a terminal device; distributing a preset authority for the user or a user group; receiving a using request for the client procedure, sent by the terminal device, and according to the corresponding relation, judging whether the terminal device corresponds to the user for whom the preset authority is distributed or whether the terminal device is the terminal device in the terminal group corresponding to the user group to for whom the preset authority is distributed; if yes, allowing the client procedure to be used on the terminal device, otherwise, disallowing the client procedure to be used on the terminal device. The method provided by the invention presets the corresponding relation between the user and the terminal device or the user in the user group and the terminal in a terminal group, wherein the user or each user in the user group has the usage permissions for the client procedure according to the preset authority, and through the use of the method, the object scope of the usage permissions and the validity period of permissions are controlled, so that the flexible and efficient protection for the client procedure is realized.

Description

technical field [0001] The invention relates to the technical field of software, in particular to a protection method and a service platform of a client program. Background technique [0002] At present, most people's work and study are inseparable from the mobile terminal, mainly because they need to use various client programs on the mobile terminal to operate, so they need to install client programs related to their work and study on the mobile terminal. But these client programs that are installed on the mobile terminals bring convenience to people's work and study, but also leave opportunities for lawbreakers. [0003] For some client programs, all users can use them free of charge, while for other client software developers, the user's usage rights are limited. Generally, in order to protect the client program, the user's use authority is restricted as needed. The traditional method is to encrypt the client program through a serial number or an activation code to limi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/108
Inventor 万意琛
Owner NEW FOUNDER HLDG DEV LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products