Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

127results about How to "Prevent illegal copying" patented technology

Software authorization system based on public key cryptosystem

The invention discloses a software authorization system based on public key cryptosystem. The software authorization system comprises a server end and a client end, wherein the server end comprises an institution authorization certification generation module, a receiving module, a verification module and a user authorization certificate generation module. The user authorization certificate generation module comprises a digital signing module used for carrying out digital signing on computer hardware characteristics h0 in a user registration file with an RSA private key to generate S0, an encryption string generation module used for carrying out preset hybrid operations on obtained software version information v, user information u, an authorization term ex, current time cur and s0 to generate an encryption string signB64 and a certificate generation module used for generating a user authorization certificate with the encryption string signB64 and the RSA public key. The method can prevent software from being illegally copied, meanwhile, the software can be managed by a software issuer in a concentrated mode, and upgrading and tracking of the software, pushing personalized services for users and other after-sale management are facilitated.
Owner:HUAZHONG NORMAL UNIV

Dereplication encryption lock for software and hardware of embedded system

The invention discloses a dereplication encryption lock for software and hardware of an embedded system. The dereplication encryption lock comprises an on-board member chip ID (identification) and software ID management component, a password and encryption program management component, an encryption and decryption component, a self-destruction and guard component, a processor chip with security verification and on-board port and control member chip. The on-board member chip ID (identification) and software ID management component is used for managing and controlling software and hardware in the system. The password and encryption program management component is used for generating secret keys and password exclusive to the system according to ID number of software and hardware, part number and artificial secret keys in the system. The encryption and decryption component is used for decrypting programs or data ciphertexts according to selected secret keys and encryption program to generate executable programs or data plaintexts. The self-destruction and guard component is used for performing safety detection and protection to chips in the system and preventing illegal tamper and replacement. The processor chip guarantees safe operation of programs needed by the system and cannot store any other programs or data except for own necessary serial number, starting code and response programs after power failure. The on-board port and control member chip is a port chipset which is used for finishing all functions of the system.
Owner:张景彬 +1

Electronic bill system, apparatus and method

The invention relates to the field of electronic ticket, in particular to an electronic ticket system which has universality and can prevent non-buyers from illegally duplicating the electronic tickets. The invention provides an electronic ticket system, a device and a method thereof. The method comprises the following steps: firstly, the property identification information of each property of a ticket is determined according to the property list of the ticket secondly, the corresponding relation of the properties of various tickets and the identification information of the property is recorded in the property list of the ticket thirdly, the property identification information of each property and the property parameters of the ticket are correspondingly recorded in the electronic ticket and fourthly, the electronic ticket is transmitted to the secure memory chip of a mobile terminal. The property identification information of each property and the property parameters of various tickets can be recorded in the electronic ticket according to the property list of the ticket to form various electronic tickets, thereby ensuring the universality of the electronic ticket system; furthermore, the electronic ticket can be transmitted to the secure memory chip, so as to prevent the electronic ticket from being duplicated illegally.
Owner:CHINA MOBILE COMM GRP CO LTD

Service provision device in copyright protection, user terminal and copyright protection method

The invention relates to a copyright protection method, which comprises the following steps of: sending a request for downloading an encrypted digital file to a service provision device by a user terminal; downloading the encrypted digital file and an authorization file corresponding to the digital file from the service provision device, and embedding hardware information of the user terminal into the authorization file; and judging whether hardware information in the authorization file is consistent with the hardware information of the user terminal or not, and when the hardware information in the authorization file is consistent with the hardware information of the user terminal, permitting the user terminal to obtain the authorization of the digital file. The hardware information of the user terminal is embedded into the authorization file, and the corresponding digital file can be used only when the hardware information in the authorization file is consistent with the hardware information of the terminal, therefore, the copyright protection method can prevent from illegally copying the digital file. The invention also provides the service provision device for preventing the user terminal from illegally copying the digital file and the user terminal capable of eligibly copying the digital file.
Owner:HONG FU JIN PRECISION IND (SHENZHEN) CO LTD +1

Method and device for registration code generation, and method and device for software registration

The invention discloses a method for registration code generation. A registration code comprises three types of information including a machine code, software product passwords and several software permissions, wherein the machine code can prevent illegal software use situations such as illegal copying and installation of software, re-installation of a reinstalled system and reinstallation after expiration of agreed trial conditions; by the different software product passwords, software developers can use the same software registration protection method to protect various types of software products; and in addition, setting of different software permissions can satisfy diversified demands of different users, and control is flexible. Hence, the scheme can effectively overcome the detects that existing registration codes only contain a little of information and single functions and can avoid the problems that authorization courses with application of a license document are too complicated and parameters are fixed, so users' input becomes convenient; and only the registration codes need to be changed when a software trial stage is switched to a formal use stage, re-installation is not needed, and operations are convenient and rapid.
Owner:GRG BAKING EQUIP CO LTD

Confidential method for set-top box software

The invention discloses a confidential method for set-top box software, which comprises that: a personal computer (PC) is connected with a set-top box by a joint test action group (JTAG) simulator, a central processing unit (CPU) of the PC transmits a code word calculation program to a random access memory (RAM) of the set-top box by the JTAG simulator, and the code word calculation program automatically reads an identity code of a set-top box FLASH, calculates a code word by using a data encryption standard (DES) 3 algorithm and writes the code word into a given position in the set-top box FLASH; and the set-top box is initialized after being electrified, the CPU of the set-top box runs the code word calculation program to calculate the code word of the set-top box FLASH, and compares the calculated code word with the code word, obtained by the step A, at the given position in the set-top box FLASH, and the set-top box is normally run if the code words are consistent, otherwise displays a FLASH running error prompt in a display interface thereof and terminate the running of the program. Due to the adoption of the method, the software is effectively prevented from being illegally copied with simple operations on the basis of not increasing hardware cost.
Owner:FUJIAN ERLING ELECTRONICS

Self-destroying protection method based on malicious invasion of file system and device thereof

The invention provides a self-destroying protection method based on a malicious invasion of a file system. The method comprises the steps that when the content of a specified file in a common disk is not matched with the content in a specific file, the number of times of the malicious invasion of a hidden disk is accumulated; when the number of times of the malicious invasion of the hidden disk reaches an upper limit, the file system of the hidden disk is deleted, and the content in the hidden disk cannot be read. A device executing the method comprises a file type detection module, a content comparison module, an accumulating module, a comparison module for the number of times and a file system deleting module. The file type detection module is used for detecting the type of the specified file stored in the common disk of equipment, the content comparison module is used for distinguishing whether the content of the specified file is matched with that of the specific file or not, the accumulating module is used for accumulating the number of times of the malicious invasion of the hidden disk, the comparison module for the number of times is used for comparing the accumulated number of times of the malicious invasion of the hidden disk and the upper limit value of the accumulated number of times, and the file system deleting module is used for deleting information in an FAT area of the hidden disk. According to the method and the device, the safety of data in the equipment can be improved, and the data are effectively prevented from being illegally copied.
Owner:LEADER TECH BEIJING DIGITAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products