CN103942473A - Method used for preventing unauthorized user from starting software and system thereof - Google Patents

Method used for preventing unauthorized user from starting software and system thereof Download PDF

Info

Publication number
CN103942473A
CN103942473A CN201410147074.8A CN201410147074A CN103942473A CN 103942473 A CN103942473 A CN 103942473A CN 201410147074 A CN201410147074 A CN 201410147074A CN 103942473 A CN103942473 A CN 103942473A
Authority
CN
China
Prior art keywords
sequence number
network interface
external hardware
hardware unit
interface card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410147074.8A
Other languages
Chinese (zh)
Other versions
CN103942473B (en
Inventor
姚为
宋华彪
万宏宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing SongGe Network Technology Co., Ltd
Original Assignee
Beijing Leader Tech Digtal Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Leader Tech Digtal Technology Co Ltd filed Critical Beijing Leader Tech Digtal Technology Co Ltd
Priority to CN201410147074.8A priority Critical patent/CN103942473B/en
Publication of CN103942473A publication Critical patent/CN103942473A/en
Application granted granted Critical
Publication of CN103942473B publication Critical patent/CN103942473B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a method for preventing an unauthorized user from starting software. The method includes the following steps that when a network card serial number stored in an external hardware device and a network card serial number of a current computer are the same, a specified software logging interface is popped up, and otherwise, the operation is logged out; when a user password stored in a remote server and a user password input at present are the same, it is shown that a current user is an authorized user, and the specified software can be started, and otherwise, the verification failure frequencies are counted; when the continuous verification failure frequency value is equal to a preset continuous verification failure frequency value, the network card serial number of the current computer is uploaded to a blacklist of the remote server. A system for implementing the method comprises the external hardware device and the remote server. According to the method for preventing the unauthorized user from starting the software and the system for implementing the method, after it is determined that the current computer has no binding relation with a USB KEY, the specified software cannot be started, and therefore the safety and the effectiveness of the software are guaranteed.

Description

Person starts method and the system thereof of software to be used for shielding unauthorized use
Technical field
The present invention relates to a kind of software masking method, especially a kind of method and system thereof that starts software for the person that shields unauthorized use.
Background technology
At present, existing software company, in order to collect software application expense to user, requires the mode of user's input product sequence number and key to carry out the illegal use of restricted software in software startup.But still there is very large drawback in the use-pattern of this mandate, for example, hacker or lawless person are easy to destroy by means such as leak analysis instrument, dis-assembling, DLL injection, sequence number registrations, thereby walk around normal checking flow process to start software, thereby make the security of software and validity be subject to very large challenge.
Summary of the invention
For the weak point existing in the problems referred to above, the invention provides a kind of after definite current computer and USBKEY are without binding relationship, can not open designated software, start method and the system thereof of software with what ensure the security of software and validity for the person that shields unauthorized use.
For achieving the above object, the invention provides a kind of method that starts software for the person that shields unauthorized use, comprise the following steps:
In the time that the network interface card sequence number of the network interface card sequence number of storing in external hardware unit and current computer is identical, eject the log-in interface of designated software, otherwise, exit this operation;
In the time that the user password of the user password of storing in remote server and current input is identical, show that active user is authorized user, can start designated software, otherwise, the number of times of verification failure is added up;
In the time that continuous verification frequency of failure value reaches default continuous verification frequency of failure value, the network interface card sequence number of current computer is uploaded in the blacklist of remote server.
The above-mentioned method that starts software for the person that shields unauthorized use, wherein, the concrete steps of said method are as follows:
A, after external hardware unit and current computer connect, send current computer network interface card sequence number by the external hardware unit drive software being arranged in current computer to it;
B, the former computer network interface card sequence number of storing in current computer network interface card sequence number and external hardware unit is carried out to verification, if check results is that the two is identical, eject the log-in interface of designated software, if check results is the two difference, ejecting prompting has the interface of illegal operation, exits this operation;
C, in current log-in interface, input user password;
D, external hardware unit obtain the user password of current input, and are uploaded to remote server,
E, remote server carry out verification to the authorized user password of active user's password and its storage, if check results is that the two is identical, show that active user is authorized user, can start designated software, if check results is the two difference, ejecting prompting has user password mistake, the interface of re-entering, and the number of times of verification failure is added up;
F, in the time that the continuous verification frequency of failure of user password value reaches default continuous verification frequency of failure value, external hardware unit is uploaded to the network interface card sequence number of current computer in the blacklist of remote server.
The above-mentioned method that starts software for the person that shields unauthorized use wherein, also comprised the steps: before step a
External hardware unit, after establishing a connection with computer first, obtains the network interface card sequence number of this computer;
By the network interface card sequence number burning getting in the storer of external hardware unit;
Current computer is identified the external hardware unit being plugged in its USB interface, if recognition result is yes, carries out subsequent operation, if recognition result is no, exits this operation.
The above-mentioned method that starts software for the person that shields unauthorized use, wherein, if the quantity of the external hardware unit that current computer is identified is greater than at 1 o'clock, selected one operates relevant external hardware unit with this.
The present invention also provides a kind of system that starts software for the person that shields unauthorized use, comprising:
External hardware unit, after connecting with current computer, carries out verification to the current computer network interface card sequence number obtaining and the former network interface card sequence number obtaining first, and current computer network interface card sequence number is uploaded to remote server;
Remote server, receive the user password of the current input being sent by external hardware unit, and itself and the authorized user password of storage are carried out to verification, when reach default continuous verification frequency of failure value when the continuous verification frequency of failure of user password value, the current computer network interface card sequence number receiving is stored in blacklist.
Above-mentioned system, wherein, described external hardware unit is USBKEY, comprising:
Data-interface, for transmitting the computer network interface card sequence number obtaining and the user password of input;
Storer, for storage system file, and computer network interface card sequence number and the name on account obtained while being connected with computer first;
Main control chip, for the current computer MAC Address of obtaining and the user password of the former MAC Address of obtaining first and current input and original subscriber's password of input are first carried out to verification, and carries out associative operation according to check results;
Communication module, for sending the user password of current input and the network interface card sequence number of current computer to remote server.
Above-mentioned system, wherein, described external hardware unit also comprises the circuit board of housing and the portion that sets within it, and is solidificated in the pressure transducer on described circuit board, described pressure transducer is connected with described main control chip.
Above-mentioned system wherein, is provided with one and contacts with the top surface of described pressure transducer, to produce the projection of pressure signal in described housing.
Above-mentioned system, wherein, described main control chip is solidificated on described circuit board, and be connected with described pressure transducer by I/O interface, real-time pressure signal is detected, if when current pressure signal is less than preset pressure signal, main control chip is deleted the system file of storing in storer, so that device cannot start.
Above-mentioned system, wherein, described remote server comprises password verification frequency of failure statistic unit, add up for the user password to current input and the number of times of the continuous verification failure of authorized user password, in the time that the continuous verification frequency of failure of active user's password value reaches the default continuous verification frequency of failure of user password value, described main control chip formats processing to described storer.
Compared with prior art, the present invention has the following advantages:
1, the present invention sets up man-to-man binding relationship by computer MAC Address and the computer stored first, after definite current computer and USBKEY are without binding relationship, cannot eject the user password input window of software, and USBKEY and current computer cannot carry out data interaction, to ensure security and the validity of software;
2, when the continuous verification number of times of MAC Address is connected verification number of times and reaches respectively default number of times with user password, main control chip can be deleted system file and relevant information in storer, to avoid data and program in storer illegally to be read;
3, owing to being provided with pressure detection part at USBKEY, in the time that USBKEY is illegally dismantled, main control chip, after detecting that pressure signal occurs significantly to change, can be deleted rapidly system file and relevant information in storer, to avoid data and program in storer illegally to be read.
Brief description of the drawings
Fig. 1 is the process flow diagram of method part in the present invention;
Fig. 2 is the structured flowchart of components of system as directed in the present invention.
The current computer of the external hardware unit 2-of 1-
3-remote server
Embodiment
The invention provides a kind of method that starts software for the person that shields unauthorized use, comprise the following steps:
In the time that the network interface card sequence number of the network interface card sequence number of storing in external hardware unit and current computer is identical, eject the log-in interface of designated software, otherwise, exit this operation;
In the time that the user password of the user password of storing in remote server and current input is identical, show that active user is authorized user, can start designated software, otherwise, the number of times of verification failure is added up;
In the time that continuous verification frequency of failure value reaches default continuous verification frequency of failure value, the network interface card sequence number of current computer is uploaded in the blacklist of remote server.
As shown in Figure 1, the concrete steps of said method are as follows:
S1, after external hardware unit and current computer establish a connection, send current computer network interface card sequence number by the external hardware unit drive software being arranged in current computer to it.
Before step S1 implements, further comprising the steps of:
External hardware unit is plugged in the USB interface of current computer, judges that can the external hardware unit drive software of installing in current computer identify it, if recognition result is yes, carry out subsequent operation, if recognition result is no, exit this operation;
If the quantity of the external hardware unit that the external hardware unit drive software in current computer recognizes is greater than at 1 o'clock, selected external hardware unit relevant to this operation.
In addition, the former computer network interface card sequence number of storing in external hardware unit, for external hardware unit is in the time establishing a connection with computer first, obtains and the former computer network interface card sequence number of burning in storer by external hardware unit drive software.
S2, the former computer network interface card sequence number of storing in current computer network interface card sequence number and external hardware unit is carried out to verification, if check results is that the two is identical, perform step S3, eject the log-in interface of designated software, input user password; If check results is the two difference, perform step S4, ejecting prompting has the interface of illegal operation, exits this operation.
S4, external hardware unit obtain the user password of current input, and are uploaded to remote server.
S5, remote server are being received after the user password of current input, itself and the authorized user password of storage are carried out to verification, if check results is that the two is identical, perform step S6, show that active user is authorized user, behind initializers interface, start designated software; If check results is the two difference, perform step S7, ejecting prompting has user password mistake, the interface of re-entering, and the number of times of verification failure is added up simultaneously.
S8, judge whether the continuous verification frequency of failure of user password value reaches default continuous verification frequency of failure value, if check results is yes, performs step S9, to external hardware unit feedback information, is sent the network interface card sequence number of current computer; If check results is no, carries out and return to execution step S4.
S10, external hardware unit receiving feedback information, and the network interface card sequence number of current computer is uploaded to keeping records in the blacklist of remote server.
In above-mentioned steps, external hardware unit is in the time sending information to remote server, and this information can be bound with the sequence number of this external hardware unit before transmission, to form packet.Remote server is resolved it receiving packet, find the corresponding data link table of storing in database according to the sequence number of external hardware unit, the network interface card sequence number of the wrong user password that store the user password of mandate in this data link table, is sent by this external hardware unit and the current computer of being uploaded by it.
As shown in Figure 2, the present invention also provides a kind of system that starts software for the person that shields unauthorized use, comprises external hardware unit 1 and remote server 3.
External hardware unit 1, after connecting with current computer, carries out verification to the current computer network interface card sequence number obtaining and the former network interface card sequence number obtaining first, and current computer network interface card sequence number is uploaded to remote server.
External hardware unit is USBKEY, comprises main control chip and coupled storer, pressure transducer, data-interface and the communication module of difference.
Data-interface is for transmitting the computer network interface card sequence number obtaining and the user password of input.
Storer is for storage system file, and computer network interface card sequence number and the name on account obtained while being connected with computer first.The former computer network interface card sequence number of storing in external hardware unit, for external hardware unit is in the time establishing a connection with computer first, obtains and the former computer network interface card sequence number of burning in storer by external hardware unit drive software.
Main control chip is used for the current computer MAC Address of obtaining and the user password of the former MAC Address of obtaining first and current input and original subscriber's password of input first to carry out verification, and carries out the main control chip of associative operation according to check results.
Communication module, for sending the user password of current input and the network interface card sequence number of current computer to remote server.
Housing is made up of top shell and drain pan, is provided with a projection extending to its opposite side in the inside of top shell, and the bottom end face of this projection contacts with the top surface of pressure transducer, to produce pressure signal.Main control chip is solidificated on circuit board, and be connected with pressure transducer by I/O interface, to receive the real-time pressure signal of pressure transducer input, and real-time pressure signal is detected, if when current pressure signal is less than preset pressure signal, main control chip is deleted the system file of storing in storer, so that device cannot start.
By the projection that has increased pressure transducer in enclosure interior and matched with it, therefore, in the time that the housing being made up of top shell and drain pan is interlocked, thereby projection contacts with pressure transducer and produces pressure, is solidificated in the pressure signal that the main control chip on circuit board produces by I/O interface detected pressures sensor.In the time that housing remains intact state, main control chip can normally detect pressure signal, and therefore, the system in USBKEY can keep normal duty.In the time that housing is separated, projection also no longer contacts with pressure transducer, cannot produce pressure signal.Because main control chip cannot detect the pressure signal that pressure transducer produces, therefore, main control chip starts self-destruction program, and the system file in storer is deleted, to avoid data and program in storer illegally to be read, and USBKEY cannot normally be worked.
Remote server, receive the user password of the current input being sent by external hardware unit, and itself and the authorized user password of storage are carried out to verification, when reach default continuous verification frequency of failure value when the continuous verification frequency of failure of user password value, the current computer network interface card sequence number receiving is stored in blacklist.
Remote server comprises password verification frequency of failure statistic unit, add up for the user password to current input and the number of times of the continuous verification failure of authorized user password, in the time that the continuous verification frequency of failure of active user's password value reaches the default continuous verification frequency of failure of user password value, main control chip formats processing to storer.
The foregoing is only preferred embodiment of the present invention, is only illustrative for invention, and nonrestrictive.Those skilled in the art is understood, and in the spirit and scope that limit, can carry out many changes to it in invention claim, amendment, and even equivalence, but all will fall within the scope of protection of the present invention.

Claims (10)

1. a method that starts software for the person that shields unauthorized use, comprises the following steps:
In the time that the network interface card sequence number of the network interface card sequence number of storing in external hardware unit and current computer is identical, eject the log-in interface of designated software, otherwise, exit this operation;
In the time that the user password of the user password of storing in remote server and current input is identical, show that active user is authorized user, can start designated software, otherwise, the number of times of verification failure is added up;
In the time that continuous verification frequency of failure value reaches default continuous verification frequency of failure value, the network interface card sequence number of current computer is uploaded in the blacklist of remote server.
2. the method that starts software for the person that shields unauthorized use according to claim 1, is characterized in that, the concrete steps of said method are as follows:
A, after external hardware unit and current computer connect, send current computer network interface card sequence number by the external hardware unit drive software being arranged in current computer to it;
B, the former computer network interface card sequence number of storing in current computer network interface card sequence number and external hardware unit is carried out to verification, if check results is that the two is identical, eject the log-in interface of designated software, if check results is the two difference, ejecting prompting has the interface of illegal operation, exits this operation;
C, in current log-in interface, input user password;
D, external hardware unit obtain the user password of current input, and are uploaded to remote server,
E, remote server carry out verification to the authorized user password of active user's password and its storage, if check results is that the two is identical, show that active user is authorized user, can start designated software, if check results is the two difference, ejecting prompting has user password mistake, the interface of re-entering, and the number of times of verification failure is added up;
F, in the time that the continuous verification frequency of failure of user password value reaches default continuous verification frequency of failure value, external hardware unit is uploaded to the network interface card sequence number of current computer in the blacklist of remote server.
3. the method that starts software for the person that shields unauthorized use according to claim 2, is characterized in that, before step a, also comprises the steps:
External hardware unit, after establishing a connection with computer first, obtains the network interface card sequence number of this computer;
By the network interface card sequence number burning getting in the storer of external hardware unit;
Current computer is identified the external hardware unit being plugged in its USB interface, if recognition result is yes, carries out subsequent operation, if recognition result is no, exits this operation.
4. the method that starts software for the person that shields unauthorized use according to claim 3, is characterized in that, if the quantity of the external hardware unit that current computer is identified is greater than at 1 o'clock, selected one operates relevant external hardware unit with this.
5. implement, according to starting the system of the method for software for the person that shields unauthorized use described in claim 4, to it is characterized in that, comprising:
External hardware unit, after connecting with current computer, carries out verification to the current computer network interface card sequence number obtaining and the former network interface card sequence number obtaining first, and current computer network interface card sequence number is uploaded to remote server;
Remote server, receive the user password of the current input being sent by external hardware unit, and itself and the authorized user password of storage are carried out to verification, when reach default continuous verification frequency of failure value when the continuous verification frequency of failure of user password value, the current computer network interface card sequence number receiving is stored in blacklist.
6. system according to claim 5, is characterized in that, described external hardware unit is USBKEY, comprising:
Data-interface, for transmitting the computer network interface card sequence number obtaining and the user password of input;
Storer, for storage system file, and computer network interface card sequence number and the name on account obtained while being connected with computer first;
Main control chip, for the current computer MAC Address of obtaining and the user password of the former MAC Address of obtaining first and current input and original subscriber's password of input are first carried out to verification, and carries out associative operation according to check results;
Communication module, for sending the user password of current input and the network interface card sequence number of current computer to remote server.
7. system according to claim 6, it is characterized in that, described external hardware unit also comprises the circuit board of housing and the portion that sets within it, and is solidificated in the pressure transducer on described circuit board, and described pressure transducer is connected with described main control chip.
8. system according to claim 7, is characterized in that, is provided with one and contacts with the top surface of described pressure transducer, to produce the projection of pressure signal in described housing.
9. system according to claim 8, it is characterized in that, described main control chip is solidificated on described circuit board, and be connected with described pressure transducer by I/O interface, real-time pressure signal is detected, if when current pressure signal is less than preset pressure signal, main control chip is deleted the system file of storing in storer, so that device cannot start.
10. system according to claim 5, it is characterized in that, described remote server comprises password verification frequency of failure statistic unit, add up for the user password to current input and the number of times of the continuous verification failure of authorized user password, in the time that the continuous verification frequency of failure of active user's password value reaches the default continuous verification frequency of failure of user password value, described main control chip formats processing to described storer.
CN201410147074.8A 2014-04-14 2014-04-14 The method starting software for the person that shields unauthorized use Expired - Fee Related CN103942473B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410147074.8A CN103942473B (en) 2014-04-14 2014-04-14 The method starting software for the person that shields unauthorized use

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410147074.8A CN103942473B (en) 2014-04-14 2014-04-14 The method starting software for the person that shields unauthorized use

Publications (2)

Publication Number Publication Date
CN103942473A true CN103942473A (en) 2014-07-23
CN103942473B CN103942473B (en) 2016-08-17

Family

ID=51190141

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410147074.8A Expired - Fee Related CN103942473B (en) 2014-04-14 2014-04-14 The method starting software for the person that shields unauthorized use

Country Status (1)

Country Link
CN (1) CN103942473B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105184116A (en) * 2015-06-19 2015-12-23 昆山博威泰克电子科技有限公司 Intelligent equipment software encryption and personal authentication device and method
CN109214187A (en) * 2017-06-29 2019-01-15 龙芯中科技术有限公司 A kind of method, apparatus and electronic equipment controlling computer starting
CN117472035A (en) * 2023-12-27 2024-01-30 东方电气风电股份有限公司 Verification method for software and hardware of main control system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1431591A (en) * 2003-01-29 2003-07-23 西安海星现代科技股份有限公司 Dynamic password identity authentication system applicable to network based on software token
US20090019530A1 (en) * 2007-07-12 2009-01-15 Keeler James D Device-Specific Authorization at Distributed Locations
CN101599192A (en) * 2009-04-24 2009-12-09 北京华大智宝电子系统有限公司 Realize the method for security guard of bank card
CN101741562A (en) * 2008-11-25 2010-06-16 中国联合网络通信集团有限公司 Software installation method, device and system of embedded equipment
US20100287582A1 (en) * 2009-05-07 2010-11-11 Barnett Jr Thomas C Auto discovery and auto provisioning of set top boxes
CN202694349U (en) * 2012-06-20 2013-01-23 郝克明 USBKey with variety of interface modes
CN102983968A (en) * 2011-09-02 2013-03-20 深圳市快播科技有限公司 A method and a server for software backend authentication

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1431591A (en) * 2003-01-29 2003-07-23 西安海星现代科技股份有限公司 Dynamic password identity authentication system applicable to network based on software token
US20090019530A1 (en) * 2007-07-12 2009-01-15 Keeler James D Device-Specific Authorization at Distributed Locations
CN101741562A (en) * 2008-11-25 2010-06-16 中国联合网络通信集团有限公司 Software installation method, device and system of embedded equipment
CN101599192A (en) * 2009-04-24 2009-12-09 北京华大智宝电子系统有限公司 Realize the method for security guard of bank card
US20100287582A1 (en) * 2009-05-07 2010-11-11 Barnett Jr Thomas C Auto discovery and auto provisioning of set top boxes
CN102983968A (en) * 2011-09-02 2013-03-20 深圳市快播科技有限公司 A method and a server for software backend authentication
CN202694349U (en) * 2012-06-20 2013-01-23 郝克明 USBKey with variety of interface modes

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105184116A (en) * 2015-06-19 2015-12-23 昆山博威泰克电子科技有限公司 Intelligent equipment software encryption and personal authentication device and method
CN109214187A (en) * 2017-06-29 2019-01-15 龙芯中科技术有限公司 A kind of method, apparatus and electronic equipment controlling computer starting
CN117472035A (en) * 2023-12-27 2024-01-30 东方电气风电股份有限公司 Verification method for software and hardware of main control system
CN117472035B (en) * 2023-12-27 2024-03-08 东方电气风电股份有限公司 Verification method for software and hardware of main control system

Also Published As

Publication number Publication date
CN103942473B (en) 2016-08-17

Similar Documents

Publication Publication Date Title
CN109428878B (en) Vulnerability detection method, detection device and detection system
CN108377241B (en) Monitoring method, device and equipment based on access frequency and computer storage medium
CN104361076B (en) The abnormality eliminating method and device of browser
CN104850771A (en) Identity verification method and related equipment
WO2017031850A1 (en) User identity authentication method, device, system and smart home
CN101783803B (en) Webpage filtering method and data card
SG176471A1 (en) Method, apparatus and system for authentication of external storage devices
CN109040051A (en) A kind of BMC login method, system, equipment and computer readable storage medium
CN108173813B (en) Vulnerability detection method and device
KR101799366B1 (en) Server Apparatus for Dynamic Secure Module and Driving Method Thereof
CN104484629A (en) Computer starting method and device
CN110768951B (en) Method and device for verifying system vulnerability, storage medium and electronic device
CN105302446A (en) Method and device for pairing devices
CN104751105A (en) Fingerprint data verification method, fingerprint data verification device, related equipment and system
CN103942473A (en) Method used for preventing unauthorized user from starting software and system thereof
CN111414605B (en) Unlocking method and device of embedded security unit, electronic equipment and storage medium
CN110865774B (en) Information security detection method and device for printing equipment
CN104937602B (en) Privacy protection method and electronic equipment
CN103942472B (en) The method and device of software is started for the person that shields unauthorized use
CN111079140B (en) Method, device and system for preventing cheating
CN109635552A (en) Electronic equipment identity information verification method and device
CN105429954A (en) Eyeball registration method and device
KR102325169B1 (en) Security marking method, device and security terminal
WO2016026332A1 (en) Login processing method, apparatus and system
TW201833759A (en) Contact information display method and device, and information display method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB03 Change of inventor or designer information

Inventor after: Yao Wei

Inventor after: Wan Hongyu

Inventor before: Yao Wei

Inventor before: Song Huabiao

Inventor before: Wan Hongyu

COR Change of bibliographic data

Free format text: CORRECT: INVENTOR; FROM: YAO WEI SONG HUABIAO WAN HONGYU TO: YAO WEI WAN HONGYU

C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20191029

Address after: 430000 Hubei Province Wuhan Hongshan District Donghu New Technology Development Zone Laowu-Huanghe Highway 206 Huigu Space-time Building 705, 706A

Patentee after: Wuhan Tuozhijia Information Technology Co., Ltd.

Address before: 100081 Beijing city Haidian District Daliushu Road No. 17 Fu Hai Hong Kong International room 803

Patentee before: LIDE HIGH TECHNOLOGY (BEIJING) DIGITAL SCIENCE AND TECHNOLOGY CO., LTD.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20191205

Address after: 211300 Building 2, No. 15, Zhushan Road, Gaochun Economic Development Zone, Nanjing City, Jiangsu Province

Patentee after: Nanjing SongGe Network Technology Co., Ltd

Address before: 430000 Hubei Province Wuhan Hongshan District Donghu New Technology Development Zone Laowu-Huanghe Highway 206 Huigu Space-time Building 705, 706A

Patentee before: Wuhan Tuozhijia Information Technology Co., Ltd.

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160817

Termination date: 20210414

CF01 Termination of patent right due to non-payment of annual fee