Method and unit for authenticating keys
A detection device and software technology, which is applied in the field of key identification methods and identification devices, can solve the problems of no guarantee, the availability of software storage media, and the high price of software storage media, and achieve the effect of improving reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 2
[0071] Fig. 2 is a system overall structure diagram of the application key authentication device.
[0072] The system has a communication modem connected with the software copying device, and connects the software copying device and the center 4 through a communication line.
[0073] In addition, in this preferred embodiment, for the sake of simplicity, the encoding software is usually stored in a CD-ROM, of course, these software can also be obtained as communication information.
[0074] Structure of software copying device
[0075] In this figure, the transmit-receive circuit 6 is an implemented module within the present invention. In this embodiment, the sending-receiving circuit 6 can be in the form of a board or a card, and it can be installed in the software duplication device in a fixed manner, or it can be an IC card, which can be arbitrarily installed in the card slot of the software duplication device. dismantle. The sending-receiving circuit 6 is installed in th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 