Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cipher key generating method and system for enrollment code and login method and system for software

A key generation and registration code technology, applied in electrical components, user identity/authority verification, radio/induction link selection and arrangement, etc., can solve the problems of little significance, inability to effectively protect software products, etc., and it is difficult to modify Effect

Active Publication Date: 2008-02-06
SHENZHEN TRANSSION HLDG CO LTD
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is a problem in introducing a registration code verification mechanism for software running on mobile terminals, that is, how to generate the registration algorithm, if the registration code is generated according to the owner information, and since the owner information itself can be modified in the machine, so for a The registration code of the mobile terminal can also be used on another mobile terminal, just modify the owner information to be the same
Since the original plaintext used to generate the registration code can be modified, the registration mechanism itself is of little significance and cannot achieve the purpose of effectively protecting software products

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher key generating method and system for enrollment code and login method and system for software
  • Cipher key generating method and system for enrollment code and login method and system for software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0027] Referring to Fig. 1, the method for registering the software running in the terminal provided by the first embodiment of the present invention includes the following steps:

[0028] A1. Receive the registration code input by the user, and the key generation of the registration code includes the following steps:

[0029] A11. The terminal running the software obtains the identification code of the terminal;

[0030] A12. Encrypt the identification code into a key;

[0031] A13. Prompt the key to the user, so that the user can provide the key to the software provider, and the software provid...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method and system for generating cipher key of a registered code and a method and system for registering software. The registered method of the software includes the following steps: receive a registered code input by user; and then acquire a cipher key encrypted with an identity code of a terminal, and convert the cipher key into the registered code; finally, judge whether the registered code input by user is the same as the registered code transferred from the cipher key. If so, the software is registered successfully; otherwise, the registration is failed. The present invention is capable of generating stable and effective cipher keys and registered codes to protect software products.

Description

technical field [0001] The invention belongs to the field of software, and in particular relates to a registration code key generation method and system, and a software registration method and system. Background technique [0002] At present, with the development and maturity of mobile terminal operating systems, some representative operating systems have gradually emerged, such as Symbian, Windows Mobile, Linux, Palm, etc., among which Symbian and Windows Mobile are far ahead in the market share of smart mobile terminals , due to the openness of these operating systems, there are a wide variety of games and application software customized for them, covering all aspects, so that software products developed by an OEM supplier or an individual can run on a specific platform, and can also be used in Therefore, how to protect their software from being used by unauthorized manufacturers or others on these platforms has become a concern of software developers. [0003] On the exi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04Q7/38H04L9/32H04W60/00
Inventor 吴佳良燕青洲
Owner SHENZHEN TRANSSION HLDG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products