CN101064034B - Management and check method for intangible assets counterfeit - Google Patents

Management and check method for intangible assets counterfeit Download PDF

Info

Publication number
CN101064034B
CN101064034B CN2006100786912A CN200610078691A CN101064034B CN 101064034 B CN101064034 B CN 101064034B CN 2006100786912 A CN2006100786912 A CN 2006100786912A CN 200610078691 A CN200610078691 A CN 200610078691A CN 101064034 B CN101064034 B CN 101064034B
Authority
CN
China
Prior art keywords
code name
code
sign indicating
indicating number
authorized
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2006100786912A
Other languages
Chinese (zh)
Other versions
CN101064034A (en
Inventor
王榕梆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2006100786912A priority Critical patent/CN101064034B/en
Publication of CN101064034A publication Critical patent/CN101064034A/en
Application granted granted Critical
Publication of CN101064034B publication Critical patent/CN101064034B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

This invention relates to one intangible asset management and audit method, which comprises the following steps: through one hardware code and one special code and right code set match and through product start unit judgment, it knows whether all relative software installed meet total authorization need; when same software repeats or loads different hardware system, the product activates unit to update product authorization codes to avoid hardware update part by need of other product authroi8zation number complains.

Description

Non-physical assets counterfeit management and auditing method
Technical field
The present invention relates to a kind of non-physical assets counterfeit management and auditing method; Especially a kind of pairing of passing through a hardware code name (Hardware Number) and an authorized code code name and premium sign indicating number code name group (Ln+Rn); And the judgement through product start unit (Product Activation unit), with the management and the method for checking non-physical assets counterfeit.
Background technology
The condition of legal authorization must possess (1) simultaneously and authorize manufacturing licence, reaches the product that can confirm as legal authorization when the premium payment of fees is accomplished in (2).But under interests were lured into, many illegal manufacturers were not receiving under the legal authorization conditions, produce many various infringing products.Also there is the mandate manufacturing licence of only obtaining the obligee to cover up illegal mode to escape the leak premium person of paying with legal again.These infringing products have made normal circulation of commodities market be subjected to greatest impact, and especially those have spent a large amount of manpower and financial resources and create the legal manufacturer of good brand and deeply hurt especially.Moreover, because the progress and the development of science and technology make counterfeit technology reach several stage of looking genuine, cause many anti-counterfeiting technologies real in hard to tell whether it is true or false as far as ordinary consumer.
In view of this, in order to solve the counterfeit problem of product, anti-counterfeiting technology is also along with improve.Multiple anti-counterfeiting mark has appearred in the prior art, like laser hologram, daylight fluorescence ink, color shifting ink etc.But the greatest problem of these anti-counterfeiting technologies is, such as the consumer to differentiate its purchase commodity true and false must rely on corresponding equipment or instrument carries out, and, as stated, along with development of science and technology, personator even can make the anti-counterfeiting mark that looks genuine equally.Thereby, so can not stop to palm off or the appearance of infringing products.
Especially software is counterfeit; General existing anti-counterfeiting mark still can't frighten the pirate commodity of resistance and use; So at present existing manufacturer brings into use, and " anti-pirate technology "-(Microsoft ProductActivation, mode MPA) prevents the use of counterfeit software on the market in product startup.And this product starts the characteristics of (MPA) and is: when operating system or application software are installed on a hard disk; Can take or take out of after a while user's license Agreement (End User License Agreement of this operating system or this application software in passing out of; EULA); And when buying this operating system or this application software appended genuine piece certificate (Certi ficate of Authenticity; COA) and the cooperation of the hardware information of this hard disk (Hardware ID), intactly to obtain the mandate of this operating system or this application software.
See also shown in Figure 1ly, it is the process flow diagram of existing non-physical assets counterfeit management with auditing method.By can knowing in the process flow diagram, be described below with the authorization of this operating system: step S100, at first, open user's license Agreement (EULA) of this operating system; Step mule S102 then, transmits the product serial number (Product Key) and this hardware information (HID) to a product start unit (Product Activation unit) of this genuine piece certificate (COA); Whether step S104 then, through this product start unit, is genuine (true) to judge this product serial number (PK).If this product serial number (PK) is not genuine (true); Judge that then this operating system is counterfeit; (it is non-full version that trial edition generally refers to this software and can't use this operating system maybe can only use the trial edition of this operating system; And only be a scaled-down version, and access times or the term of life that can only use this software to limit).
Moreover in this step S104, if this product serial number (PK) is genuine (true), whether step S106 then through this product start unit, does not exist (exist) to judge this product serial number (PK) and the pairing (PK+HID) of this hardware information (HID) as yet.And if there be not (exist) as yet in the pairing (PK+HID) of this product serial number (PK) and this hardware information (HID), step S108 judges that then this product serial number (PK) and the pairing (PK+HID) of this hardware information (HID) are legal (true); Then, step S110 downloads the product mandate gold key number (Product Number) be made up of this product serial number (PK) and the pairing (PK+HID) of this hardware information (HID) from this product start unit; At last, step S112 installs this product mandate gold key number (PN) in this user's license Agreement (EULA), uses so that this operating system is issued in this hard disk.
Yet; If in this step S106; Step S114 if the pairing (PK+HID) of this product serial number (PK) and this hardware information (HID) has existed once, then representes under another hardware information (Another HID), to install once before this operating system; Therefore the user need make a phone call or surf the Net and apply for another product mandate gold key number (Another PN), continues to carry out this step S110 then.Moreover; Step S116; If this PK+HID and PK+another HID have existed once respectively; Then represent under two other HID, to install twice respectively before this operating system, therefore judge that this operating system is counterfeit, and can't use this operating system maybe can only use the trial edition of this operating system.
Summary of the invention
Technical matters to be solved by this invention is to provide a kind of non-physical assets counterfeit management and auditing method; Through the pairing of hardware code name (Hardware Number) with an authorized code code name and premium sign indicating number code name group (Ln+Rn); And the judgement through product start unit (Product Activation unit); To understand the requirement whether related software of being installed meets complete mandate; And when same software repeated to load different hard disks, this product start unit is the product mandate gold key number of application renewal initiatively, applied for the complaint that (surf the Net or make a phone call) another product mandate gold key number produces with the person that avoids the HardwareUpgring again because of needs.Moreover the present invention also can carry out network through IP through the ISP dealer and search warrant, and not only exempts from search evidence obtaining, more can avoid formatting hard disk (Format) and buries in oblivion evidence.
To achieve these goals; The invention provides a kind of non-physical assets counterfeit management and auditing method; Its characteristics are, comprising: (a) through a product granted unit, with the first authorized code code name and the first premium sign indicating number code name group of hardware code name that corresponding one first hardware unit is provided; (b) unlatching one is installed on the operating system of this first hardware unit, to take user's license Agreement of this operating system out of; (c) the internet communication agreement and this hardware code name (HWN) that transmit this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn), this first hardware unit are to a product start unit; (d) through this product start unit, whether exist to judge this first authorized code code name and the first premium sign indicating number code name group; (e) if yes, then through this product start unit, to judge whether still unauthorized of this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn); (f) if yes, then through this product start unit, whether do not exist as yet to judge this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) and the pairing (First Ln+Rn+HWN) of this corresponding hardware code name (HWN); (g) if yes, judge that then this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) and the pairing (First Ln+Rn+HWN) of this corresponding hardware code name (HWN) are legal; (h) the first product mandate gold key number of being formed by the pairing (First Ln+Rn+HWN) of this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) and this corresponding hardware code name (HWN) from this product start unit download one; And (i) this first product mandate gold key number (First PN) is installed in this user's license Agreement, so that being issued in this hardware unit, this operating system uses.
Above-mentioned non-physical assets counterfeit management and auditing method; Its characteristics are that this product granted unit also comprises: one with this first authorized code code name and first corresponding first authorized code of premium sign indicating number code name group (First Ln+Rn) and the first premium code character (First L code+R code).
Above-mentioned non-physical assets counterfeit management and auditing method, its characteristics are that this first hardware unit is a hard disk or a motherboard.
Above-mentioned non-physical assets counterfeit management and auditing method; Its characteristics are: this step (c) and (d) between also comprise: zone or the country and the IP that start product through institute's desire relatively come source region or country, and whether the internet communication agreement that is sent to this product start unit with judgement is legal; And if yes, then carry out this step (d).
Management of above-mentioned non-physical assets counterfeit and auditing method, its characteristics are: if be sent to the internet communication agreement of this product start unit is not legal, then can't use this operating system, maybe can only use the trial edition of this operating system.
Above-mentioned non-physical assets counterfeit management and auditing method; Its characteristics are; If this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) do not exist; Then this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) be for what forge, therefore can't use this operating system, maybe can only use the trial edition of this operating system.
Above-mentioned non-physical assets counterfeit management and auditing method; Its characteristics are; If this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) are authorized, then also comprise: judge whether this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) surpass a predetermined mandate number as yet; If yes, then through this product start unit, to judge whether this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) and the pairing (First Ln+Rn+HWN) of this corresponding hardware code name are legal; If yes, judge then whether this hardware code name is identical with the previous hardware code name of licensing this operating system last time; And if yes, then carry out this step (h).
Management of above-mentioned non-physical assets counterfeit and auditing method, its characteristics be, this predetermined mandate number is for repeatedly.
Above-mentioned non-physical assets counterfeit management and auditing method; Its characteristics are; If having surpassed, this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) should predeterminedly authorize number; The pairing (First Ln+Rn+HWN) of then directly judging this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) and this corresponding hardware code name is infringement, so can't use this operating system, maybe can only use the trial edition of this operating system.
Above-mentioned non-physical assets counterfeit management and auditing method; Its characteristics are; Also comprise: order to arrest all and surpass this predetermined first authorized code code name and first premium sign indicating number code name groups (First Ln+Rn) of authorizing number, surpass the use of the operating system of this predetermined first authorized code code name of authorizing number and the first premium sign indicating number code name group (First Ln+Rn), maybe can only use the trial edition of this operating system to end all corresponding these.
Management of above-mentioned non-physical assets counterfeit and auditing method, its characteristics are, also comprise: end all and depend on this operating system and the use of the application software of installing, maybe can only use the trial edition of this application software.
Above-mentioned non-physical assets counterfeit management and auditing method; Its characteristics are; If this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) are not legal with the pairing (FirstLn+Rn+HWN) of this corresponding hardware code name; The pairing (First Ln+Rn+HWN) of then judging this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) and this corresponding hardware code name is infringement, so can't use this operating system, maybe can only use the trial edition of this operating system.
Above-mentioned non-physical assets counterfeit management and auditing method; Its characteristics are; If this hardware code name and to license the previous hardware code name of this operating system last time inequality; Then also comprise: show an authenticate-acknowledge picture, changing the previous hardware code name that this hardware code name equals to license last time this operating system, and make that this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) and the pairing (First Ln+Rn+HWN) of this corresponding hardware code name are legal; And carry out this step (h).
Above-mentioned non-physical assets counterfeit management and auditing method; Its characteristics are; If the pairing (FirstLn+Rn+HWN) of the hardware code name that this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) are corresponding with this does not exist; The pairing (First Ln+Rn+HWN) of then judging this first authorized code code name and the first premium sign indicating number code name group (FirstLn+Rn) and this corresponding hardware code name is infringement, so can't use this operating system, maybe can only use the trial edition of this operating system.
Above-mentioned non-physical assets counterfeit management and auditing method; Its characteristics are; Also comprise in this step (a): through this product granted unit, with the second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) that a plurality of corresponding different application softwares are provided.
Management of above-mentioned non-physical assets counterfeit and auditing method, its characteristics are that this step (i) also comprises afterwards: (j) open wherein one be installed on this first hardware unit application software, to take wherein user's license Agreement of an application software out of; (k) internet communication agreement and this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) of the second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn), this first hardware unit that transmits this corresponding wherein application software is to this product start unit; (1), whether exists to judge this second corresponding authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) through this product start unit; (m) if yes, then through this product start unit, to judge whether still unauthorized of this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn); (n) if yes, then through this product start unit, to judge whether this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) and the pairing (First Ln+Rn+HWN) of this corresponding hardware code name are legal; (o) if yes, judge that then this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) and the pairing (First Ln+Rn+Second Ln+Rn) of this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) are legal; (p) the second product mandate gold key number of being formed by the pairing (First Ln+Rn+Second Ln+Rn) of this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) and this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) from this product start unit download one (Second Product Number); And (q) this second product mandate gold key number (Second PN) is installed in this user's license Agreement so that this wherein an application software be issued in this hardware unit and under this operating system, use.
Above-mentioned non-physical assets counterfeit management and auditing method; Its characteristics are that this product granted unit also comprises: a plurality of respectively with this second authorized code code name and second corresponding second authorized code of premium sign indicating number code name group (Second Ln+Rn) and the second premium code character (Second L code+R code).
Above-mentioned non-physical assets counterfeit management and auditing method; Its characteristics are; Also comprise between this step (k) and (1): regional or country and IP through comparing institute's desire startup product come source region or country, and whether the internet communication agreement that is sent to this product start unit with judgement is legal; And if yes, then carry out this step (1).
Above-mentioned non-physical assets counterfeit management and auditing method, its characteristics are, are not legal if be sent to the internet communication agreement of this product start unit, then can't use the one of which application software, maybe can only use the wherein trial edition of an application software.
Above-mentioned non-physical assets counterfeit management and auditing method; Its characteristics are; If this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) do not exist; Then this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) therefore can't be used one of which application software in this, maybe can only use this wherein trial edition of an application software for what forge.
Above-mentioned non-physical assets counterfeit management and auditing method; Its characteristics are; If this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) are authorized, then also comprise: judge that this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) are whether as yet above the mandate number be scheduled to; And if yes, then carry out this step (n).
Management of above-mentioned non-physical assets counterfeit and auditing method, its characteristics be, this predetermined mandate number is for repeatedly.
Above-mentioned non-physical assets counterfeit management and auditing method; Its characteristics are; If having surpassed, this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) should predeterminedly authorize number; Judge directly that then this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) and this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) are infringement, therefore can't make the one of which application software, maybe can only use the wherein trial edition of an application software.
Above-mentioned non-physical assets counterfeit management and auditing method; Its characteristics are; Also comprise: order to arrest all and surpass this predetermined second authorized code code name and second premium sign indicating number code name groups (Second Ln+Rn) of authorizing number, surpass the use of the application software of this predetermined second authorized code code name of authorizing number and the second premium sign indicating number code name group (Second Ln+Rn), maybe can only use the trial edition of these application software to end all corresponding these.
Above-mentioned non-physical assets counterfeit management and auditing method; Its characteristics are; If this corresponding first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) are not legal with the pairing (First Ln+Rn+HWN) of this corresponding hardware code name; Judge that then this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) and the pairing (First Ln+Rn+HWN) of this corresponding hardware code name are infringement, therefore can't use the one of which application software, maybe can only use the wherein trial edition of an application software.
Effect of the present invention is following:
(1) MPA need import 25 yards COA literary composition numeral, and the present invention's input digit (being greater than or less than 25 yards), and the tool convenience.
(2) judgement that can be through IP is to avoid the similar massive duplication of HWN.
(3) when same software repeats to load different hard disks; Product start unit (ProductActivation unit) is the new product mandate gold key number of application change initiatively, applies for the complaint that (surf the Net or make a phone call) another product mandate gold key number produces with the person that avoids the HardwareUpgring again because of needs.
(4) can dynamically check pirate and counterfeit shape condition.
(5) can pass through the ISP dealer, carry out network through IP and search warrant, not only exempt from search evidence obtaining, more can avoid formatting hard disk (Format) and bury in oblivion evidence.
Describe the present invention below in conjunction with accompanying drawing and specific embodiment, but not as to qualification of the present invention.
Description of drawings
Fig. 1 is the process flow diagram of existing non-physical assets counterfeit management with auditing method; And
Fig. 2, Fig. 3 are the process flow diagram of non-physical assets counterfeit management of the present invention with auditing method.
Embodiment
See also Fig. 2, shown in Figure 3, it is the process flow diagram of non-physical assets counterfeit management of the present invention with auditing method.By knowing in the process flow diagram; Non-physical assets counterfeit management of the present invention and auditing method; It comprises: at first; Step S200; Through product granted unit (Product Licensed unit); With the first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) of hardware code name (Hardware Number) that corresponding first hardware unit is provided and the second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) that a plurality of corresponding different application softwares (Applicationsoftware) are provided (S200); Wherein, This product granted unit comprise one with this first authorized code code name and corresponding first authorized code of the first premium sign indicating number code name group (First Ln+Rn) (First License Code) and the first premium sign indicating number (First Royalty Code) group (First L code+R code) and a plurality of respectively with this second authorized code code name and corresponding second authorized code of the second premium sign indicating number code name group (Second Ln+Rn) (Second License Code) and the second premium sign indicating number (Second Royalty Code) group (SecondL code+R code), and this first hardware unit can be a hard disk, a motherboard or any hardware unit.
Then, step S202, unlatching one is installed on the operating system (OperatingSystem) of this first hardware unit, to take user's license Agreement (EULA) of this operating system (OS) out of; Then; Step S204 transmits the internet communication agreement (IP) and this hardware code name (HWN) to a product start unit (Product Activation unit) of this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn), this first hardware unit; Next; Step S206; Through relatively regional the or country and the IP of institute's desire startup product come source region or country; Whether the internet communication agreement (IP) that is sent to this product start unit with judgement is legal (true): if this internet communication agreement (IP) is not legal, then can't uses this operating system, maybe can only use the trial edition of this operating system; If this internet communication agreement (IP) is legal, whether S208 then through this product start unit, exists (exist) to judge this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn).
And then; After this step S208; If this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) do not exist; Therefore this first authorized code code name and the first premium sign indicating number code name group (FirstLn+Rn) (False) for forging then can't use this operating system, maybe can only use the trial edition of this operating system; If this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) exist; Step S210; Then through this product start unit; To judge whether still unauthorized (licensed) of this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn): if this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) unauthorized still; Whether step S212 then through this product start unit, does not exist to judge this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) and the pairing (First Ln+Rn+HWN) of this corresponding hardware code name (HWN) as yet.
Moreover; In this step S212: if there be (exi st) in the pairing (First Ln+Rn+HWN) of this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) and this corresponding hardware code name (HWN); The pairing (First Ln+Rn+HWN) of then judging this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) and this corresponding hardware code name (HWN) is infringement (infringement), so can't use this operating system, maybe can only use the trial edition of this operating system; If there be not (exist) in this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) with the pairing (First Ln+Rn+HWN) of this corresponding hardware code name (HWN); Step S214 judges that then this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) and the pairing (First Ln+Rn+HWN) of this corresponding hardware code name (HWN) are legal (true).
Next, step S216 downloads a pairing (First by this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) and this corresponding hardware code name (HWN) from this product start unit
Ln+Rn+HWN) the first product mandate gold key number of being formed (First Product Number); Then, step S218 installs this first product mandate gold key number (First PN) in this user's license Agreement (EULA), uses so that this operating system is issued in this hardware unit.
In addition; In this step S210; If this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) are authorized (licensed); Step S220 judges that then whether this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) surpass a predetermined mandate number as yet, wherein should predetermined mandate number is secondary or need adjusts setting according to the donor.If having surpassed, this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) should predeterminedly authorize number; Step S222; The pairing (First Ln+Rn+HWN) of then directly judging this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) and this corresponding hardware code name (HWN) is infringement (infringement), so can't use this operating system, maybe can only use the trial edition of this operating system.
And then; Step S224; Order to arrest all and surpass this predetermined first authorized code code name and first premium sign indicating number code name groups (First Ln+Rn) of authorizing number, correspondingly should surpass the use of the operating system of this predetermined first authorized code code name of authorizing number and the first premium sign indicating number code name group (First Ln+Rn) to end all, maybe can only use the trial edition of this operating system; Then, step 226 is ended all and is depended on this operating system and the use of the application software of installing, and maybe can only use the trial edition of these application software.
Moreover; In this step S220; If surpassing, this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) should predeterminedly not authorize number; Step S228 is then through this product start unit, to judge whether this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) and the pairing (First Ln+Rn+HWN) of this corresponding hardware code name (HWN) are legal (true).If this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) are not legal (true) with the pairing (First Ln+Rn+HWN) of this corresponding hardware code name (HWN); The pairing (First Ln+Rn+HWN) of then judging this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) and this corresponding hardware code name (HWN) is infringement (infringement), so can't use this operating system, maybe can only use the trial edition of this operating system.If this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) are legal (true) with the pairing (First Ln+Rn+HWN) of this corresponding hardware code name (HWN); Step S230 judges then whether this hardware code name (HWN) is identical with the previous hardware code name (previous HWN) of licensing this operating system (OS) last time.
Next, in this step S230,, then carry out this step S216 if whether this hardware code name (HWN) is identical with the previous hardware code name (previous HWN) of licensing this operating system (OS) last time.If this hardware code name (HWN) is inequality with the previous hardware code name (previous HWN) of licensing this operating system (OS) last time; Step S232; Then show an authenticate-acknowledge picture; Changing the previous hardware code name (previousHWN) that this hardware code name (HWN) equals to license last time this operating system (OS), and make that this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) and the pairing (First Ln+Rn+HWN) of this corresponding hardware code name (HWN) are legal (true); Then, then carry out this step S216.
Moreover, after this step S218, step S234, and then open wherein one be installed on this first hardware unit application software, to take this wherein user's license Agreement (EULA) of an application software out of; Then; Step S236, transmit this corresponding this wherein internet communication agreement (IP) and this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) of the second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn), this first hardware unit of an application software to this product start unit.
Next, step S238 comes source region or country through regional or country and the IP that compares institute's desire startup product, and whether the internet communication agreement (IP) that is sent to this product start unit with judgement is legal (true).If the internet communication agreement (IP) of this product start unit is not legal (true), then can't uses one of which application software in this, maybe can only use this wherein trial edition of an application software; If the internet communication agreement (IP) of this product start unit is legal (true); Step S240; Then, whether there be (exist) to judge this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) through this product start unit.
Then; Among this step S240; If there be not (exist) in this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn); Therefore this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) (False) for forging then can't use wherein an application software, maybe can only use this wherein trial edition of an application software; If there be (exist) in this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn); Step S242; Then through this product start unit, to judge whether still unauthorized (licensed) of this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn).
In addition; In this step S242; If this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) be unauthorized (licensed) still; Step S244 is then through this product start unit, to judge whether this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) and the pairing (First Ln+Rn+HWN) of this corresponding hardware code name (HWN) are legal (true).If this corresponding first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) are not legal (true) with the pairing (First Ln+Rn+HWN) of this corresponding hardware code name (HWN); Judge that then this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) and the pairing (First Ln+Rn+HWN) of this corresponding hardware code name (HWN) are infringement (infringement), therefore can't use one of which application software in this, maybe can only use this wherein trial edition of an application software.
Moreover; In this step S244; If this corresponding first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) are legal (true) with the pairing (First Ln+Rn+HWN) of this corresponding hardware code name (HWN); Step S246 judges that then this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) and the pairing (First Ln+Rn+Second Ln+Rn) of this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) are legal (true); Then; Step S248 downloads the golden key number (Second Product Number) of the second product mandate be made up of this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) and the pairing (First Ln+Rn+Second Ln+Rn) of this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) from this product start unit; At last, step S250 installs this second product mandate gold key number (Second PN) in this user's license Agreement (EULA) so that this wherein an application software be issued in this hardware unit and and use down in this operating system (OS).
In this step S242; If this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) are authorized (licensed); Step S252; Judge then whether this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) surpass a predetermined mandate number as yet, the mandate number that wherein should be scheduled to is secondary or need adjusts setting according to the donor.
In addition; In this step S252; If having surpassed, this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) should predeterminedly authorize number; Step S254; Judge directly that then this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) and this first authorized code code name and the first premium sign indicating number code name group (First Ln+Rn) are infringement (infringement), therefore can't use the one of which application software, maybe can only use the wherein trial edition of an application software.And then; Step S256; Order to arrest all and surpass this predetermined second authorized code code name and second premium sign indicating number code name groups (Second Ln+Rn) of authorizing number, correspondingly should surpass the use of the application software of this predetermined second authorized code code name of authorizing number and the second premium sign indicating number code name group (Second Ln+Rn) to end all, maybe can only use the trial edition of this application software.In addition, should predeterminedly not authorize number, then carry out this step S244 if this corresponding second authorized code code name and the second premium sign indicating number code name group (Second Ln+Rn) surpass.
In sum, non-physical assets counterfeit management of the present invention has advantage with auditing method:
(1) MPA need import 25 yards COA literary composition numeral, and the present invention's input digit (being greater than or less than 25 yards), and the tool convenience.
(2) judgement that can be through IP is to avoid the similar massive duplication of HWN.
(3) when same software repeats to load different hard disks; Product start unit (ProductActivation unit) is the new product mandate gold key number of application change initiatively, applies for the complaint that (surf the Net or make a phone call) another product mandate gold key number produces with the person that avoids the HardwareUpgring again because of needs.
(4) can dynamically check pirate and counterfeit shape condition.
(5) can pass through the ISP dealer, carry out network through IP and search warrant, not only exempt from search evidence obtaining, more can avoid formatting hard disk (Format) and bury in oblivion evidence.
Certainly; The present invention also can have other various embodiments; Under the situation that does not deviate from spirit of the present invention and essence thereof; Those of ordinary skill in the art can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection domain of claim of the present invention.

Claims (12)

1. a non-physical assets counterfeit is managed and auditing method, it is characterized in that, comprising:
(a) through a product granted unit, with the first authorized code code name and the first premium sign indicating number code name group of hardware code name that corresponding one first hardware unit is provided;
(b) unlatching one is installed on the operating system of this first hardware unit, to take user's license Agreement of this operating system out of;
(c) transmit internet communication agreement and this hardware code name to product start unit of this first authorized code code name and the first premium sign indicating number code name group, this first hardware unit;
(d) through this product start unit, whether exist to judge this first authorized code code name and the first premium sign indicating number code name group;
(e) if not, this operating system can't be used, maybe the trial edition of this operating system can only be used, if yes, then through this product start unit, to judge whether still unauthorized of this first authorized code code name and the first premium sign indicating number code name group;
(f) if yes, then through this product start unit, whether do not exist as yet to judge this first authorized code code name and the first premium sign indicating number code name group and the pairing of this corresponding hardware code name;
(g) if not, this operating system can't be used, maybe the trial edition of this operating system can only be used, if yes, judge that then this first authorized code code name and the first premium sign indicating number code name group are legal with being paired into of this corresponding hardware code name;
(h) the first product mandate gold key number of forming by the pairing of this first authorized code code name and the first premium sign indicating number code name group and this corresponding hardware code name from this product start unit download one; And
(i) this first product mandate gold key number is installed in this user's license Agreement, is used so that this operating system is issued in this hardware unit;
Wherein, in this step (e),, then also comprise if this first authorized code code name and the first premium sign indicating number code name group are authorized:
Judge whether this first authorized code code name and the first premium sign indicating number code name group do not surpass the one first predetermined number of authorizing as yet;
If yes, then through this product start unit, to judge whether this first authorized code code name and the first premium sign indicating number code name group and the pairing of this corresponding hardware code name are legal;
If yes, judge then whether this hardware code name is identical with the previous hardware code name of licensing this operating system last time; And
If yes; Then carry out this step (h); If this first authorized code code name and the first premium sign indicating number code name group have surpassed this first predetermined number of authorizing; Then directly judge the infringement that is paired into of this first authorized code code name and the first premium sign indicating number code name group and this corresponding hardware code name, so can't use this operating system, maybe can only use the trial edition of this operating system.
2. non-physical assets counterfeit according to claim 1 management and auditing method is characterized in that this product granted unit also comprises: one with this first authorized code code name and first corresponding first authorized code of premium sign indicating number code name group and the first premium code character.
3. non-physical assets counterfeit management according to claim 1 and auditing method is characterized in that this first hardware unit is a hard disk or a motherboard.
4. non-physical assets counterfeit according to claim 1 management and auditing method is characterized in that: this step (c) and (d) between also comprise:
Regional or country and IP through comparing institute's desire startup product come source region or country, and whether the internet communication agreement that is sent to this product start unit with judgement is legal; And
If yes, then carry out this step (d),, then can't use this operating system, maybe can only use the trial edition of this operating system if not.
5. non-physical assets counterfeit according to claim 1 management and auditing method is characterized in that, this first predetermined number of authorizing is for repeatedly.
6. non-physical assets counterfeit management according to claim 1 and auditing method; It is characterized in that; Also comprise: order to arrest all and surpass this first predetermined first authorized code code name and first premium sign indicating number code name groups of authorizing number, surpass the use of the operating system of this first predetermined first authorized code code name of authorizing number and the first premium sign indicating number code name group, maybe can only use the trial edition of this operating system to end all corresponding these.
7. non-physical assets counterfeit management according to claim 1 and auditing method; It is characterized in that; Also comprise in this step (a): through this product granted unit, with the second authorized code code name and the second premium sign indicating number code name group that a plurality of corresponding different application softwares are provided.
8. non-physical assets counterfeit management according to claim 7 and auditing method is characterized in that this step (i) also comprises afterwards:
(j) open wherein one be installed on this first hardware unit application software, to take wherein user's license Agreement of an application software out of;
(k) internet communication agreement and this first authorized code code name and the first premium sign indicating number code name group of the second authorized code code name and the second premium sign indicating number code name group, this first hardware unit that transmits this corresponding wherein application software is to this product start unit;
(l), whether exist to judge this second corresponding authorized code code name and the second premium sign indicating number code name group through this product start unit;
(m) if not; Can't use this wherein an application software, maybe can only use this wherein trial edition of an application software; If yes, then through this product start unit, to judge whether still unauthorized of this corresponding second authorized code code name and the second premium sign indicating number code name group;
(n) if not; Surpass one second predetermined when authorizing number as yet in this corresponding second authorized code code name and the second premium sign indicating number code name group; Through this product start unit; To judge whether this corresponding second authorized code code name and the second premium sign indicating number code name group and the pairing of this corresponding hardware code name are legal; Surpassed in this corresponding second authorized code code name and the second premium sign indicating number code name group that this is second predetermined when authorizing number, can't use this wherein an application software, maybe can only use this wherein trial edition of an application software, if yes; Then through this product start unit, to judge whether this corresponding second authorized code code name and the second premium sign indicating number code name group and the pairing of this corresponding hardware code name are legal;
(o) if illegal; Can't use this wherein an application software, maybe can only use this wherein trial edition of an application software; If legal, judge that then this first authorized code code name and the first premium sign indicating number code name group are legal with being paired into of this corresponding second authorized code code name and the second premium sign indicating number code name group;
(p) the second product mandate gold key number of forming by the pairing of this first authorized code code name and the first premium sign indicating number code name group and this corresponding second authorized code code name and the second premium sign indicating number code name group from this product start unit download one; And
(q) this second product mandate gold key number is installed in user's license Agreement of this application software so that this wherein an application software be issued in this hardware unit and under this operating system, use.
9. non-physical assets counterfeit according to claim 7 management and auditing method, it is characterized in that: this product granted unit also comprises: a plurality of respectively with this second authorized code code name and second corresponding second authorized code of premium sign indicating number code name group and the second premium code character.
10. non-physical assets counterfeit according to claim 8 management and auditing method is characterized in that, this step (k) and (l) between also comprise:
Regional or country and IP through comparing institute's desire startup product come source region or country, and whether the internet communication agreement that is sent to this product start unit with judgement is legal; And
If yes, then carry out this step (l), if not, can't use this wherein an application software, maybe can only use this wherein trial edition of an application software.
11. non-physical assets counterfeit according to claim 8 management and auditing method is characterized in that, this second predetermined number of authorizing is for repeatedly.
12. non-physical assets counterfeit management according to claim 8 and auditing method; It is characterized in that; Also comprise: order to arrest all and surpass this second predetermined second authorized code code name and second premium sign indicating number code name groups of authorizing number, surpass the use of the application software of this second predetermined second authorized code code name of authorizing number and the second premium sign indicating number code name group, maybe can only use the trial edition of these application software to end all corresponding these.
CN2006100786912A 2006-04-30 2006-04-30 Management and check method for intangible assets counterfeit Expired - Fee Related CN101064034B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2006100786912A CN101064034B (en) 2006-04-30 2006-04-30 Management and check method for intangible assets counterfeit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2006100786912A CN101064034B (en) 2006-04-30 2006-04-30 Management and check method for intangible assets counterfeit

Publications (2)

Publication Number Publication Date
CN101064034A CN101064034A (en) 2007-10-31
CN101064034B true CN101064034B (en) 2012-07-18

Family

ID=38965045

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006100786912A Expired - Fee Related CN101064034B (en) 2006-04-30 2006-04-30 Management and check method for intangible assets counterfeit

Country Status (1)

Country Link
CN (1) CN101064034B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108259163B (en) * 2016-12-29 2020-10-02 北京博瑞彤芸文化传播股份有限公司 Authorization method of terminal equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1335564A (en) * 1999-12-08 2002-02-13 索尼公司 Information distributing system and information management method
CN1540583A (en) * 2003-10-27 2004-10-27 江苏瑞福智能科技有限公司 Method of safe using and anti false discriminating stored type electronic label

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1335564A (en) * 1999-12-08 2002-02-13 索尼公司 Information distributing system and information management method
CN1540583A (en) * 2003-10-27 2004-10-27 江苏瑞福智能科技有限公司 Method of safe using and anti false discriminating stored type electronic label

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JP特开2004-334356A 2004.11.25

Also Published As

Publication number Publication date
CN101064034A (en) 2007-10-31

Similar Documents

Publication Publication Date Title
US9355013B1 (en) Counter-invasive software system and method
CN102737200B (en) Use the software activation of digital license
JP2008146479A (en) Software component, software component management method and software component management system
US20070244826A1 (en) Method of managing and auditing intellectual property
US20180307811A1 (en) Prevention of software piracy exploiting end users
CN101064034B (en) Management and check method for intangible assets counterfeit
US20060242082A1 (en) Method and system for protecting of software application from piracy
EP1748375A1 (en) Traffic control software lock and method
Stakheyeva Intellectual property and competition law: Understanding the interplay
Kim et al. A birthmark-based method for intellectual software asset management
Heileman et al. The DRM game
US20150040240A1 (en) System and method for software piracy monetization
Yeh Repair, Modification, or Resale of Software-Enabled Consumer Electronic Devices: Copyright Law Issues
Goertzel Protecting Software Intellectual Property Against Counterfeiting and Piracy
Becker et al. Assessing privacy criteria for drm using eu privacy legislation
Kollnig et al. How Decisions by Apple and Google obstruct App Privacy
Gasser et al. Case study: DRM-protected music interoperability and e-innovation
Holst Assessing and managing security risks unique to Java and .NET
Bahn et al. Liability and control risks with open source software
O’Regan Legal Aspects of Software Engineering
Schriefer Yelling Fire and Hacking: Why the First Amendment Does Not Permit Distributing DVD Decryption Technology
Yildirim et al. Freedom to Share: How the Law of Platform Liability Impacts Licensors and Users
Herbert Solving a Global Piracy Problem
NEERAJ Centre for WTO Studies Indian Institute of Foreign Trade
KR100818844B1 (en) On-line software reprocessing-sale method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120718

Termination date: 20140430