System copyright activation method

A copyright and activation code technology, applied in the transmission system, digital transmission system, digital data authentication, etc., can solve the problems of preventing copyright infringement, wasting the company's manpower, material resources and financial resources, and making it difficult to achieve one code for one machine, so as to prevent effects of abuse

Pending Publication Date: 2022-03-08
KYLIN CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Non-professional factors interfere too much in the traditional copyright protection method, which greatly wastes the company's manpower, material resources and financial resources, and the effect is not good. When the copyright is infringed, it often adopts the method of post-mortem investigation and post-event rights protection. The method cannot technically prevent the occurrence of copyright infringement incidents
[0004] (2) The traditional copyright protection method does not control the intermediary well. The process of intermediary agency is often a link with high incidence of infringement incidents. If the intermediary is given the authority to issue activation codes, it is difficult to control the activation code issued by the intermediary. number; if the intermediary is not given permission to send the activation code, it will lead to inflexible product sales
[0005] (3) The traditional system copyright activation method is difficult to achieve one code for one machine, and the traditional activation code activation method is difficult to achieve one code for one machine. Often, one activation code can be used on different machines, which greatly improves the Damaged the rights and interests of the system issuer
[0006] (4) Traditional system copyright activation method When the system is reinstalled, it is necessary to record the activation code before the system reinstallation, so as to use this activation code to activate the system after reinstalling the system. It is very easy to lose or record the activation code incorrectly, resulting in the activation code not being used on the newly installed system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System copyright activation method
  • System copyright activation method
  • System copyright activation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the specific embodiments and the accompanying drawings. It should be understood that these descriptions are exemplary only and are not intended to limit the scope of the invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concepts of the present invention.

[0061] like figure 1 , in the embodiment of the present application, the present invention provides a system copyright activation method, the method includes the steps:

[0062] S1: Obtain the activation requirements of the machine to be authorized;

[0063] In the embodiment of the present application, the activation requirement of the machine to be authorized may be a code instruction or a preset action, such as connecting the machine t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system copyright activation method. The method comprises the following steps: acquiring an activation demand of a to-be-authorized machine; generating a point file; acquiring machine feature information of the to-be-authorized machine; and authorizing a server to adopt a preset activation action according to the point file and the local feature. According to the system copyright activation method provided by the invention, copyright protection is realized without artificial participation based on a software control mode, the activation process can be realized in a middleman agent stage, and the number of activation codes issued by a middleman is controlled through an asymmetric encryption algorithm mode; in addition, by means of binding the characteristics of the activated machine, one-machine-one-code real purpose is achieved, and the situation that the activation code is abused is prevented.

Description

technical field [0001] The invention belongs to the technical field of system copyright activation, and in particular relates to a system copyright activation method. Background technique [0002] At present, there are many defects in the existing system copyright activation scheme, which makes the system publisher face a difficult dilemma, as follows: [0003] (1) There are some protection schemes for system copyright and software copyright in the prior art, and these technologies also rely on activation codes to realize the protection of system copyright or software copyright. In the traditional copyright protection method, the non-professional factors intervene too much, which greatly wastes the company's manpower, material resources and financial resources, and the effect is not good. When the copyright is violated, the method of post-event investigation and post-event rights protection is often adopted. The method cannot technically prevent the occurrence of copyright ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/44G06F21/60H04L9/40
CPCG06F21/44G06F21/602H04L63/0876
Inventor 张宗辉李蕾张超刘明
Owner KYLIN CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products