Shutdown restoration method
A recovery method and shutdown technology, applied in computer security devices, program/content distribution protection, digital data authentication, etc., can solve problems such as being easily deciphered, and achieve the effect of avoiding embezzlement
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
specific Embodiment
[0011] A shutdown recovery method further characterized by redoing the application procedure.
[0012] This embodiment is further set to:
[0013] The above-mentioned re-application procedure is to re-apply, and this time the application is carried out according to the new application procedure.
[0014] working principle:
[0015] If you fail to handle the shutdown verification well, the software will change the password in due course, and the user will no longer be able to use it; you need to re-apply according to the new application procedure, and use it after obtaining the password.
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com