Supercharge Your Innovation With Domain-Expert AI Agents!

Shutdown restoration method

A recovery method and shutdown technology, applied in computer security devices, program/content distribution protection, digital data authentication, etc., can solve problems such as being easily deciphered, and achieve the effect of avoiding embezzlement

Inactive Publication Date: 2017-05-10
陈勇
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] After a long time, it is easy to be deciphered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0011] A shutdown recovery method further characterized by redoing the application procedure.

[0012] This embodiment is further set to:

[0013] The above-mentioned re-application procedure is to re-apply, and this time the application is carried out according to the new application procedure.

[0014] working principle:

[0015] If you fail to handle the shutdown verification well, the software will change the password in due course, and the user will no longer be able to use it; you need to re-apply according to the new application procedure, and use it after obtaining the password.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of software, in particular to a shutdown restoration method. When shutdown verification cannot be properly tackled, the software will timely change a password, and thus a user cannot use the software anymore; application and transaction are needed according to a new applying program, after the password is obtained, the software can be reused, and thus embezzlement and piracy are avoided.

Description

technical field [0001] The invention relates to the field of software, in particular to a shutdown recovery method. Background technique [0002] Encrypting the overall software is something every software company must do, and this password should be easy to decipher. [0003] The corresponding process is also encrypted, so it is safer. [0004] After a long time, it is easy to be deciphered. Contents of the invention [0005] The purpose of the present invention is: through the present invention, avoid embezzlement, piracy. [0006] A shutdown recovery method further characterized by re-doing the application procedure; [0007] The above-mentioned re-application procedure is to re-apply, and this time the application is carried out according to the new application procedure. [0008] Beneficial effects: if the verification is not properly handled, the software will change the password in due course, and the user can no longer use it; it is necessary to re-apply accord...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/46
CPCG06F21/121G06F21/46
Inventor 陈勇
Owner 陈勇
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More