Method and device for shielding unauthorized users from starting software

A user-unauthorized technology, applied in computer security devices, internal/peripheral computer component protection, program/content distribution protection, etc., to ensure security and effectiveness, and avoid illegal reading

Active Publication Date: 2016-09-14
贵州灵劲科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, in order to collect software usage fees from users, existing software companies require users to enter the product serial number and key when the software starts to limit the illegal use of the software.
However, there are still great disadvantages in the use of this authorization. For example, hackers or criminals can easily use vulnerability analysis tools, disassembly, DLL injection, serial number registration and other means to destroy, thereby bypassing the normal verification process to start software, so that the security and effectiveness of the software are greatly challenged

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for shielding unauthorized users from starting software
  • Method and device for shielding unauthorized users from starting software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] like figure 1 As shown, the present invention provides a device for shielding unauthorized users from starting software. In this embodiment, the device is a USBKEY, which mainly includes a main control chip 1, a memory 2 and a pressure sensor 3 respectively connected to it. , data interface 4, counting module 5 of times of verification failures.

[0034] The data interface is a USB Mini interface. When the USBKEY establishes a connection relationship with the computer for the first time, the transmission obtains the computer MAC address through the driver software in the computer. When the USBKEY establishes a connection relationship with other computers, the transmission obtains the current computer MAC address through the driver software in the current computer. In addition, when the current computer MAC address is the same as the original computer MAC address stored in the memory, it is used to transmit the currently input user password to the USBKEY.

[0035] The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a device used for preventing an unauthorized user from starting software. The device comprises a data interface, a storage and a main control chip. The data interface is used for transmitting obtained MAC addresses of a computer and input user passwords. The storage is used for storing system files, storing the MAC address and an account name which are obtained when the device is connected with the computer at the first time and storing the user password input at the first time. The main control chip is used for conducting verification on the obtained current MAC address of the computer and the original MAC address obtained at the first time and conducting verification on the current input user password and the original user password input at the first time and executes related operations according to verification results. A method with the device adopted comprises the steps that if the obtained current MAC address of the computer is the same as the original computer MAC address obtained at the first time, a user password input window is popped up; if the current input user password is the same as the original user password input at the first time, software is started. According to the method and device for preventing the unauthorized user from starting the software, after it is determined that the current computer is not bonded with a USERKEY, the specific software cannot be started so as to guarantee the safety and the effectiveness of the software.

Description

technical field [0001] The invention relates to a shielding method, in particular to a method and device for shielding unauthorized users from starting software. Background technique [0002] At present, in order to collect software usage fees from users, existing software companies restrict illegal use of software by requiring users to input product serial numbers and keys when the software is started. However, there are still great disadvantages in the use of this authorization. For example, hackers or criminals can easily use vulnerability analysis tools, disassembly, DLL injection, serial number registration and other means to destroy, thereby bypassing the normal verification process to start software, so that the security and effectiveness of the software are greatly challenged. Contents of the invention [0003] In view of the deficiencies in the above problems, the present invention provides a method for shielding unauthorized use after determining that the curren...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12
CPCG06F21/123G06F21/79G06F2221/2153
Inventor 姚为万宏宇
Owner 贵州灵劲科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products