Software protection method of action apparatus
A mobile device and software protection technology, applied in computer security devices, program/content distribution protection, instruments, etc., can solve problems that affect rights and interests, are not easy to disclose or leak, and are not easy to be copied out of exactly the same products, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] FIG. 1 is a flowchart of a software protection method for a mobile device according to a preferred embodiment of the present invention. Please refer to FIG. 1 , in this embodiment, the authentication procedure is performed when the mobile device is turned on for the first time, so as to determine whether the device is legal and whether to start it normally. Wherein, the aforementioned mobile device may be a mobile phone or a personal digital assistant, without limiting its scope.
[0019] First, the user turns on the mobile device (step S110), and then the software judges whether this is the first time to turn on the device (step S120). If it is not the first time to turn on the mobile device, it means that the mobile device has passed the authentication process before , then start up normally (step S160); if it is the first time to start up, then the mobile device sends an authentication message to the authentication center (step S130), and the authentication center re...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 