Unlock instant, AI-driven research and patent intelligence for your innovation.

Software protection method of action apparatus

A mobile device and software protection technology, applied in computer security devices, program/content distribution protection, instruments, etc., can solve problems that affect rights and interests, are not easy to disclose or leak, and are not easy to be copied out of exactly the same products, etc.

Inactive Publication Date: 2007-10-31
MITAC COMP (SHUN DE) LTD +1
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Based on the above, in order to prevent products from being copied or stolen, the detailed circuit diagrams of such products or the configuration diagrams of internal components are the most important assets of the company, so they are often regarded as top secrets by the company and are not easily disclosed or leaked to avoid The company's interests are damaged, so as long as you do a good job of keeping secrets and preventing espionage, it is generally not easy to copy the exact same product
[0004] However, in addition to the hardware required for these functions, the software that controls these hardware operations is also the object of coveted people, and since this type of software is stored in the internal memory of the electronic device, ordinary people only need to buy it from the market. The product can be easily obtained, and the software stored in the memory can be downloaded through a copy device such as a burner, which may affect the rights and interests of the company that developed the software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software protection method of action apparatus
  • Software protection method of action apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] FIG. 1 is a flowchart of a software protection method for a mobile device according to a preferred embodiment of the present invention. Please refer to FIG. 1 , in this embodiment, the authentication procedure is performed when the mobile device is turned on for the first time, so as to determine whether the device is legal and whether to start it normally. Wherein, the aforementioned mobile device may be a mobile phone or a personal digital assistant, without limiting its scope.

[0019] First, the user turns on the mobile device (step S110), and then the software judges whether this is the first time to turn on the device (step S120). If it is not the first time to turn on the mobile device, it means that the mobile device has passed the authentication process before , then start up normally (step S160); if it is the first time to start up, then the mobile device sends an authentication message to the authentication center (step S130), and the authentication center re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses one move device software protection method, which comprises the following steps: when move device fulfills first start operation in the burst device, sending one identification message to the center to judge whether the message contains the product series legal number and to decide whether to send one signal to stop the product function and to improve the software copied or stolen to protect the rights of the producers.

Description

technical field [0001] The present invention relates to a software protection method, and in particular to a software protection method for controlling whether the mobile device starts normally according to the authentication result of the first power-on of the mobile device. Background technique [0002] With the development of information, the functions and specifications of various electronic components can be easily obtained by those who are familiar with this field, and due to the advancement of manufacturing technology, even complex circuit boards or electronic devices, as long as the circuit diagram or The configuration diagram of the internal components can easily reproduce the same product. [0003] Based on the above, in order to prevent products from being copied or stolen, the detailed circuit diagrams of such products or the configuration diagrams of internal components are the most important assets of the company. The interests of the company are damaged, so a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/12
Inventor 张生龙
Owner MITAC COMP (SHUN DE) LTD