CN101393586A - Only method for verifying computer - Google Patents

Only method for verifying computer Download PDF

Info

Publication number
CN101393586A
CN101393586A CNA2007102017581A CN200710201758A CN101393586A CN 101393586 A CN101393586 A CN 101393586A CN A2007102017581 A CNA2007102017581 A CN A2007102017581A CN 200710201758 A CN200710201758 A CN 200710201758A CN 101393586 A CN101393586 A CN 101393586A
Authority
CN
China
Prior art keywords
user
hardware information
computer
software
storehouse
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007102017581A
Other languages
Chinese (zh)
Inventor
武永军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNA2007102017581A priority Critical patent/CN101393586A/en
Publication of CN101393586A publication Critical patent/CN101393586A/en
Pending legal-status Critical Current

Links

Images

Abstract

A computer software developer generally requires a legitimate user to install copyrighted software on one computer only so as to defend legitimate rights and interests of the legitimate user. But illegal pirated users violate interest of the developer, which is especially obvious for the developer who supplies free upgrade service for the software, such as antivirus software. The invention provides a more reasonable and effective verifying method, which can verify whether a software user is legitimate or not by testing an IP address, a network card Mak address, a CPU, a hard disk, mainboard serial number and other hardware information of the computer of the user, and can properly solve the problem of normal maintenance for computer hardware of the user, thereby verifying whether the software is installed in only one computer or not, effectively protecting copyright, guaranteeing that the software can only be operated in the computer of the designated user in given time and putting an end to pirated software.

Description

Verify the method for unique computer
Technical field
The present invention relates to a kind of method of verifying unique computer, more particularly, the present invention relates to a kind of like this method of verifying unique computer, whether the hardware information of this method by the inspection user computer is installed in software on the unique computer with the checking user and uses.
Background technology
The computer software developer generally requires its user that its software only is installed on the computer to use, to safeguard the legitimate rights and interests of oneself.The computer software developer has also done many effort and a large amount of work for this reason, as by " user ID ", " password ", " registration code " and " key file " or the like, verifies legal user, and the user combats copyright piracy.But pirate user still continues to bring out, grievous injury software developer's interests, especially need to provide the software developer's of frequent upgrade service interests, as the antivirus software developer.The piracy software user is not only interests of having invaded the software developer, has influenced their normal development, has also invaded legal user's resource simultaneously, has influenced their service that should enjoy.How to verify legal user, the user that combats copyright piracy is a problem that is very difficult to solve and be worth solution at present.
Summary of the invention
Problem at the legal user's existence of above-mentioned present checking, the purpose of this invention is to provide a kind of more rational and effective verification method, this method is by the hardware information of checking user computer, whether with checking is legal user (software is installed in user on the unique computer), and can properly solve the conventional maintenance problem of legal user computer hardware.
In order to realize purpose of the present invention, a kind of method of verifying unique computer is provided, this method comprises: set up user's hardware information storehouse: the hardware information that is used to store the user; User's registration: be used to register the hardware information of user computer, be stored on the client server; User rs authentication: be used for the consistance of the hardware information of the current computer of inspection user and user's hardware information this user's of storehouse hardware information, whether software be installed on unique computer with the checking user and use.
In authentication procedures, when the hardware information of this user in the hardware information of the current computer of user and the user's hardware information storehouse was in full accord, explanation was legal user; When the hardware information of the current computer of user is consistent with this user's hardware information part in user's hardware information storehouse, considers the normal hardware maintenance of legal user, so point out the user to upgrade information in the hardware information storehouse; When the hardware information of this user in the hardware information of the current computer of user and the user's hardware information storehouse complete when inconsistent, consider that legal user may change computer, if the user only uses its software on new computer, ought to support, therefore point out the user " with dealer contact ", re-register.
Because hardware information is taken is the sequence number of unique identification hardware or ID etc., so pirate user can not have the hardware information identical with legal user, therefore, this method almost can be stopped piracy software and enjoy after sale service.If in particular cases legal user and pirate user are colluded with, according to this method, pirate user then can be so that legal user can't use.Therefore this method, also serious blow colluding with of legal user and pirate user.
Description of drawings
The present invention describes in detail by accompanying drawing by following, will be better understood, wherein:
Fig. 1 shows user's register flow path figure of the present invention,
Fig. 2 shows user rs authentication process flow diagram of the present invention,
Embodiment
For convenience described below, several terms are described now:
Legal user:, obtain the user of software from software seller by legal means.
Validated user:, use the user of software by legal means.
Pirate user:, obtain the user of software by back door.
Disabled user:, use the user of software by back door.
Describe the preferred embodiments of the present invention in detail below in conjunction with accompanying drawing.
Should be noted that at this, verify the method for unique computer according to the present invention, be not only applicable to Windows operating system, and be applicable to other operating system.This method can realize the checking to the user on various platforms.
The preferred embodiment of the present invention divided for three steps realized verifying unique computer: first step is to set up user's hardware information storehouse, second step is exactly user's registration, the hardware information of user computer is saved in user's hardware information storehouse, third step is to be called authentication procedures, and whether the checking user is installed in software on the unique computer and uses.
Set up user's hardware information storehouse:
This process is finished when using this method at first, sets up user's hardware information storehouse, stores the hardware information of registered user's computer.According to the present invention, when setting up user's hardware information storehouse, the field " user ID " that identifying user is arranged, also has hardware information field, wherein comprise: " IP address ", several of " network interface card actual address (MAC Address) ", " CPU sequence number ", " mainboard sequence number ", " hard disk sequence number ", " operating system sequence number ", " display sequence numbers " etc. or whole.Can also be provided with corresponding subsidiary field, as " hour of log-on " of this information, " update times ", " end update time " etc.When not required, can not be provided with.
User registration course:
This process generally occurs in new user when bringing into use the software that is obtained and proposing application for registration, also occurs in old user's propose to change planes application and when getting the Green Light.Because the requirement that the software developer is general is: the user can only be installed in its software on the computer and use.So, when the user uses this software, do not think or can not on its computer, use that in the time of need changing another computer and continue to use this software, the developer ought to allow user's use of changing planes.This has observed the requirement of " user uses software on a computer ", has promptly protected developer's just rights and interests, has also safeguarded user's legitimate interests.
When the user proposes user's application for registration, the mode of agreement during at first with purchase, as user's registration code, password, note, phone audio communication, confirmation code, Email etc. or its combination, affirmation user's legitimacy strengthens security.If be validated user, then read the user computer hardware information, distinguish it is new user or old user again.If new user then adds a record in user information database; If the old user then searches this user, update user information; If the disabled user, prompting is illegal, can not register.
According to user's register flow path figure of Fig. 1, describe user's registration process in detail below.
Fig. 1 is the user's register flow path figure that describes according to a preferred embodiment of the invention, at step S11, receives the application for registration that the user proposes.Confirm user's legitimacy with other modes at step S12.If judge that in step S12 the user is a validated user, then forward step S14 to, therein, read the hardware information of user computer, forward step S15 then to.In step S15, differentiating this user is new user or old user, if be judged to be new user, then this process forwards step S16 to, inserts a record therein, preserves user's hardware information, forwards step S18 then to, return results.
If in step S15, be judged to be the old user, then forward step S17 to, search this user therein, and upgrade user's hardware information, forward step S18. then to
If judge that in step S12 the user is the disabled user, then this process forwards step S13 to, and the prompting user is the disabled user in step S13, can not register, and forwards step S18 then to, return results.
Authentication procedures:
This process is the consistance by this user's hardware information in the hardware information of the current computer of inspection user and the user information database, verifies user's legitimacy.
Consider the normal renewal or the maintenance of the computer hardware of validated user, ought to support,, and point out, upgrade the hardware information storehouse according to software feature and user's request; Also consider changing planes of validated user, ought to support, so prompting " is asked and dealer contact ".
Below according to the user rs authentication process flow diagram of Fig. 2, describe in detail and how to verify whether the user is installed in software on unique computer and use.
Fig. 2 is the user rs authentication process flow diagram of describing according to a preferred embodiment of the invention, in step S21, reads the hardware information of the current computer of user, forwards step S22 then to.In step S22, read the hardware information of the active user in user's hardware information storehouse, forward S23 then to.In step S23, differentiate whether the active user is arranged,, then forward step S24 to if be judged to be.In step S24, the hardware information of the current computer of user and the hardware information in user's hardware information storehouse are carried out conforming check, forward step S25 then to.In step S25, if judge in full accordly, then forward step S26 to, prompting is passed through, and forwards step S2D to, return results.
If judgement is not quite identical in step S25, then forward step S27 to, whether inconsistent fully differentiate therein.If judgement is inconsistent fully in step S27, then forward step S28 to, prompting therein can not be passed through, with dealer contact.If judgement is not exclusively inconsistent in step S27, then forward step S29 to, point out user's hardware that renewal is arranged therein, forward step S2A then to.Inquiry user lastest imformation storehouse whether in step S2A, if upgrade then forward S2B to, the lastest imformation storehouse forwards step S2D then to therein.If the user does not want the lastest imformation storehouse in step S2A, then forward step S2D to, return results.
If in step S23, judge no active user, then forward step S2C to, point out the user not exist therein, forward step S2D then to, return results.
As mentioned above, whether this method is installed in the use on the unique computer to verify this software, and properly solves the conventional maintenance problem of legal user computer hardware by the hardware information of checking user computer.This method almost can be stopped piracy software and enjoy after sale service, also serious blow colluding with of legal user and pirate user.

Claims (6)

  1. [claim 1] 1, a kind of method of verifying unique computer, this method comprises: set up user's hardware information storehouse, be used to store the hardware information of user computer; User registration course is used to preserve the hardware information of user computer; Authentication procedures is used to verify whether the user is installed in unique computer with software.
  2. [claim 2] 2, according to the method for the unique computer of checking of claim 1, the field in wherein said user's hardware information storehouse comprises: the field of identifying user " user ID ", also has hardware information field, wherein comprise: " IP address ", several of " network interface card actual address (MAC Address) ", " CPU sequence number ", " mainboard sequence number ", " hard disk sequence number ", " operating system sequence number ", " display sequence numbers " etc. or whole; Can also be provided with corresponding subsidiary field, as " hour of log-on " of this information, " update times ", " end update time " etc.
  3. [claim 3] 3, according to the method for the unique computer of checking of claim 1, wherein said authentication procedures is the consistance by this user's hardware information in the hardware information of the current computer of inspection user and the user's hardware information storehouse, verifies user's legitimacy.
  4. [claim 4] 4, according to the method for the unique computer of checking of claim 1 or 3, wherein said authentication procedures is: when the hardware information of the current computer of user and user's hardware information this user's of storehouse hardware information is in full accord, by checking.
  5. [claim 5] 5, according to the method for the unique computer of checking of claim 1 or 3, wherein said authentication procedures is: when the hardware information and user's hardware information this user's of storehouse the hardware information of the current computer of user are partly consistent, consider the normal hardware maintenance of legal user, therefore point out the user to upgrade the hardware information storehouse, by checking.
  6. [claim 6] 6, according to the method for the unique computer of checking of claim 1 or 3, wherein said authentication procedures is: when the hardware information of the current computer of user and user's hardware information this user's of storehouse hardware information complete when inconsistent, consider it to be that illegal user uses this software, also may be that legal user has changed computer, therefore point out the user " with dealer contact ", re-register.
CNA2007102017581A 2007-09-18 2007-09-18 Only method for verifying computer Pending CN101393586A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2007102017581A CN101393586A (en) 2007-09-18 2007-09-18 Only method for verifying computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2007102017581A CN101393586A (en) 2007-09-18 2007-09-18 Only method for verifying computer

Publications (1)

Publication Number Publication Date
CN101393586A true CN101393586A (en) 2009-03-25

Family

ID=40493878

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007102017581A Pending CN101393586A (en) 2007-09-18 2007-09-18 Only method for verifying computer

Country Status (1)

Country Link
CN (1) CN101393586A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102208003A (en) * 2010-03-31 2011-10-05 鸿富锦精密工业(深圳)有限公司 Software program protection system and method
CN102510369A (en) * 2011-08-23 2012-06-20 潘燕辉 User identity (ID) information recording method of system without registered user
CN102780699A (en) * 2012-07-09 2012-11-14 广州杰赛科技股份有限公司 Protecting method and protecting system for authentication server software copyright
CN104517043A (en) * 2013-09-26 2015-04-15 江苏智软信息科技有限公司 Simple anti-pirate method for PC (personal computer) software
CN111368264A (en) * 2018-12-26 2020-07-03 技嘉科技股份有限公司 Verification method of application program, computer device and mainboard thereof

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102208003A (en) * 2010-03-31 2011-10-05 鸿富锦精密工业(深圳)有限公司 Software program protection system and method
CN102510369A (en) * 2011-08-23 2012-06-20 潘燕辉 User identity (ID) information recording method of system without registered user
CN102780699A (en) * 2012-07-09 2012-11-14 广州杰赛科技股份有限公司 Protecting method and protecting system for authentication server software copyright
CN102780699B (en) * 2012-07-09 2015-06-24 广州杰赛科技股份有限公司 Protecting method and protecting system for authentication server software copyright
CN104517043A (en) * 2013-09-26 2015-04-15 江苏智软信息科技有限公司 Simple anti-pirate method for PC (personal computer) software
CN111368264A (en) * 2018-12-26 2020-07-03 技嘉科技股份有限公司 Verification method of application program, computer device and mainboard thereof

Similar Documents

Publication Publication Date Title
US7272500B1 (en) Global positioning system hardware key for software licenses
US7565553B2 (en) Systems and methods for controlling access to data on a computer with a secure boot process
US7506382B2 (en) Method and system for licensing a software product
EP1443381B1 (en) System and method for secure software activation with volume licenses
KR101537027B1 (en) Methods and a device for secure software installation
US7769693B2 (en) Mechanism for secure rehosting of licenses
US20080024268A1 (en) Component authentication for computer systems
US8516565B2 (en) IC chip, information processing apparatus, system, method, and program
US20080072077A1 (en) Notification of Revocation in a Device Offering Secure Playback of Content
CN1981277A (en) Quarantine system
EP2235657B1 (en) System and method for preventing unauthorised use of digital media
JP4983796B2 (en) Application program verification method and application program verification program
CN101393586A (en) Only method for verifying computer
EP1471405A1 (en) Method and device for protecting information against unauthorised use
CN107133499B (en) Software copyright protection method, client, server and system
US20020004910A1 (en) Network lock
CN108073792B (en) Version authorization control system and method under Linux operating system
KR20090048000A (en) Method and system for authenticating installation of program for mobile device, method for authenticating execution of program for mobile device
JP4683856B2 (en) Authentication program and authentication server
JP2007179357A (en) Method for installing computer program
JP4638158B2 (en) Copyright protection system
JP4245917B2 (en) Software fraud prevention system
US20120066746A1 (en) Secure device feature unlock mechanism third party development
JP2002182770A (en) Recording medium having normal user authentication function
KR101282504B1 (en) Software authentication method in network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20090325