Authorization management method and device

A technology for authorization management and management modules, applied in the field of authorization management methods and devices, capable of solving problems such as service interruption and LAP not working properly

Active Publication Date: 2019-06-28
NEW H3C TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In some application scenarios, assuming that the DID of the LicS changes, the DID corresponding to the installed license is different from the DID used locally by the LicS. Therefore, the license is invalid, and the LAP cannot continue to use the license. The LAP fails to work normally and the service is interrupted
[0006] For example, LicS has locally recorded the corresponding relationship between license 1 and DID1. Assume that at a certain moment, the DID of LicS changes, such as from DID1 to DID2. License 1 is invalid because the DID2 used locally is different

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization management method and device
  • Authorization management method and device
  • Authorization management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] The terminology used in this application is for the purpose of describing specific embodiments only, not to limit the application. As used in this application and the claims, the singular forms "a", "the" and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.

[0084] It should be understood that although the terms first, second, third, etc. may be used in this application to describe various information, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, without departing from the scope of the present application, first information may also be called second information, and similarly, second information may also be called first information. Dependin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authorization management method and device, and the method comprises the steps: checking whether a first DID corresponding to authorization permission is the same as a secondDID currently used by a LicS or not after the LicS is restarted; if not, setting the service state of the LicS as an unavailable state; sending a first state message to an LCP installed with the authorization permission, so that the LCP opens a local cache of the LCP according to the first state message; wherein the local cache comprises an authorization permission obtained by the LCP from the LicS, and after the local cache is opened, the LCP provides the authorization permission in the local cache for an authorization application LAP. According to the technical scheme, interruption of LAP service is avoided, and the anti-piracy capability of the LicS is enhanced.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to an authorization management method and device. Background technique [0002] The goal of software authorization is to enable users to use software by purchasing a license (License). In order to implement software authorization, an authorization server (License Server, LicS) can be deployed in the network, and an authorization client (License Client Program, LCP) and an authorization application (License Application Program, LAP) can be deployed on user hosts. In this application scenario, the user purchases an authorization key (LicenseKey, LK) and submits the LK to the service provider. The service provider allocates an activation key (ActivationKey, AK) file to the user according to the LK, and provides the AK file to the user, and the user installs the AK file into the LicS. Further, the LicS provides the license in the AK file to the LCP, and the LCP pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/12
Inventor 王全文刘永
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products