Bidirection control method for preventing fraudulent use of client end software

A client software, two-way control technology, applied in electrical components, security devices, radio/induction link selection and arrangement, etc., can solve the problems of illegal activation of client software, no guarantee that the software will not be stolen, loss of profits, etc. To achieve the effect of reducing the possibility of being stolen, reducing the possibility of being stolen, and ensuring security

Inactive Publication Date: 2006-03-29
CHINA MOBILE COMM GRP CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method belongs to the one-way control method on the terminal side, and it cannot guarantee that the software will not be stolen, because the client software on the terminal side can be copied in some way, and the key to activate the client software may be disclosed or cracked, resulting in the illegal activation of the client software, thereby causing loss of interests to users who register the software and software manufacturers who provide the software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bidirection control method for preventing fraudulent use of client end software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] Such as figure 1 Shown is a flowchart of an embodiment of the present invention, including:

[0015] Step 101, the user obtains the client software provided by the network content provider on the mobile communication network side through WAP, and loads the client software into the user's mobile terminal.

[0016] In step 102, the user sends a request to activate the application service of the client software to the mobile communication network side through the telephone manual console.

[0017] Step 103, the mobile communication network side sends configuration information for the user number to the mobile terminal to configure the parameters of the client software, the mobile communication network side generates an activation password corresponding to the configuration information one-to-one, and sends an activation password to the mobile terminal via a text message. password. In this embodiment, the communication mobile network side targets the mobile phone number o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The inventive method consists of: the mobile communication network side receives the userí»s request of switching on the customerí»s end software mounted on the mobile terminal; the mobile communication network side transmits parameter setup information in accordance with the user number to the terminal and generates active cipher for notifying the users; the customer end software recovers the active cipher input by the users and detects if the active cipher corresponds to the setup information, if it does, the customer end software executes activating operation, if it doesní»t, the customer end software doesní»t execute activating operation. The user can take two-way control of activating the software via the active cipher at the terminal side to ensure the activating process. The encrypted means is used, so the invention can reduce the possibility of being stolen of the setup information and the active cipher.

Description

technical field [0001] The invention relates to a bidirectional control method for preventing embezzlement of client software, in particular to a bidirectional control method for preventing embezzlement of mobile terminal client software applied in a mobile communication network. Background technique [0002] With the development of science and technology, the functions of mobile terminals such as mobile phones as personal communication tools are increasingly enhanced, and can meet more and more user needs. Based on these user needs, some content providers on the mobile communication network side can provide software with certain functions to activate some network services, but these software may be stolen, so "one machine, one piece" is guaranteed, that is, one mobile phone corresponds to one Software is very necessary, which is convenient for maintaining the interests of operators, software developers and users. [0003] In the prior art, after downloading software throug...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04W12/126H04W12/37
Inventor 赵立君郑朝晖范晓晖林智
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products