Shutdown restoration method
A recovery method and shutdown technology, applied in computer security devices, program/content distribution protection, digital data authentication, etc., can solve problems such as being easily deciphered, and achieve the effect of avoiding embezzlement
Inactive Publication Date: 2017-05-10
陈勇
View PDF0 Cites 0 Cited by
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
[0004] After a long time, it is easy to be deciphered
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreExamples
Experimental program
Comparison scheme
Effect test
specific Embodiment
[0011] A shutdown recovery method further characterized by redoing the application procedure.
[0012] This embodiment is further set to:
[0013] The above-mentioned re-application procedure is to re-apply, and this time the application is carried out according to the new application procedure.
[0014] working principle:
[0015] If you fail to handle the shutdown verification well, the software will change the password in due course, and the user will no longer be able to use it; you need to re-apply according to the new application procedure, and use it after obtaining the password.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More PUM
Login to View More Abstract
The invention relates to the field of software, in particular to a shutdown restoration method. When shutdown verification cannot be properly tackled, the software will timely change a password, and thus a user cannot use the software anymore; application and transaction are needed according to a new applying program, after the password is obtained, the software can be reused, and thus embezzlement and piracy are avoided.
Description
technical field [0001] The invention relates to the field of software, in particular to a shutdown recovery method. Background technique [0002] Encrypting the overall software is something every software company must do, and this password should be easy to decipher. [0003] The corresponding process is also encrypted, so it is safer. [0004] After a long time, it is easy to be deciphered. Contents of the invention [0005] The purpose of the present invention is: through the present invention, avoid embezzlement, piracy. [0006] A shutdown recovery method further characterized by re-doing the application procedure; [0007] The above-mentioned re-application procedure is to re-apply, and this time the application is carried out according to the new application procedure. [0008] Beneficial effects: if the verification is not properly handled, the software will change the password in due course, and the user can no longer use it; it is necessary to re-apply accord...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More Application Information
Patent Timeline
Login to View More Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/46
CPCG06F21/121G06F21/46
Inventor 陈勇
Owner 陈勇