CN106778094A - Identical ID conflicts shut down theft preventing method to be verified when logging in - Google Patents
Identical ID conflicts shut down theft preventing method to be verified when logging in Download PDFInfo
- Publication number
- CN106778094A CN106778094A CN201611200721.2A CN201611200721A CN106778094A CN 106778094 A CN106778094 A CN 106778094A CN 201611200721 A CN201611200721 A CN 201611200721A CN 106778094 A CN106778094 A CN 106778094A
- Authority
- CN
- China
- Prior art keywords
- shut down
- verified
- conflicts
- software
- logging
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 8
- 238000001514 detection method Methods 0.000 abstract description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Power Sources (AREA)
Abstract
The present invention relates to software field; more particularly to identical ID conflicts shut down theft preventing method to be verified when logging in; the present invention can used with an account and password simultaneously in the software of detection on two electrical equipments; software website sends shutdown checking signal; and shut down in good time, avoid software pirate to use to greatest extent.
Description
Technical field
The present invention relates to software field, more particularly to identical ID conflicts shut down theft preventing method to be verified when logging in.
Background technology
Overall software is encrypted, is thing that each software company will do, this password should be decoded easily.
Corresponding process is also encrypted, and is just insured.
Over time, easily it is decrypted.
The content of the invention
The purpose of the present invention is:By the present invention, increase is usurped, pirate troublesome degree.
Identical ID conflicts shut down theft preventing method to be verified when logging in, and are further characterized in that and detect a right to use two
Used on individual electrical equipment, send shutdown checking signal;It is described to detect a right to use on two electrical equipments while making
With, shutdown checking signal is sent, shut down in good time.
Beneficial effect:Software pirate is avoided to use to greatest extent.
Specific embodiment
The present invention is described in detail below, and the technical scheme in the embodiment of the present invention is carried out clearly and completely
Description, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example, belongs to the scope of protection of the invention.
Specific embodiment
Identical ID shuts down theft preventing method to be verified when conflict is logged in, and detects a right to use on two electrical equipments
Use, send shutdown checking signal.
The present embodiment is further arranged to:
It is described to detect a right to use on two electrical equipments while using, shutdown checking signal is sent, shut down in good time.
Operation principle:
The software of detection is being used with an account and password simultaneously on two electrical equipments, and software website sends shutdown checking
Signal, and shut down in good time.
The foregoing description of the disclosed embodiments, enables professional and technical personnel in the field to realize or uses the present invention.To this
Various modifications of a little embodiments will be apparent for those skilled in the art, as defined herein general
Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, the present invention will not
Can be intended to be limited to the embodiments shown herein, and be to fit to consistent with principles disclosed herein and features of novelty
Scope most wide.
Claims (1)
1. theft preventing method to be verified is shut down when identical ID conflicts are logged in, is further characterized in that and is detected a right to use at two
Used on electrical equipment, send shutdown checking signal;It is described to detect a right to use on two electrical equipments while using,
Shutdown checking signal is sent, is shut down in good time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611200721.2A CN106778094A (en) | 2016-12-22 | 2016-12-22 | Identical ID conflicts shut down theft preventing method to be verified when logging in |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611200721.2A CN106778094A (en) | 2016-12-22 | 2016-12-22 | Identical ID conflicts shut down theft preventing method to be verified when logging in |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106778094A true CN106778094A (en) | 2017-05-31 |
Family
ID=58899657
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611200721.2A Pending CN106778094A (en) | 2016-12-22 | 2016-12-22 | Identical ID conflicts shut down theft preventing method to be verified when logging in |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106778094A (en) |
-
2016
- 2016-12-22 CN CN201611200721.2A patent/CN106778094A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2015157693A3 (en) | System and method for an efficient authentication and key exchange protocol | |
SG10201900964QA (en) | Cloud-based transactions methods and systems | |
MY202280A (en) | Iot security service | |
SG10201901366WA (en) | Key exchange through partially trusted third party | |
BR112015027175A2 (en) | synchronizing credential hashes between directory services | |
GB2567990A (en) | Data protection system and method | |
BR112015015259A2 (en) | method, apparatus and electronic device for connection management | |
BR112016006445A2 (en) | method for securing transaction messages by transitioning between a mobile application on a mobile device and a gateway, and transaction processing system | |
WO2010104632A3 (en) | Offloading cryptographic protection processing | |
WO2009118268A3 (en) | Secure communications in computer cluster systems | |
WO2007115982A3 (en) | Identity protection method, devices and corresponding computer programme product | |
MY201812A (en) | Addressing a trusted execution environment using signing key | |
WO2016126052A3 (en) | Authentication method and system | |
WO2014113132A3 (en) | Method for secure symbol comparison | |
CN102571804B (en) | Method for first logging in Internet of Things centre based on product identification code | |
CN106778094A (en) | Identical ID conflicts shut down theft preventing method to be verified when logging in | |
WO2016115401A8 (en) | System and method for securing electronic messages | |
CN105357665A (en) | Encryption method for sensitive data of mobile phone and off-line decryption method based on same | |
SG10201805187WA (en) | Entity authentication in network | |
WO2015157131A3 (en) | System and method for boot sequence modification using chip-restricted instructions residing on an external memory device | |
WO2018063544A3 (en) | Addressing inside-enterprise hack attempts | |
PH12019501641A1 (en) | Methods and devices for parameter exchange during emergency access | |
CN104967547A (en) | Information security type intelligent home gateway | |
CN106599624A (en) | Method for generating universal text by corresponding result | |
CN106778093A (en) | Same ID is in multiple equipment management method used at the same time |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170531 |
|
WD01 | Invention patent application deemed withdrawn after publication |