Unlock instant, AI-driven research and patent intelligence for your innovation.

A method of burning digital product key

A digital product and key technology, which is applied in the field of burning digital product keys, can solve the problem that the specific reasons for burning failure cannot be recorded, and achieve the effect of improving reliability, improving ability and improving efficiency

Active Publication Date: 2021-01-08
SHENZHEN 3NOD INFORMATION TECH
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to propose a method for burning digital product keys in order to solve the problem that the specific reasons for burning failure cannot be recorded in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of burning digital product key
  • A method of burning digital product key
  • A method of burning digital product key

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0031] refer to figure 1 .

[0032] In step S1, a key is selected from the key storehouse to be burned, and the key is assigned to the key to be written; After selecting a key from top to bottom in the recording key storehouse, the key is assigned to the key to be written, and the key to be written can temporarily record the current key value, and then enter step S2.

[0033] In step S2, burn the key to be written to the main board. Go to step S3 after burning.

[0034] In step S3, move the key to be written from the key storehouse to be burned to the key storehouse that has been burned; the key storehouse to be burned only saves the key that has not been burned to the mainboard, when a key is After recording to the mainboard, it must be moved from the keystore to be burned to the keystore that has been burned to avoid repeated burning. Go to step S4 after completing step S3.

[0035] In step S4, the key is read from the mainboard, and the read key is matched with the key...

no. 2 example

[0038] refer to figure 2 . The difference between this embodiment and the first embodiment is:

[0039] Step S0 is also included before step S1: establish an original key storehouse, and the original key storehouse stores all keys;

[0040] Reading the key from the digital product in step S4 is specifically: if the key that has been burned can be read from the digital product, then continue to perform the operation; if the key that has been burned can not be read from the digital product key, read the key to be written.

[0041] Step S0: Create the original key store, which stores all the keys; initially, the original key store stores all the keys to be burned, the system works normally, the key store to be burned and the burned keys The keys added to the store are always the same as the keys of the original key store.

[0042] After executing steps S1, S2, and S3, go to step S4, refer to image 3 , step S4 specifically includes:

[0043]If the key that has been burned ...

no. 3 example

[0047] The difference between this embodiment and the first embodiment is that the number of keystores to be burned and the number of keystores burned are both N, and N is greater than or equal to two. This embodiment also has the beneficial effects of the second embodiment, and this embodiment is suitable for burning keys for multiple motherboards at the same time, which improves the burning efficiency.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for burning a secret key of a digital product. The method comprises the following steps that a secret key is selected from a secret key library to be burned, and a secret key to write is assigned with the selected secret key; the secret key to write is burned in the digital product; the secret key to write is moved to a burned secret key library from the secret keylibrary to be burned; and the secret key is read from the digital product, the read secret key matches secret keys in the burned secret key library, and if matching fails, the read secret key matchessecret keys in the secret key library to be burned then. Thus, concrete conditions of burning failure can be recorded, and abnormity can be eliminated subsequently.

Description

technical field [0001] The invention relates to the field of burning, in particular to a method for burning digital product keys. Background technique [0002] DPK (Digital Product Key, digital product key) file is used to activate WINDOWS and OFFICE software. It is necessary to burn the key in the DPK file to the digital product. It must be implemented before the production line is shipped, and it must be implemented when after-sales spare parts (spare parts) are provided to end users. [0003] The existing burning method records the success and failure status of the key burning. Among them, the key burning failure can only be simply recorded as failure, but the specific reason for the burning failure cannot be recorded, so as to provide follow-up abnormal troubleshooting work cause inconvenience. Contents of the invention [0004] The purpose of the present invention is to solve the problem in the prior art that the specific reasons for burning failure cannot be record...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K1/12G06F21/12
CPCG06F21/121G06K1/12
Inventor 黄振宗
Owner SHENZHEN 3NOD INFORMATION TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More