Method and system preventing software from copying

A software and software authorization technology, applied in the direction of instruments, program/content distribution protection, electrical digital data processing, etc., can solve the problems of poor security and high cost, and achieve the effect of simple and effective authorization management

Inactive Publication Date: 2012-06-20
深圳康泓兴智能科技有限公司
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] In view of the above-mentioned deficiencies in the prior art, the object of the present invention is to provide a method for pre

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system preventing software from copying
  • Method and system preventing software from copying
  • Method and system preventing software from copying

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The present invention provides a method and system for preventing software copying. In order to make the purpose, technical solution and effect of the present invention clearer and clearer, the present invention will be further described in detail below. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0048] Before describing the present invention, it is necessary to explain how criminals realize machine copy board cloning at present: obtain the machine at different stages such as the early prototype stage, factory production stage or finished product market sales stage; for hardware, use its direct visibility to pass The circuit copy board can realize hardware cloning; for the software, it is stored in the FLASH, due to the general requirements of the software upgrade function and cost considerations, these FLASH can be read and written repeatedly, use the stor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system preventing software from copying. The method comprises the following steps: A, the software is started initially; B, a physical identification code and FLASH storage identification code reading module is invoked for reading a physical identification code Ma and a FLASH storage code Mb; C, whether the Ma is equal to the Mb or not is judged, if equal, a step E is entered, if not, a step D is entered; D, the trial number of an illegal software is read and added by one, and then the result is stored to the FLASH; and E, the start of the software is completed. Through the invention, an authorized data base is introduced to uniformly manage the authorized information, any unauthorized machine is the illegal software, and the authorized process is written in a general bar code in a hidden manner. The machine software can be subject to the simple and effective authorized management during the prototype sending stage, factory large-scale production stage, and after-sales repair stage without adding the economical and process cost.

Description

technical field [0001] The invention relates to the field of preventing software copying, in particular to a method and system for preventing software copying. Background technique [0002] At present, the set-top box software is basically stored in FLASH. How to prevent criminals from reading the software code in FLASH to clone the machine at a relatively low cost during the process of prototype function confirmation, factory production, and finished product sales process? The production of each set-top box Businesses are always looking for better solutions. [0003] There are two main methods to prevent software copying. The first technical steps are as follows: [0004] A. Utilize the identification code on the hardware that can be used as the unique identification of the set-top box, such as the CPU serial number, additional hardware encryption chip, etc., and store the unique identification code used in each set-top box in the machine FLASH when the set-top box...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/14
Inventor 彭文剑
Owner 深圳康泓兴智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products