Authorization management method and device

A technology of authorization management and management module, which is applied in the field of authorization management methods and devices, can solve problems such as business interruption and LAP not working normally, and achieve the effect of avoiding interruption and enhancing anti-piracy capabilities

Active Publication Date: 2021-06-29
NEW H3C TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In some application scenarios, assuming that the DID of the LicS changes, the DID corresponding to the installed license is different from the DID used locally by the LicS. Therefore, the license is invalid, and the LAP cannot continue to use the license. The LAP fails to work normally and the service is interrupted
[0006] For example, LicS has locally recorded the corresponding relationship between license 1 and DID1. Assume that at a certain moment, the DID of LicS changes, such as from DID1 to DID2. License 1 is invalid because the DID2 used locally is different

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization management method and device
  • Authorization management method and device
  • Authorization management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] The terminology used in this application is for the purpose of describing specific embodiments only, not to limit the application. As used in this application and the claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.

[0084] It should be understood that although the terms first, second, third, etc. may be used in this application to describe various information, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, without departing from the scope of the present application, first information may also be called second information, and similarly, second information may also be called first information. Dependi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application provides an authorization management method and device. The method includes: after the LicS is restarted, check whether the first DID corresponding to the authorization license is the same as the second DID currently used by the LicS; The service state is set to an unavailable state; a first status message is sent to the LCP installed with the authorization license, so that the LCP enables the local cache of the LCP according to the first status message; wherein, the local The cache includes the authorization license obtained by the LCP from the LicS, and after the local cache is enabled, the LCP provides the authorization license in the local cache to the authorization application LAP. Through the technical solution of the application, service interruption of the LAP is avoided, and the anti-piracy capability of the LicS is enhanced.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to an authorization management method and device. Background technique [0002] The goal of software authorization is to enable users to use software by purchasing a license (License). In order to implement software authorization, an authorization server (License Server, LicS) can be deployed in the network, and an authorization client (License Client Program, LCP) and an authorization application (License Application Program, LAP) can be deployed on user hosts. In this application scenario, the user purchases an authorization key (LicenseKey, LK) and submits the LK to the service provider. The service provider allocates an activation key (ActivationKey, AK) file to the user according to the LK, and provides the AK file to the user, and the user installs the AK file into the LicS. Further, the LicS provides the license in the AK file to the LCP, and the LCP pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/12
Inventor 王全文刘永
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products