Method and system for preventing software piracy
A software piracy and software technology, applied in transmission systems, electrical components, program/content distribution protection, etc., to achieve the effect of protecting legitimate rights and interests
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment approach
[0045] As another specific implementation manner, the system also includes:
[0046] A generating unit 104, configured to generate a second identifier by the software after saving the registration information of the software on the network server and the handheld device;
[0047] A verification unit 105, configured to send the second identifier and the software registration information to a network server for verification;
[0048] The second judging unit 106 is configured to judge whether the first identifier in the network server is consistent with the first identifier in the software registration information sent, and if yes, replace the network server and the handheld with the second identifier respectively. The first identifier in the software registration information on the device is saved; if not, it prompts that the software has been pirated and stops running.
[0049] As a specific implementation, the correspondence between the first identifier and the serial number ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 