CN111556012B - Piracy detection and remote control method, device, equipment and medium - Google Patents

Piracy detection and remote control method, device, equipment and medium Download PDF

Info

Publication number
CN111556012B
CN111556012B CN202010213042.9A CN202010213042A CN111556012B CN 111556012 B CN111556012 B CN 111556012B CN 202010213042 A CN202010213042 A CN 202010213042A CN 111556012 B CN111556012 B CN 111556012B
Authority
CN
China
Prior art keywords
authorization
authorization information
control
set value
management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010213042.9A
Other languages
Chinese (zh)
Other versions
CN111556012A (en
Inventor
吴杰铖
陈森
郑明毅
杨哲泓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Star Net Communication Co Ltd
Original Assignee
Fujian Star Net eVideo Information Systems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Star Net eVideo Information Systems Co Ltd filed Critical Fujian Star Net eVideo Information Systems Co Ltd
Priority to CN202010213042.9A priority Critical patent/CN111556012B/en
Publication of CN111556012A publication Critical patent/CN111556012A/en
Application granted granted Critical
Publication of CN111556012B publication Critical patent/CN111556012B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • G06Q50/184Intellectual property management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Technology Law (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Primary Health Care (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Operations Research (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Multimedia (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides a piracy detection and remote control method, a device, equipment and a medium, wherein the method comprises the following steps: generating authorization information, programming the authorization information to an encryption chip, and storing the authorization information in a cloud; the cloud end regularly acquires the authorization data in the encryption chip; comparing the authorization information with the authorization data; if the authorization information is not consistent with the authorization data, entering management and control; if not, the control is not performed, whether the authorization is valid or not is detected in real time through the Internet, and when the authorization is invalid, the remote control is performed in a mode of closing some core functions.

Description

Piracy detection and remote control method, device, equipment and medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a piracy detection and remote control method, apparatus, device, and medium.
Background
The existing mode is that after the product is sold to a customer, the customer also needs to pay a certain fee for being matched with a corresponding dongle, and the product can be used only by the dongle; the hardware authorization mode of offline by using the dongle is easy to crack, so that piracy is flooded; and even if the pirated software is known after being cracked, no effective means is provided for restricting the use place of the pirated software, so that the intellectual property of the company is infringed, and great loss is generated.
Disclosure of Invention
The application aims to solve the technical problem of providing a piracy detection and remote control method, a piracy detection and remote control device, equipment and a medium, which are used for detecting whether authorization is effective or not in real time through the Internet and performing remote control in a mode of closing certain core functions when the authorization is ineffective.
In a first aspect, the present application provides a method comprising:
step 1, generating authorization information, programming the authorization information to an encryption chip, and storing the authorization information in a cloud;
step 2, the cloud end regularly acquires authorization data in the encryption chip;
step 3, comparing the authorization information with the authorization data; if the authorization information is not consistent with the authorization data, entering management and control; if not, the control is not performed.
Further, the step 3 is further specifically: comparing the authorization information with the authorization data; if the authorization information is not consistent with the authorization data, judging the tampered amount in the authorization data, and if the tampered amount is smaller than a first set value, starting a first-level setting management and control measure; if the tampering amount is larger than or equal to the first set value and smaller than or equal to the second set value, a second-stage setting management and control measure is started; if the tampered amount is larger than the second set value, entering a third-level set control measure;
if the authorization information accords with the authorization data, the management and control are not performed.
Further, the first-stage setting control measures are as follows: the method comprises the steps of (1) popup window prompt of a venue cashing system and popup window prompt of a venue gateway server;
the second-stage setting management and control measures are as follows: full-field screen trotting lamp prompt and spot cashing system popup window prompt;
the third-stage setting control measures are as follows: the full-field on-demand system is disabled and the full-field cashing system is disabled.
In a second aspect, the present application provides an apparatus comprising:
the storage module is used for generating authorization information, programming the authorization information to the encryption chip and storing the authorization information in a cloud;
the acquisition module is used for acquiring the authorization data in the encryption chip at fixed time by the cloud;
the management and control module is used for comparing the authorization information with the authorization data; if the authorization information is not consistent with the authorization data, entering management and control; if not, the control is not performed.
Further, the management and control module is further specifically: comparing the authorization information with the authorization data; if the authorization information is not consistent with the authorization data, judging the tampered amount in the authorization data, and if the tampered amount is smaller than a first set value, starting a first-level setting management and control measure; if the tampering amount is larger than or equal to the first set value and smaller than or equal to the second set value, a second-stage setting management and control measure is started; if the tampered amount is larger than the second set value, entering a third-level set control measure;
if the authorization information accords with the authorization data, the management and control are not performed.
Further, the first-stage setting control measures are as follows: the method comprises the steps of (1) popup window prompt of a venue cashing system and popup window prompt of a venue gateway server;
the second-stage setting management and control measures are as follows: full-field screen trotting lamp prompt and spot cashing system popup window prompt;
the third-stage setting control measures are as follows: the full-field on-demand system is disabled and the full-field cashing system is disabled.
In a third aspect, the application provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of the first aspect when executing the program.
In a fourth aspect, the present application provides a computer readable storage medium having stored thereon a computer program which when executed by a processor implements the method of the first aspect.
One or more technical solutions provided in the embodiments of the present application at least have the following technical effects or advantages:
the method, the device, the equipment and the medium provided by the embodiment of the application detect whether the authorization is effective or not in real time through the Internet, and remotely control modes such as popup window prompt, closing of certain core functions and the like through the Internet when the authorization is ineffective.
The foregoing description is only an overview of the present application, and is intended to be implemented in accordance with the teachings of the present application in order that the same may be more clearly understood and to make the same and other objects, features and advantages of the present application more readily apparent.
Drawings
The application will be further described with reference to examples of embodiments with reference to the accompanying drawings.
FIG. 1 is a flow chart of a method according to a first embodiment of the application;
FIG. 2 is a schematic diagram of a device according to a second embodiment of the present application;
fig. 3 is a schematic structural diagram of an electronic device according to a third embodiment of the present application;
fig. 4 is a schematic structural diagram of a medium in a fourth embodiment of the present application.
Detailed Description
The technical scheme in the embodiment of the application has the following overall thought: the method uses a mode of combining online and offline authorization, detects whether the authorization is effective or not in real time through the Internet when online and offline software runs, and remotely controls a mode of remotely closing certain core functions by remotely popup window prompt to a place through the Internet when the authorization is ineffective.
Before describing the specific embodiments, the method of the present application is specifically implemented as follows:
1. after the authorization information is generated by the background, the authorization information is written into the encryption chip. The equipment decides whether a function can normally run or not through authorization information in the encryption chip;
2. in the starting and running process of the equipment, the authorization information in the encryption chip is read at regular time and reported to the cloud, the cloud compares and analyzes the reported authorization information with original authorization information stored by the cloud, and if the fact that the obtained authorization information is offline or the authorization information is inconsistent with the cloud is found, the place is marked as an abnormal place and a management and control flow is entered;
3. the control flow is formed by combining automatic system intervention and manual intervention, after the system judges that the place is abnormal through data analysis, corresponding level control measures are started according to preset rules, meanwhile, warning is sent out to inform staff to intervene, and after the staff judges through manual intervention, the control or upgrading control measures can be released; for example, if the tampered amount of the encrypted information is found to be lower than 20%, a primary management and control measure is started; if the tampered amount of the encrypted information is found to be 20% -60%, adopting a secondary management and control measure, and if the tampered amount of the encrypted information is found to be more than 60%, adopting a tertiary management and control measure;
the specific hardware layout is as follows: the cloud end server is arranged at the cloud end; the digital audiovisual place is provided with a gateway server, each box is provided with a video-on-demand set top box, a plurality of display screens and a cashier system, the cloud server sends management and control information to the gateway server, and the gateway server sends the management and control information to the cashier system or the set top box (running video-on-demand system) according to the requirement; the set top box controls the revolving horse lamp display of the song requesting screen;
4. the list of management measures is as follows:
4.1, a popup window of the cashing system in the place prompts primary management and control measures (only service personnel in the place can see the primary management and control measures);
4.2 the location gateway server popup prompts a primary management and control measure (only the service personnel in the location can see the measure);
4.3 prompting secondary control measures (users at the scene and server personnel at the scene can see) by a full-scene song requesting screen revolving horse lamp;
4.4 popup window prompt diode control measures of the venue cashing system (users at the venue and venue server personnel can see the scene);
4.5, disabling the whole field on-demand system to influence business and controlling measures in three stages;
and 4.6, disabling a full-field cashing system to influence business and three-stage management and control measures.
Example 1
The present embodiment provides a method, as shown in fig. 1, comprising;
step 1, generating authorization information, programming the authorization information to an encryption chip, and storing the authorization information in a cloud;
step 2, the cloud end regularly acquires authorization data in the encryption chip;
step 3, comparing the authorization information with the authorization data; if the authorization information is not consistent with the authorization data, judging the tampered amount in the authorization data, and if the tampered amount is smaller than a first set value, starting a first-level setting management and control measure; if the tampering amount is larger than or equal to the first set value and smaller than or equal to the second set value, a second-stage setting management and control measure is started; if the tampered amount is larger than the second set value, entering a third-level set control measure;
if the authorization information accords with the authorization data, the management and control are not performed.
The first-stage setting management and control measures are as follows: the method comprises the steps of (1) popup window prompt of a venue cashing system and popup window prompt of a venue gateway server;
the second-stage setting management and control measures are as follows: full-field screen trotting lamp prompt and spot cashing system popup window prompt;
the third-stage setting control measures are as follows: the full-field on-demand system is disabled and the full-field cashing system is disabled.
Based on the same inventive concept, the application also provides a device corresponding to the method in the first embodiment, and the details of the second embodiment are shown.
Example two
In this embodiment, there is provided an apparatus, as shown in fig. 2, including:
the storage module is used for generating authorization information, programming the authorization information to the encryption chip and storing the authorization information in a cloud;
the acquisition module is used for acquiring the authorization data in the encryption chip at fixed time by the cloud;
the management and control module is used for comparing the authorization information with the authorization data; if the authorization information is not consistent with the authorization data, judging the tampered amount in the authorization data, and if the tampered amount is smaller than a first set value, starting a first-level setting management and control measure; if the tampering amount is larger than or equal to the first set value and smaller than or equal to the second set value, a second-stage setting management and control measure is started; if the tampered amount is larger than the second set value, entering a third-level set control measure;
if the authorization information accords with the authorization data, the management and control are not performed.
The first-stage setting management and control measures are as follows: the method comprises the steps of (1) popup window prompt of a venue cashing system and popup window prompt of a venue gateway server;
the second-stage setting management and control measures are as follows: full-field screen trotting lamp prompt and spot cashing system popup window prompt;
the third-stage setting control measures are as follows: the full-field on-demand system is disabled and the full-field cashing system is disabled.
Since the device described in the second embodiment of the present application is a device for implementing the method described in the first embodiment of the present application, based on the method described in the first embodiment of the present application, a person skilled in the art can understand the specific structure and the deformation of the device, and thus the detailed description thereof is omitted herein. All devices used in the method according to the first embodiment of the present application are within the scope of the present application.
Based on the same inventive concept, the application provides an electronic device embodiment corresponding to the first embodiment, and the details of the third embodiment are shown in the specification.
Example III
The present embodiment provides an electronic device, as shown in fig. 3, including a memory 510, a processor 520, and a computer program 511 stored in the memory 510 and capable of running on the processor, where the processor 520 executes the computer program to implement any implementation of the first embodiment.
Since the electronic device described in this embodiment is a device for implementing the method in the first embodiment of the present application, those skilled in the art will be able to understand the specific implementation of the electronic device and various modifications thereof based on the method described in the first embodiment of the present application, so how the electronic device implements the method in the embodiment of the present application will not be described in detail herein. The apparatus used to implement the methods of embodiments of the present application will be within the scope of the intended protection of the present application.
Based on the same inventive concept, the application provides a storage medium corresponding to the first embodiment, and the detail of the fourth embodiment is shown in the specification.
Example IV
The present embodiment provides a computer readable storage medium 600, as shown in fig. 4, on which a computer program 611 is stored, which when executed by a processor, can implement any implementation of the first embodiment.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While specific embodiments of the application have been described above, it will be appreciated by those skilled in the art that the specific embodiments described are illustrative only and not intended to limit the scope of the application, and that equivalent modifications and variations of the application in light of the spirit of the application will be covered by the claims of the present application.

Claims (4)

1. A piracy detection and remote control method is characterized in that: comprising the following steps:
step 1, generating authorization information, programming the authorization information to an encryption chip, and storing the authorization information in a cloud;
step 2, the cloud end regularly acquires authorization data in the encryption chip;
step 3, comparing the authorization information with the authorization data; if the authorization information is not consistent with the authorization data, judging the tampered amount in the authorization data, and if the tampered amount is smaller than a first set value, starting a first-level setting management and control measure; if the tampering amount is larger than or equal to the first set value and smaller than or equal to the second set value, a second-stage setting management and control measure is started; if the tampered amount is larger than the second set value, entering a third-level set control measure;
if the authorization information accords with the authorization data, the management and control are not performed;
the first-stage setting management and control measures are as follows: the method comprises the steps of (1) popup window prompt of a venue cashing system and popup window prompt of a venue gateway server;
the second-stage setting management and control measures are as follows: full-field screen trotting lamp prompt and spot cashing system popup window prompt;
the third-stage setting control measures are as follows: the full-field on-demand system is disabled and the full-field cashing system is disabled.
2. A pirate detection and remote control device is characterized in that: comprising the following steps:
the storage module is used for generating authorization information, programming the authorization information to the encryption chip and storing the authorization information in a cloud;
the acquisition module is used for acquiring the authorization data in the encryption chip at fixed time by the cloud;
the management and control module is used for comparing the authorization information with the authorization data; if the authorization information is not consistent with the authorization data, judging the tampered amount in the authorization data, and if the tampered amount is smaller than a first set value, starting a first-level setting management and control measure; if the tampering amount is larger than or equal to the first set value and smaller than or equal to the second set value, a second-stage setting management and control measure is started; if the tampered amount is larger than the second set value, entering a third-level set control measure;
if the authorization information accords with the authorization data, the management and control are not performed;
the first-stage setting management and control measures are as follows: the method comprises the steps of (1) popup window prompt of a venue cashing system and popup window prompt of a venue gateway server;
the second-stage setting management and control measures are as follows: full-field screen trotting lamp prompt and spot cashing system popup window prompt;
the third-stage setting control measures are as follows: the full-field on-demand system is disabled and the full-field cashing system is disabled.
3. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 when the program is executed by the processor.
4. A computer readable storage medium, on which a computer program is stored, which program, when being executed by a processor, implements the method according to any of claims 1.
CN202010213042.9A 2020-03-24 2020-03-24 Piracy detection and remote control method, device, equipment and medium Active CN111556012B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010213042.9A CN111556012B (en) 2020-03-24 2020-03-24 Piracy detection and remote control method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010213042.9A CN111556012B (en) 2020-03-24 2020-03-24 Piracy detection and remote control method, device, equipment and medium

Publications (2)

Publication Number Publication Date
CN111556012A CN111556012A (en) 2020-08-18
CN111556012B true CN111556012B (en) 2023-08-29

Family

ID=72007273

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010213042.9A Active CN111556012B (en) 2020-03-24 2020-03-24 Piracy detection and remote control method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN111556012B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2267041A1 (en) * 1999-03-26 2000-09-26 Dew Engineering And Development Limited Method and system for protecting a software application from piracy
CN1561026A (en) * 2004-02-20 2005-01-05 胡祥义 Method for preventing pirate based on ciphered algorithmic technique
CN1782941A (en) * 2004-12-04 2006-06-07 鸿富锦精密工业(深圳)有限公司 Software authorizing and protecting device and method
CN102782695A (en) * 2010-02-26 2012-11-14 西门子公司 Hardware device
CN105471810A (en) * 2014-05-28 2016-04-06 北京奇虎科技有限公司 Verification method and verification system for software authorization information
CN108846263A (en) * 2018-05-31 2018-11-20 北京市商汤科技开发有限公司 Soft ware authorization processing and operation method and device, electronic equipment
CN109302370A (en) * 2017-07-24 2019-02-01 上海牛卡网络科技有限公司 A kind of client validation method, terminal and server
CN109558703A (en) * 2018-11-26 2019-04-02 紫优科技(深圳)有限公司 A kind of copyright managing method, server and user terminal
CN109840398A (en) * 2019-02-14 2019-06-04 北京儒博科技有限公司 Software authorization method, device, equipment and storage medium
CN109902452A (en) * 2018-11-01 2019-06-18 北京旷视科技有限公司 FPGA authority checking method, apparatus and processing equipment
CN110032834A (en) * 2018-01-12 2019-07-19 厦门雅迅网络股份有限公司 System authorization control method, terminal device and storage medium
CN110636056A (en) * 2019-09-06 2019-12-31 西安交大捷普网络科技有限公司 Method and equipment for preventing webpage tampering

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2267041A1 (en) * 1999-03-26 2000-09-26 Dew Engineering And Development Limited Method and system for protecting a software application from piracy
CN1561026A (en) * 2004-02-20 2005-01-05 胡祥义 Method for preventing pirate based on ciphered algorithmic technique
CN1782941A (en) * 2004-12-04 2006-06-07 鸿富锦精密工业(深圳)有限公司 Software authorizing and protecting device and method
CN102782695A (en) * 2010-02-26 2012-11-14 西门子公司 Hardware device
CN105471810A (en) * 2014-05-28 2016-04-06 北京奇虎科技有限公司 Verification method and verification system for software authorization information
CN109302370A (en) * 2017-07-24 2019-02-01 上海牛卡网络科技有限公司 A kind of client validation method, terminal and server
CN110032834A (en) * 2018-01-12 2019-07-19 厦门雅迅网络股份有限公司 System authorization control method, terminal device and storage medium
CN108846263A (en) * 2018-05-31 2018-11-20 北京市商汤科技开发有限公司 Soft ware authorization processing and operation method and device, electronic equipment
CN109902452A (en) * 2018-11-01 2019-06-18 北京旷视科技有限公司 FPGA authority checking method, apparatus and processing equipment
CN109558703A (en) * 2018-11-26 2019-04-02 紫优科技(深圳)有限公司 A kind of copyright managing method, server and user terminal
CN109840398A (en) * 2019-02-14 2019-06-04 北京儒博科技有限公司 Software authorization method, device, equipment and storage medium
CN110636056A (en) * 2019-09-06 2019-12-31 西安交大捷普网络科技有限公司 Method and equipment for preventing webpage tampering

Also Published As

Publication number Publication date
CN111556012A (en) 2020-08-18

Similar Documents

Publication Publication Date Title
US10430560B2 (en) Monitoring digital content usage history to prevent digital content misuse
CN108427632B (en) Automatic test method and device
US7715930B2 (en) Aggregating audit information with field conditions
US20100275252A1 (en) Software management apparatus and method, and user terminal controlled by the apparatus and management method for the same
CN106233297A (en) To adjustment based on the protection to the prediction of Malware tendency activity and warning
CN101826101A (en) Search engine device and method
CN109409087B (en) Anti-privilege-raising detection method and device
CN103077482A (en) Power operation risk control method and system
US20190089729A1 (en) Application security management system and edge server
CN110955897A (en) Software research and development safety control visualization method and system based on big data
CN113704718B (en) Computer data protection system based on identity authentication
US20200278948A1 (en) Method, apparatus and system for managing electronic fingerprint of electronic file
CN110796053A (en) Video detection method and device, electronic equipment and computer readable storage medium
CN106651124A (en) Construction workers' peccancy control method, terminal, server and system
CN117932583A (en) Self-service terminal operation detection method and system based on data monitoring
CN112163198A (en) Host login security detection method, system, device and storage medium
CN111556012B (en) Piracy detection and remote control method, device, equipment and medium
KR101754014B1 (en) Information Leakage Prevention Apparatus Based Face Recognition And Method of Threof
KR101860642B1 (en) Apparatus and method for watching illegality using source code modification effect assessment
KR101576242B1 (en) Security management system and method for server accessible by temporarily authorized worker
CN103984902A (en) New data asset identifying method and system
CN110807885A (en) Alarm method and alarm device based on WeChat
CN118627047B (en) Intelligent monitoring platform of commercial screen system and safety control method
CN114286178B (en) Privacy data protection method, device and medium based on remote control
EP3913486A1 (en) Closed loop monitoring based privileged access control

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240709

Address after: Building 19-22, juyuanzhou xingwangruijie Science Park, 618 Jinshan Avenue, Cangshan District, Fuzhou City, Fujian Province, 350007

Patentee after: FUJIAN STAR-NET COMMUNICATION Co.,Ltd.

Country or region after: China

Address before: Cangshan District of Fuzhou City, Fujian province 350000 to build a new town, Jinshan Road No. 618, juyuanzhou Industrial Park No. 19 building one or two layer

Patentee before: FUJIAN STAR-NET EVIDEO INFORMATION SYSTEM Co.,Ltd.

Country or region before: China

TR01 Transfer of patent right
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20200818

Assignee: FUJIAN STAR-NET EVIDEO INFORMATION SYSTEM Co.,Ltd.

Assignor: FUJIAN STAR-NET COMMUNICATION Co.,Ltd.

Contract record no.: X2024980014982

Denomination of invention: A piracy detection and remote control method, device, equipment, and medium

Granted publication date: 20230829

License type: Exclusive License

Record date: 20240930