Softdog device and secondary authorization management method based on softdog

A technology of authorization management and dongle, which is applied in the field of information technology security, can solve the problems of high cost and poor flexibility, and achieve the effect of low maintenance cost, reduced workload and reduced cost

Active Publication Date: 2017-05-10
杭州优稳自动化系统有限公司 +1
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, the dongle is used along with the software platform, which means that as many operating stations run the software platform, as many dongle devices are needed. The trouble caused by this model is the management of the dongle, and there is also a cost. High and poor flexibility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Softdog device and secondary authorization management method based on softdog
  • Softdog device and secondary authorization management method based on softdog
  • Softdog device and secondary authorization management method based on softdog

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order for those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. The same symbols in the drawings represent the same or similar components. However, those skilled in the art should understand that the examples provided below are not intended to limit the scope of the present invention. In addition, the drawings are only for schematic illustration and are not drawn according to their original scale.

[0041] Apparently, the described examples are only some, not all, embodiments of the present invention.

[0042] figure 1 Shown is a hardware frame diagram of a dongle device in a preferred embodiment of the present invention, and its composition includes: USB interface, USB-to-serial port converter, single-chip microcomputer and power supply.

[004...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of information technology security, and in particular relates to a softdog device and a secondary authorization management method based on a softdog. A hardware and software combined softdog having a secondary authorization function comprises a USB interface, a USB-serial interface converter, a single-chip microcomputer and a power supply; and furthermore, the softdog has the secondary authorization management permission. The method comprises the following steps of awarding a mother softdog having the secondary authorization permission to an industry algorithm library; completing compiling and encapsulation of the industry algorithm library by using the mother softdog; activating the secondary authorization function by using the mother softdog, and authorizing a child softdog; copying the industry algorithm library into a child softdog workstation; and calling and using the copied industry algorithm library by using the child softdog. By means of the softdog device and the secondary authorization management method based on the softdog disclosed by the invention, the risk that the industry algorithm library having the proprietary intellectual property is leaked can be put an end; and information security is also ensured while the programming workload is greatly reduced.

Description

technical field [0001] The invention relates to the field of information technology security, in particular to a dongle device and a secondary authorization management method based on the dongle device. Background technique [0002] With the rapid development of science and technology, the degree of automation of the production system is getting higher and higher. The smarter the system, the higher the efficiency and the lower the labor cost. The intelligence of the system depends not only on the hardware of the production system, but also on the brain of the intelligent system—the software program. The biggest feature of the software is its portability, which brings convenience to developers and prevents software copyright from being obtained. At the same time, it also brings security risks to the data information of the industry algorithm library with independent intellectual property rights. [0003] Software dongle is an intelligent tool with software protection functio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12
CPCG06F21/123G06F21/1075
Inventor 王文海嵇月强张益南许志正张稳稳
Owner 杭州优稳自动化系统有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products