Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for shielding unauthorized users from starting software

A user and non-authorized technology, applied in the direction of internal/peripheral computer component protection, program/content distribution protection, instruments, etc., to avoid illegal reading, ensure security and effectiveness

Inactive Publication Date: 2016-08-17
南京颂歌网络科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, in order to collect software usage fees from users, existing software companies require users to enter the product serial number and key when the software starts to limit the illegal use of the software.
However, there are still great disadvantages in the use of this authorization. For example, hackers or criminals can easily use vulnerability analysis tools, disassembly, DLL injection, serial number registration and other means to destroy, thereby bypassing the normal verification process to start software, so that the security and effectiveness of the software are greatly challenged

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for shielding unauthorized users from starting software
  • Method for shielding unauthorized users from starting software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention provides a method for shielding unauthorized users from starting software, which includes the following steps:

[0041] When the serial number of the network card stored in the external hardware device is the same as that of the current computer, the login interface of the specified software will pop up, otherwise, exit this operation;

[0042] When the user password stored in the remote server is the same as the currently entered user password, it indicates that the current user is an authorized user and can start the specified software; otherwise, count the number of verification failures;

[0043] When the number of consecutive verification failures reaches the preset number of consecutive verification failures, upload the serial number of the network card of the current computer to the blacklist of the remote server.

[0044] Such as figure 1 As shown, the specific steps of the above method are as follows:

[0045] S1. After establishing a co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for preventing an unauthorized user from starting software. The method includes the following steps that when a network card serial number stored in an external hardware device and a network card serial number of a current computer are the same, a specified software logging interface is popped up, and otherwise, the operation is logged out; when a user password stored in a remote server and a user password input at present are the same, it is shown that a current user is an authorized user, and the specified software can be started, and otherwise, the verification failure frequencies are counted; when the continuous verification failure frequency value is equal to a preset continuous verification failure frequency value, the network card serial number of the current computer is uploaded to a blacklist of the remote server. A system for implementing the method comprises the external hardware device and the remote server. According to the method for preventing the unauthorized user from starting the software and the system for implementing the method, after it is determined that the current computer has no binding relation with a USB KEY, the specified software cannot be started, and therefore the safety and the effectiveness of the software are guaranteed.

Description

technical field [0001] The invention relates to a software shielding method, in particular to a method and system for shielding unauthorized users from starting software. Background technique [0002] At present, in order to collect software usage fees from users, existing software companies restrict illegal use of software by requiring users to input product serial numbers and keys when the software is started. However, there are still great disadvantages in the use of this authorization. For example, hackers or criminals can easily use vulnerability analysis tools, disassembly, DLL injection, serial number registration and other means to destroy, thereby bypassing the normal verification process to start software, so that the security and effectiveness of the software are greatly challenged. Contents of the invention [0003] In view of the deficiencies in the above problems, the present invention provides a method for shielding unauthorized use after determining that t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12
CPCG06F21/123G06F21/79G06F2221/2153
Inventor 姚为万宏宇
Owner 南京颂歌网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products