Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for locking application program

An application program and user technology, applied in the field of communication, can solve problems such as effective protection and non-reporting, and achieve the effect of avoiding theft

Inactive Publication Date: 2008-07-23
ZTE CORP
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, no solution has been proposed to provide effective protection for software (applications)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for locking application program
  • Method for locking application program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention is applicable to all mobile terminals with PC-side software

[0026] In this embodiment, a method for locking an application program is provided. The method is applied to a communication environment including a terminal and a device connected to the terminal.

[0027] As shown in Figure 1, the method includes: step S102, when running the application program stored on the terminal, judging whether there is a first unlock code of the application program on the terminal;

[0028] Step S104, in the case of judging that the first unlock code does not exist on the terminal, the terminal generates and stores the first unlock code, and sends the generated first unlock code to the device; judges whether the device has locked the application program, and if the judgment result is no In the case of , go to step 1, otherwise go to step 2:

[0029] Step 1, the device locks the application program, generates a second unlock code, and notifies the user of the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A locking method for application programs comprises judging whether the terminal is provided with a first unlocking code of an application program when running the application program stored in the terminal. If the first unlocking code is absent, the terminal produces and stores a first unlocking code which is then transferred to a device. The method further comprises judging whether the device locks the application program or not, if not, step one is carried out, otherwise step two is executed. Step one includes that the device locks the application program, produces a second unlocking code and informs the second unlocking code to users and executes step two. Step two comprises carrying out authentication treatment to users. If the terminal is provided with a first unlocking code, the method comprises sending the first unlocking code to the device, judging whether the device locks the application program or not, if not, executes step three, otherwise executes step four. Step three includes that the device locks the application program, produces the second unlocking code, informs the second unlocking code to users and executes step four. Step four includes identifying treatment.

Description

technical field [0001] The present invention relates to the communication field, and in particular, to a method for locking an application program. Background technique [0002] In general, application software (program) companies protect the intellectual property rights of their software. When protecting, an important method usually adopted is to add the verification of the software serial number during the use of the software, but the serial number of the software is very easy to leak out, so this commonly used protection method cannot achieve good results. protective effect. [0003] The application software of the mobile terminal is also an intellectual property that needs to be protected. More importantly, if the software of the mobile terminal is not protected, sometimes economic losses will be caused to the user who owns the terminal. The PC-side software of the current communication terminals does not need to input the serial number, mainly because most of the curr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/12
CPCG06F21/125
Inventor 孙晓宇
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products