Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Random binding software installing method

A technology of bundling software and installation methods, applied to program control devices, digital data processing components, instruments, etc., to achieve the effects of increasing difficulty, reducing risks, and effectively protecting copyrights

Active Publication Date: 2008-08-13
LENOVO (BEIJING) LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, with the widespread circulation of tools for refreshing the BIOS, illegal users can illegally use the random bundled software by refreshing the BIOS to the BIOS of a legitimate computer manufacturer.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Random binding software installing method
  • Random binding software installing method
  • Random binding software installing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The invention discloses a method for installing random bundled software by using an embedded system and cryptographic technology. The method can identify whether a computer is a legally authorized computer during the installation process of the random bundled software.

[0031] The present invention solidifies an encryption program on the computer, and this encryption program can be located on the device integrated with the computer, for example, can be located on a storage device (such as BIOS) on the computer motherboard, or be located on the hard disk etc.; The corresponding decryption program is embedded in the bundled software. The encryption and decryption algorithms are provided by the random bundled software provider. see figure 1 As shown in the flow chart, the random bundled software installation method of the present invention includes the following steps:

[0032] Step 101: Generate a verification code during the running of the random bundled software inst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invented method includes solidifying one encipherment program on bound computer, embedding corresponding deciphering program on bound software installation program, in bound software installation process, also including 1, bound software installation program generating a identifying code and transmitting identifying code to solidified encipherment program, 2, encipherment program ciphering said identifying code to generate ciphering identifying code, and transmitting ciphering identifying code to bound software installation program, 3, bound software installation program deciphering said ciphering identifying code, judging whether said deciphered ciphering identifying code is same with steps 1 said identifying code, if it is then continue installation process, otherwise ending said process. Said invention also provides other two bound software installation method. The present invention can identify whether computer is legally authorised computer in bound software installation process.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to a method for installing random bundled software. Background technique [0002] For a long time, developers of software bundled by computer manufacturers need to prevent illegal users from misappropriating their software and installing it on non-bundled computers for the sake of copyright protection. In order to achieve this purpose, a basic method is that the software developer requires the user to input the authorized registration number, password and other information provided by the software developer when installing the random bundled software, so as to prevent the spread of unauthorized copies of unauthorized users. [0003] A user card must be added in the packing list of the computer like this, and information such as the registration number, password and the like provided to the user by the developer of the random bundled software are recorded. Sinc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F1/00G06F9/445
Inventor 李亚辉
Owner LENOVO (BEIJING) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products