Protection Schemes |
Top Previous Next |
In a sense AVLock can be compared with one or more switches for protecting access to the application. Here are some of the most common protection schemes that could be implemented through AVLock SIMPLE. Please note that schemes A..G uses only one key to implement the protection unlike the scheme H which uses three different keys:
Symbols used in schemes
Scheme A This is the simplest scheme where AVLock activate / deactivate the application according to their registration status:
Scheme B This scheme never block the access to the application and have a module of free access and other controlled by AVLock:
Scheme C This scheme only allow access to the application when AVLock is registered. Also have a module of common access and other three controlled by AVLock with the Values field used as switches:
Scheme D This scheme never block the access to the application and have a module of free access and other three controlled by AVLock with the Values field used as switches:
Scheme E This scheme allow free access to the whole application, totally free and full functional. However, if the user is not registered then periodically show a nag screen or another design in order to encourage the user to register your application.
Scheme F This may be a database application where you restrict the number of record allowed according a scale. The field Value1 is used as a selector to determine the value into the scale:
Scheme G This scheme never block the access to the application and have a module of free access and other 3 controlled by AVLock. Like scheme C, but here uses three different keys, one for each controlled module:
This is not a definitive list. You could imagine and implement several other schemes for your real implementation.
|