CN106778094A - Identical ID conflicts shut down theft preventing method to be verified when logging in - Google Patents

Identical ID conflicts shut down theft preventing method to be verified when logging in Download PDF

Info

Publication number
CN106778094A
CN106778094A CN201611200721.2A CN201611200721A CN106778094A CN 106778094 A CN106778094 A CN 106778094A CN 201611200721 A CN201611200721 A CN 201611200721A CN 106778094 A CN106778094 A CN 106778094A
Authority
CN
China
Prior art keywords
shut down
verified
conflicts
software
logging
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611200721.2A
Other languages
Chinese (zh)
Inventor
陈勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201611200721.2A priority Critical patent/CN106778094A/en
Publication of CN106778094A publication Critical patent/CN106778094A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Power Sources (AREA)

Abstract

The present invention relates to software field; more particularly to identical ID conflicts shut down theft preventing method to be verified when logging in; the present invention can used with an account and password simultaneously in the software of detection on two electrical equipments; software website sends shutdown checking signal; and shut down in good time, avoid software pirate to use to greatest extent.

Description

Identical ID conflicts shut down theft preventing method to be verified when logging in
Technical field
The present invention relates to software field, more particularly to identical ID conflicts shut down theft preventing method to be verified when logging in.
Background technology
Overall software is encrypted, is thing that each software company will do, this password should be decoded easily.
Corresponding process is also encrypted, and is just insured.
Over time, easily it is decrypted.
The content of the invention
The purpose of the present invention is:By the present invention, increase is usurped, pirate troublesome degree.
Identical ID conflicts shut down theft preventing method to be verified when logging in, and are further characterized in that and detect a right to use two Used on individual electrical equipment, send shutdown checking signal;It is described to detect a right to use on two electrical equipments while making With, shutdown checking signal is sent, shut down in good time.
Beneficial effect:Software pirate is avoided to use to greatest extent.
Specific embodiment
The present invention is described in detail below, and the technical scheme in the embodiment of the present invention is carried out clearly and completely Description, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
Specific embodiment
Identical ID shuts down theft preventing method to be verified when conflict is logged in, and detects a right to use on two electrical equipments Use, send shutdown checking signal.
The present embodiment is further arranged to:
It is described to detect a right to use on two electrical equipments while using, shutdown checking signal is sent, shut down in good time.
Operation principle:
The software of detection is being used with an account and password simultaneously on two electrical equipments, and software website sends shutdown checking Signal, and shut down in good time.
The foregoing description of the disclosed embodiments, enables professional and technical personnel in the field to realize or uses the present invention.To this Various modifications of a little embodiments will be apparent for those skilled in the art, as defined herein general Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, the present invention will not Can be intended to be limited to the embodiments shown herein, and be to fit to consistent with principles disclosed herein and features of novelty Scope most wide.

Claims (1)

1. theft preventing method to be verified is shut down when identical ID conflicts are logged in, is further characterized in that and is detected a right to use at two Used on electrical equipment, send shutdown checking signal;It is described to detect a right to use on two electrical equipments while using, Shutdown checking signal is sent, is shut down in good time.
CN201611200721.2A 2016-12-22 2016-12-22 Identical ID conflicts shut down theft preventing method to be verified when logging in Pending CN106778094A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611200721.2A CN106778094A (en) 2016-12-22 2016-12-22 Identical ID conflicts shut down theft preventing method to be verified when logging in

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611200721.2A CN106778094A (en) 2016-12-22 2016-12-22 Identical ID conflicts shut down theft preventing method to be verified when logging in

Publications (1)

Publication Number Publication Date
CN106778094A true CN106778094A (en) 2017-05-31

Family

ID=58899657

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611200721.2A Pending CN106778094A (en) 2016-12-22 2016-12-22 Identical ID conflicts shut down theft preventing method to be verified when logging in

Country Status (1)

Country Link
CN (1) CN106778094A (en)

Similar Documents

Publication Publication Date Title
WO2015157693A3 (en) System and method for an efficient authentication and key exchange protocol
SG10201900964QA (en) Cloud-based transactions methods and systems
MY202280A (en) Iot security service
SG10201901366WA (en) Key exchange through partially trusted third party
BR112015027175A2 (en) synchronizing credential hashes between directory services
GB2567990A (en) Data protection system and method
BR112015015259A2 (en) method, apparatus and electronic device for connection management
BR112016006445A2 (en) method for securing transaction messages by transitioning between a mobile application on a mobile device and a gateway, and transaction processing system
WO2010104632A3 (en) Offloading cryptographic protection processing
WO2009118268A3 (en) Secure communications in computer cluster systems
WO2007115982A3 (en) Identity protection method, devices and corresponding computer programme product
MY201812A (en) Addressing a trusted execution environment using signing key
WO2016126052A3 (en) Authentication method and system
WO2014113132A3 (en) Method for secure symbol comparison
CN102571804B (en) Method for first logging in Internet of Things centre based on product identification code
CN106778094A (en) Identical ID conflicts shut down theft preventing method to be verified when logging in
WO2016115401A8 (en) System and method for securing electronic messages
CN105357665A (en) Encryption method for sensitive data of mobile phone and off-line decryption method based on same
SG10201805187WA (en) Entity authentication in network
WO2015157131A3 (en) System and method for boot sequence modification using chip-restricted instructions residing on an external memory device
WO2018063544A3 (en) Addressing inside-enterprise hack attempts
PH12019501641A1 (en) Methods and devices for parameter exchange during emergency access
CN104967547A (en) Information security type intelligent home gateway
CN106599624A (en) Method for generating universal text by corresponding result
CN106778093A (en) Same ID is in multiple equipment management method used at the same time

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170531

WD01 Invention patent application deemed withdrawn after publication