Method of preoenting software non-authorized use by using network card physical address

A physical address and network card technology, applied in digital data processing parts, electrical components, electrical digital data processing, etc., can solve the problems of computer hardware damage, high failure rate of floppy disk, low security, etc., and achieve simple and convenient use, encryption The effect of low cost and guaranteed safety

Inactive Publication Date: 2006-06-28
左长进
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the additional hardware may cause the original performance of the computer to decline or cause damage to the computer hardware, and the computer may not work properly due to the failure of the additional hardware.
Some software developers use the installation floppy disk to prevent copying. Af...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of preoenting software non-authorized use by using network card physical address
  • Method of preoenting software non-authorized use by using network card physical address

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The invention utilizes the network card and the encryption software to realize the encryption of the software and prevent the software from being copied and installed illegally. The encryption software consists of two parts, one is the encryption software management program, and the other is the encryption software application program. A unified encryption algorithm and password file are used between the two. The management program provides the application program with a password file of the same system after encryption. The application program can be placed in front of the application software (that is, the software to be encrypted and protected) by batch processing commands, or added to the application software by an external call method, or added to the application software by a library function call method. The management program is used by the software developer. Its main function is to pre-authorize and register the client computer, generate a password file accordi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to a method for preventing non-authorized usage of software with MAC address, in which, a software development runner utilizes a ciphered software management program to convert the MAC of the customer end computer to a ciphered code and writes it to a ciphered code file to be provided to the customer, the customer end computer utilizes a ciphered software applied program to convert the local MAC address according to the same ciphered algorithm and compares it with the ciphered code fetched from the ciphered file, if they are the same, then the authorization is successful, which utilizes computer net cards to bind the ciphering applied software and a customer end computer, since each net card has an exclusive physical address in the world and if the address is bound, that means the software is bound onto the exclusive computer.

Description

technical field [0001] The invention relates to a method for preventing unauthorized use of software. Background technique [0002] Illegal copying and installation of software is a problem that plagues software developers. The usual preventive method is to encrypt the software and require the input of the serial number when installing. Although this method has certain effects, the serial number is easy to be cracked. Some software developers use a dongle to encrypt the software, which includes a hardware installed on the parallel port or USB port of the computer and supporting special software, and uses the software to read the logo on the additional hardware to judge whether the hardware exists. The purpose of protection, No. ZL02822040.4 invention patent promptly adopts the above-mentioned method. However, the additional hardware may cause the original performance of the computer to decline or cause damage to the computer hardware, and the computer may not work normally ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F1/00G06F21/12H04L9/00
Inventor 左博左长进
Owner 左长进
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products