TW556076B - System and method for protecting software using memory card - Google Patents

System and method for protecting software using memory card Download PDF

Info

Publication number
TW556076B
TW556076B TW90107332A TW90107332A TW556076B TW 556076 B TW556076 B TW 556076B TW 90107332 A TW90107332 A TW 90107332A TW 90107332 A TW90107332 A TW 90107332A TW 556076 B TW556076 B TW 556076B
Authority
TW
Taiwan
Prior art keywords
memory card
identification information
server
user
software
Prior art date
Application number
TW90107332A
Other languages
Chinese (zh)
Inventor
Jung-Sing Jwo
Tsung-Hsi Wu
Shyan-Ming Yuan
Original Assignee
W & Jsoft Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by W & Jsoft Inc filed Critical W & Jsoft Inc
Priority to TW90107332A priority Critical patent/TW556076B/en
Application granted granted Critical
Publication of TW556076B publication Critical patent/TW556076B/en

Links

Abstract

The present invention provides a system for protecting software using memory card, which includes a receiving module, a network status detection module, a server login module, and an authority management module. The receiving module receives the user input identification data inputted by the user. The network status detection module detects the connection status of the network to determine if the system for protecting software using memory card can connect through the network and the server. The server login module calls the login function stored in the server through the network when the identification data inputted by the user is matched with the first identification data stored on the memory card and the system for protecting software using memory card is able to connect through the network and the server, so as to login the server and read the third identification data stored in the server. The authority management module opens the usage right of the software when the third identification data is matched with the second identification data stored on the memory card. The present invention also discloses a method realizing the software protection using memory card with the above-mentioned system.

Description

556076 五、發明說明(l) 【發明領域】 一種ΐϊ:係關於一種保護軟體之系統與方法,特別關於 二=:5己憶卡以及伺服器配合’ #以確認使用者權限 之以°己隐卡來保護軟體之系統與方法。 【習知技術】 由於網路具有 對不同使用者的需 點,因此隨著網路 活動已成為一新的 在 一種為 的用戶 之内使 取得與 即失去 如此, 地減少 由於大 器的負 然 軟體的 的軟體 體,亦 各種運用電 業者可經由 端電腦,使 用此軟體, 此軟體相關 使用此軟體 經由上述類 自行購買與 部份的運算 荷可以大幅 而’若欲運 保護機制。 時,業者必 即,使用者 速度快、遠端連線價袼較低、以及可針 求即時地提供個人化資訊或服務的特 科技發展,運用網路來進行各種商業的 趨勢。 月6?及網路科技來提供服務的模式中,有 網際網路先將軟體下載至使用者所使用 用者在付費之後,即可在一段使用期限 並經由網際網路與業者伺服器連線,以 的資料。當使用期限到期之後,使用者 的權限,若欲繼續使用則需再次付費。 似軟體資源租賃的模式,使用者可大幅 維護軟體所需的成本。而對業者而言, 可於用戶端電腦進行,所以業者端伺服 地降低。 用網路來進行上述業務,則必零先建立 當使用者欲於用戶端電腦使用業者提供 須能夠判別使用者是否能夠使用此軟 是否已經付費以取得使用軟體的權限。556076 V. Description of the invention (l) [Field of the invention] A kind of system: a system and method for protecting software, especially about two =: 5 cooperation with a memory card and a server '# to confirm the user's authority. Cards to protect software systems and methods. [Knowledge technology] Because the network has needs for different users, as the network activity has become a new one, the gain and loss are lost within a kind of users. The software body of the software can also be used by various operators. The software can be used via the end computer. This software is related to the use of this software to purchase by itself and some of the computing load can be large and 'if you want to operate a protection mechanism. At the same time, industry players must have fast user speeds, low remote connection prices, and the development of special technologies that can provide personalized information or services in real time, and use the Internet to conduct various business trends. In June 6th, and the network technology to provide services, there is an Internet to download the software to the user. After paying, the user can connect with the server of the operator through the Internet for a period of use. To the information. After the period of use expires, the user's rights need to be paid again if they want to continue using it. Like the software resource leasing model, users can greatly maintain the cost of software. For the operator, it can be performed on the client computer, so the servo on the operator side is reduced. To carry out the above business using the Internet, it must be established first. When the user wants to provide it to the client computer user, the user must be able to determine whether the user can use the software and whether he has paid to obtain the right to use the software.

第5頁 556076 五、發明說明(2) 習知技術中,業者多半以提供授權碼的方式,來 八提供給使用者軟體。亦即,當使用者付費之 ^二 提供使用者一授權碼給使用者,佶用去仏夂糸考即 後,才能取得使用業者所提:之::者;::;:=體 j時間到•,則必需再次付費給業者,以取彳4=體 抑、然而,此種習知的保護方法的缺點為,業者 态並無法在每次使用者欲使用軟用 、司服 =:動作,且現今對於以授來= = = = 利潤的大幅降低 用造成業者的權利受到侵害與 【發明概 針對 保護軟體 持續使用 本發 系統與方 為達 統包括一 模組以及 使用者輸 狀態,以 要】 上述問 之系統 軟體。 明之另法,其 上述目 接收模 一權限 入識別 判別以 題,本發明之目的為提供一種 與方法,其可有效地防止未付 一目的為提供一種以記憶卡來 可大幅提升使用上的便利性。 的,依本發明之以記憶卡來保 、址、一網路狀態偵測模組、一 管理模組。接收模組接收使用 資訊。網路狀態偵測模組偵測 記憶卡來保護軟體之系統是否 以冗憶卡來 費之使用者 保護軟體 護軟體之 伺服器登 者所輪入 網路之連 成詞經由 之 556076 五、發明說明(3) 進行連線。飼服器登入模組係當使 = = …識別資訊,且以記憶卡: 網路呼叫德ΐ 網路與飼服器進行連線時,經由 飼服器中所登入函數’以登入飼服器並讀取 之使用權限給所儲存之第二識別資訊時’開放軟體 絲益=ί t明之一貫施態樣,當以記憶卡來保護軟體之系 理模=網路與伺服器進行連線時,一離線使用時間管 間。當使用者ί離線使用時 別次:者輪入識別一貝訊符合記憶卡所儲存之該第-識 :广己憶卡來保護軟體之系統能夠經由網路與伺服 別資::時線三識別資訊符合記憶卡所儲存之第二識 ^=°κ時§己憶卡上所儲存之離線使用時間即被重新設 且4 i Ξ二之:實施態樣’記憶卡更健存—有效期限, 識別資訊符合記憶卡所儲存之第一識別資 U圯憶卡來保護軟體之系統能夠經由網 ;;線:;::識別資訊符合記憶卡所儲存之第=ΐ 資;重限將依據伺服器所健存之使用者帳號 之方ί發:Π! 了一種依本發明之以記憶卡來保護軟體 別資:Κ = 收一使用者所輪入之—使用者輸入識 別貝戒,並偵測網路之連線狀態,以判別使用者端電腦系Page 5 556076 V. Description of the invention (2) In the conventional technology, most of the operators provide software to users by providing authorization codes. That is, when the user pays ^ 2 to provide the user with an authorization code to the user, the user can only obtain the user's mention of :: 者; ::;: = 体 j time after taking the test. If you arrive at •, you must pay the operator again to get 彳 4 = body suppression. However, the disadvantage of this conventional protection method is that the operator status cannot be used every time the user wants to use software and service =: action. , And now for the substantial reduction in profits = = = = = the rights of the operators have been infringed and [invention is directed to the protection of software for continuous use of the system. The system includes a module and user input status to To] Ask the system software above. The other method is clear, the above-mentioned item receiving mode is a right to identify the subject, the purpose of the present invention is to provide a method and method, which can effectively prevent the unpaid one, to provide a memory card to greatly improve the convenience of use Sex. Yes, according to the present invention, a memory card is used to secure the address, a network status detection module, and a management module. The receiving module receives usage information. The network status detection module detects whether the memory card protection system uses a redundant memory card to protect the user's software protection software. The server of the software protection software is registered in the network by the registrant. 556076 Note (3) Connect. Feeder login module is to use ==… to identify the information and use the memory card: network to call the German 网路 network to connect with the feeder, log in to the feeder through the function registered in the feeder. And read the use right to the stored second identification information, 'Open software silk benefit = t t always apply the form, when the memory card to protect the software model = network and server connection , An offline use time tube. When the user is offline, do n’t do it again: the user turns to identify a Besson that matches the storage status of the memory card-ID: Guangji memory card to protect the software system can pass the network and servo ID :: Timeline III The identification information matches the second identification stored on the memory card. ^ = ° κ§ The offline use time stored on the memory card is reset and 4 i Ξ # 2: Implementation mode. The memory card is more robust-valid period The identification information meets the first identification information stored on the memory card. The system that protects the software can pass the Internet ;; line:; :: identification information meets the first identification information stored on the memory card; the limit will be based on the servo The user account of the user account saved in the device is issued: Π! A software card is used to protect the software according to the present invention: KK = Received by a user in turn-the user enters an identification ring, and detects Measure network connection status to determine client computer system

556076556076

五、發明說明(4) 統是否能夠經由網 別資訊符合記憶卡 腦系統能夠經由網 儲存於伺服器之一 中所儲存之第三識 儲存之第二識別資 者0 路與伺服器進行連 所儲存之第一識別 路與伺服器進行連 登入函數,以登入 別資訊。當第三識 訊時,軟體之使用 線。當使用者輸入識 資訊’且使用者端電 線時,經由網路呼·叫 伺服器並讀取伺服器 別資訊符合記憶卡所 權限即開放給使用 由於在進行軟體使用權限的認證時,依本發明之以記 憶卡來保護軟體之系統與方法係以記憶卡與遠端伺服器來 進行雙重認證,因此其可有效地防止未付費之使用者持 使用軟體。 、 依本發明之以記憶卡來保護軟體之系統,由於當記憶 卡被移除時,使用者即失去軟體的使用權限,因此可以有 效地防止使用者的權限被盜用的狀況發生。例如,當使用 者欲暫時離開時,其只需帶走記憶卡,其它人即無法盜用 其帳號,如此可避免習知技術中,使用者若忘記自軟體登 出’則其帳號會被後續其它使用者盜用的危險。 依本發明之以記憶卡來保護軟體之系統與方法,在網 路斷線時,使用者仍可繼續使用一段時間,故大幅提升了 使用上的便利性。 依本發明之以記憶卡來保護軟體之系統與方法,當網 路恢復連線時,系統會自動檢查記憶卡上的有效期限二離 線使用時間,並重新進行設定。如此,使用者的權限有效 期限與離線使用時間均可以自動地進行線上更新,大幅提V. Description of the invention (4) Whether the system can meet the memory card brain system through the network type information. Can the second identification fund stored in the third identification stored in one of the servers via the network be connected to the server? The stored first identification path performs a login function with the server to login other information. When the third information, the software is used. When the user enters the identification information and the user-end wire, the server calls and calls the server and reads the server information through the network. The information that meets the permissions of the memory card is open to use. The invented system and method for protecting software with a memory card are two-factor authentication with a memory card and a remote server, so it can effectively prevent unpaid users from holding the software. According to the system for protecting software by using a memory card according to the present invention, since the user loses the use right of the software when the memory card is removed, it is possible to effectively prevent the situation where the user's rights are stolen. For example, when the user wants to leave temporarily, he only needs to take away the memory card, and other people cannot steal his account. This can avoid that in the conventional technology, if the user forgets to log out from the software, his account will be followed by other Danger of user misappropriation. According to the system and method for protecting software by using a memory card according to the present invention, users can continue to use the network for a period of time when the network is disconnected, thereby greatly improving the convenience in use. According to the system and method for protecting software by using a memory card according to the present invention, when the network connection is restored, the system will automatically check the expiration date on the memory card and the offline usage time, and reset it. In this way, the validity period of the user's permissions and offline use time can be automatically updated online, greatly improving

556076 五、發明說明(5) 升了使用者使用軟體的便利性。 【較佳實施例之詳細說明】 二以下將參照相關圖式,說明依本發明較佳實施例之 記憶卡來保護軟體之系統與方法,其中相同的元以 同的參照符號加以說明。 ’相 凊參照圖1,在本發明之較佳實施例中, 軟體J系統1包括一接收模組11、-網路狀態二"莫 r/乂 : 入模組13以及一權限管理模組14。接收 收使用者所輸入之一使用者輸入識別資訊。網路 片恶偵測杈組1 2係偵測網路9之連線狀態,以 =ί保ί軟體之系統1是否能夠經由網路9與飼服器8進 伺ίϊ8°/Λ記憶卡來保1 蔓軟體之系統1能夠、經由網路9與 伺服器登入模組13即可以經由網路哞叫 登入伺服器8。隸管理模組Μ則負 貝官理使用者6對於軟體7之使用權限。 於-二以記憶卡來保護軟體之系統1係實施 一中+ _理ί 系統中,此使用者端電腦系統至少包括 線所必;之Γ70 ’ 一電腦可讀取儲存裝置,與網路進行連 裝置,以及其它完成其功能所應具備之週 管理模电Γ4ίΓ㈣測模組12、祠服器登入模組13與權限 、、,,為儲存於電腦可讀取儲存装置中的軟體模組,556076 V. Description of the invention (5) It improves the convenience for users to use the software. [Detailed description of the preferred embodiment] Second, the system and method for protecting software by a memory card according to a preferred embodiment of the present invention will be described with reference to related drawings. The same elements are described with the same reference symbols. 'Relatively referring to FIG. 1, in a preferred embodiment of the present invention, the software J system 1 includes a receiving module 11, a network state two " Mo r / 乂: access module 13 and a rights management module 14. Receive Receives user input identification information. The network chip detection group 1 2 is to detect the connection status of the network 9 to ensure that the software system 1 can access the 8 ° / Λ memory card via the network 9 and the feeder 8 The system 1 of the security software can, via the network 9 and the server login module 13, be able to call the login server 8 via the network. The management module M is responsible for using the software 7 by the official user 6. Yu-Second, the system that protects the software with a memory card 1 is implemented in the first + + management system, this client computer system includes at least the necessary line; Γ70 'a computer-readable storage device, and the network Connected devices, and other weekly management modules required to complete its functions Γ4ίΓ㈣Measurement module 12, ceremonial server login module 13, and authority, are software modules stored in a computer-readable storage device.

第9頁 體物理量且彼此之間係以具 楔组11、二Γ 來令或傳遞資訊。上述之接收 556076 五、發明說明(6) --- 其經由中央處理單元讀取之後,即可經由相關硬體的運作 與電子訊號的傳遞來達成其功能。 以記意卡來保護軟體之系統〗係與一記憶卡資訊讀取 j置5配合,以讀取記憶卡2中所儲存的資訊。在本實施例 中,S己憶卡貝矾讀取裝置5可採用RS232、pcMciA、“/2或 習:Ϊ介面與以記憶卡來保護軟體之系統1進行 ίΐ ΐ▲二憶卡資訊讀取裝置5可採用接觸式的 作:或i、尚红:ΐ憶f2相互接觸來進行資料的存取動 習嗜:技5 Ϊ 了 π f記憶卡2進行無線式的資料交換。熟 i項技術者可依據實際的狀況或需求選擇不同的實施手 軟體7可為任何一種資 企業資源頻查私 貝枓片&,例如,但不僅限於, 資料等i、、一人、繪圖軟體、電腦辅助設計軟體或文書 飼服益8係一盘網技★日、* 4立 括-中央處理單开一連接之網路伺服器,其至少包 行連線所必需之相^電腦可讀取之儲存裝置,與網路進 之週邊設備,且彼h '"置j以及其它完成其功能所應具備 來記錄或傳遞資气。之間係以具有具體物理量的電子訊號 完成者,故此卢^ i上述内容係熟習該項技術者所能輕易 … 个再加以贅述。 網路9可為任何—/ & 網際網路、區域網路心、汛連接,例如,但不僅限於, 請參照圖2 ( a ) 見頻網路或無線通訊網路等。 有積體電路晶片的知彗在本實施例中,記憶卡2為一設置 9慧卡(smart card ),其儲存第一識 556076Page 9 The physical quantities and the wedges 11 and 2 Γ are used to order or transfer information. The above-mentioned receiving 556076 5. Description of the invention (6) --- After reading through the central processing unit, it can achieve its function through the operation of related hardware and the transmission of electronic signals. The system for protecting software with a mind card is to cooperate with a memory card information reading j setting 5 to read the information stored in the memory card 2. In this embodiment, the memory card reading device 5 can use RS232, pcMciA, "/ 2 or Xi: Ϊ interface and the system 1 to protect the software with a memory card to carry out ΐ ΐ ▲ ▲ memory card information reading The device 5 can use a contact type: or i, Shang Hong: ΐ memory f2 contact each other to access the data. Addiction: Technology 5 π π f memory card 2 for wireless data exchange. Skill i technology You can choose different implementation software according to the actual situation or needs. 7 You can frequently check private resources for any kind of enterprise resources, such as, but not limited to, data, i., One person, drawing software, computer-aided design. Software or document feeding service 8 series of one-disk network technology ★ Japanese, * 4 stand-up-central processing single open one connection network server, which includes at least the necessary computer connection readable storage device , And the peripheral equipment connected to the network, and each other's equipment and other functions necessary to complete its functions to record or transfer energy. The electronic signal with specific physical quantities between the completion, so Lu ^ i above The content is easy for those familiar with the technology ... The network 9 can be any-/ & internet, local area network, flood connection, for example, but not limited to, please refer to FIG. 2 (a) video frequency network or wireless communication network, etc. In this embodiment, the memory card 2 is a 9 smart card, which stores the first identification 556076.

別資訊2 1、第二識別資訊2 2、離線使用時間2 3以及有效期 限24專。其中’第一識別資訊21可包括一 pin (personal identification number,個人識別號碼)211,第二識別 資訊22則包括例如卡號221以及序號222等。此外,記憶卡 2尚儲存了授權碼27與臨時授權碼28,其中授權碼27可開 放軟體7之使用權限給使用者6,臨時授權碼2 8則可於一定 時限内,開放軟體7之使用權限給使用者6。需注意者,熟 習該項技術者可視實際的狀況,對第一識別資訊2丨以及第 二識別資訊2 2内容作修改,例如第一識別資訊2丨與第二識 別資訊2 2可均為p I n碼,或為其它之具有識別身份功能之 資料。 本實施例以智慧卡作為記憶卡的原因,為智慧卡的保 密機制是國際組織認證的加密機制,其具有加密技術破解 困難與不易複製等優點。然而,熟悉該項技術者亦可採用 其它具有資料記憶功能的卡片來作為記憶卡2,而不超出 本發明之精神與範圍。 由於以具有積體電路晶片的智慧卡來作為記憶卡2, 所以記憶卡2除了可以儲存資料以外,尚具備了可執行特 定功能之模組。例如,在本實施例中,記憶卡2即包括一 離線使用時間管理模組25以及一有效期限管理模組26,以 管理與設定記憶卡上的離線使用時間23以及有效期限24。 上述之兩個官理模組可儲存於積體電路晶片的r〇m (read_only memory,唯讀記憶體)或eepr〇M (electrical erasable programmable ROM,可覆寫可程Other information 2 1. Second identification information 2 2. Offline use time 2 3 and validity period 24. The first identification information 21 may include a pin (personal identification number) 211, and the second identification information 22 includes, for example, a card number 221 and a serial number 222. In addition, the memory card 2 also stores an authorization code 27 and a temporary authorization code 28, of which the authorization code 27 can open the use right of the software 7 to the user 6, and the temporary authorization code 28 can open the use of the software 7 within a certain period of time. Permission to user 6. It should be noted that the content of the first identification information 2 丨 and the second identification information 2 2 may be modified by those skilled in the art depending on the actual situation. For example, both the first identification information 2 丨 and the second identification information 22 may be p. I n code, or other information with identification function. The reason that the smart card is used as the memory card in this embodiment is that the security mechanism of the smart card is an encryption mechanism certified by an international organization, which has advantages such as difficulty in cracking the encryption technology and difficulty in copying. However, those skilled in the art can also use other cards with data memory function as the memory card 2 without departing from the spirit and scope of the present invention. Since a smart card with an integrated circuit chip is used as the memory card 2, in addition to storing data, the memory card 2 also has a module capable of performing specific functions. For example, in this embodiment, the memory card 2 includes an offline use time management module 25 and an expiration date management module 26 to manage and set the offline use time 23 and the expiration date 24 on the memory card. The two official modules mentioned above can be stored in r〇m (read_only memory) or eepr〇M (electrical erasable programmable ROM), which can be overwritten and programmed.

556076 五、發明說明(8) 式化唯讀§己憶體)中,以供其它的電子裝置呼叫,並以積 體電路曰曰片中的微處理器(micr〇 pr〇cess〇r)執行離線 使用時間管理模組25與有效期限管理模組26以實現其功 能。 请參照圖2 ( B ),在本實施例中,伺服器8儲存有使 用者帳號資料81、登入模組82以及第三識別資訊⑽。其 中使用者帳號資料81可包括例如使用者姓名、代碼及電子 郵件等使用者6之個人基本資料,以及如對於軟體7之付費 時間、、付費金額與軟體使用期限等的記錄資料。登入模組 82可為一提供使用者登入介面,讓使用者能夠在輸入代號 與密碼後’能狗登入至伺服器8iASP (active server pa^e,主動式伺服器網頁)程式模組,或是能夠依據特定 的識別資訊來自動進行登入動作的程式模組。熟習該項技 術者可依據貫際的狀況或需求來進行變更。第三識別資訊 83則包括例如使用者登錄卡號83ι與使用者登錄序號832 等。 以下將參照相關圖式,進一步說明依本發明較佳實施 例之以記憶卡來保護軟體之系統1來保護軟體的方法。 請參照圖3 ( a ),依本發明較佳實施例之以記憶卡來 保護軟體之方法3先進行步驟3〇1,以接收模組^接收使用 者6所輸入之使用者輸入識別資訊。在此步驟301中,前述 之接收模組11可接收使用者6利用電腦裝置的鍵盤所輸入 之使用者輸入識別資訊。若記憶卡資訊讀取裝置5上設置 有按鍵組’則接收模組11亦可接收使用者6利用此按鍵組556076 V. Description of the invention (8) The formatted read-only § Jiyi body) for other electronic devices to call, and executed by the integrated circuit microprocessor (micr〇pr〇cess〇r) The time management module 25 and the expiration date management module 26 are used offline to realize their functions. Referring to FIG. 2 (B), in this embodiment, the server 8 stores user account information 81, a login module 82, and third identification information ⑽. The user account data 81 may include basic personal information of the user 6 such as the user name, code, and e-mail, as well as recording data such as the time paid for the software 7, the amount of the payment, and the period of use of the software. The login module 82 can provide a user login interface, so that the user can log in to the server 8iASP (active server pa ^ e) program module after entering the code and password, or A program module capable of automatically performing a login operation based on specific identification information. Those skilled in the art can make changes based on the situation or needs at the time. The third identification information 83 includes, for example, a user registration card number 83m and a user registration serial number 832. The method of protecting software by the system 1 for protecting software with a memory card according to a preferred embodiment of the present invention will be further described below with reference to related drawings. Referring to FIG. 3 (a), according to a preferred embodiment of the present invention, a method 3 for protecting software with a memory card 3 first performs step 301 to receive a module ^ receiving user input identification information input by the user 6. In this step 301, the aforementioned receiving module 11 can receive the user input identification information input by the user 6 using the keyboard of the computer device. If a key set is provided on the memory card information reading device 5, the receiving module 11 can also receive the user 6 using this key set.

第12頁 556076 五、發明說明(9) d的/ί用者輸入識別資訊。然而,熟習本技術者可舒 ΪΓ:」進行各種修改,以因應不同的需求,例如4 辨識模組來作為接收模組11,以將使用者的聲 曰 ':、子戒號,進而得到使用者輸入識別資訊。 恃卡2上者Λ行步驟302 ’以判斷使用者輸入識別資訊與記 ^卡2上的第一識別資訊21是否相符β例如,若使用者 鍵/上的數字鍵來輸人使用者輸人識別資訊,則 ί㈣斷使用者6所輸入的—連串數字,肖第—識別 =2中㈣人識別號碼211是否相同。若不相同則回到 ^ 3。,凊使用者重新輸入,若相同則進入下一步驟 $ =3〇3以網路狀態谓測模組12偵測網路的連線狀 Γ進^2\服器、8連線。步驟3〇4則針對是否能夠與伺服器 辂、仃判別。例如,藉由執行ping協定的UNIX公 回广:达一封包給伺服器8的1P位址,並等待伺服器8的 ς 測試是否可以與健器8連線。在步雜4的判別 =8’、^可與飼服器8連線’則進入步驟3〇5,若無法與伺 二Γ驟H,則進入步驟3U,以取得一臨時授權碼28,並 、γ鄉312中,以臨時授權碼28開放軟體7之使用權限。 ^驟305中,伺服器登入模組13呼叫儲存於饲服器8 中的且=模組82,以登入伺服器8以讀取第三識別資訊 =。如前所述,登入模組82可為一ASp程式模組, 若H特定的識別資訊來自動進行登入動作的程式模組。 右馮ASP程式模組,則使用者6須輸入例如使用者代號及密 第13頁 556076 五、發明說明(ίο) 碼等,以進行輸入的動作 ^ 模組,則其可依據,例^ tf自動進行登入動作的程式 第-識別資訊,來進行自動=伺服器登入模組13所傳送之 θ動登入的動作。 在登入成功後’步驟 則次咖 比上Ο 驟30 6判斷自伺服器8讀取之第=螞 別資訊83與記憶卡2上儲在沾垃 t ^ ^ ^ 4 > μ a 存的第二識別資訊22是否相符。 μ ^ 鄉3 0 6係比對記憶卡2上所儲在沾 卡號221與序號222是否分別盥a ηρ怒。|下ζ上所储存的 八你本% I刀別與飼服器8中所儲存之使用者 登錄卡唬8 3 1與使用者登錄戽♦ , 不斤唬8 3 2相同。若不相同,則推 入步驟317,拒絕使用者6使 ^ " 1文用軟體7。右為相同,則進入 下一步驟,即步驟307。 在步驟307中,記憶卡資訊讀取裝置5自記憶卡2讀取 :授權碼’並於步驟308中,以此授權碼開放軟體7的使用 榷限給使用者6 ’讓使用者6得以使用軟體7。有關以授權 碼來授與使用者軟體使用權限之部份,由於為熟習該項技 術者所熟知,故此處不予贅述。 在本實施例中,使用者6取得軟體7的使用權限後,除 了使用者6主動退出軟體7之外,尚有兩種狀況會讓使用者 失去使用軟體7的權限,一種則為與伺服器8的網路連線中 斷,另一種為圯憶卡2被移除或使用者退出軟體7。以下詳 細說明此兩種狀況。 在步驟3 0 9中,若與伺服器8的網路連線中斷,則會進 入步驟3 1 3,計算使用者能夠使用軟體之離線使用時間。 在此步驟中,前述之離線使用時間管理模組2 5會在無法經 由網路9與飼服器8進行連線時,開始計算使用者6能夠使Page 12 556076 V. Description of Invention (9) d / ί The user enters identification information. However, those skilled in the art can relax Γ: "Make various modifications to meet different needs, such as 4 identification modules as the receiving module 11 to use the user's voice ':, sub ring, and then get used Enter identification information.者 Go to card 2 and go to step 302 'to determine whether the user ’s input identification information matches the first identification information 21 on card 2. For example, if the user key / number key on the user key is entered, the user enters If the identification information is the same, it is determined whether or not the user-entered series of digits of the user 6 and Xiaodi-identification = 2 have the same person identification number 211. If not, return to ^ 3.凊 The user re-enters. If they are the same, go to the next step. $ = 3〇3 Use the network status test module 12 to detect the connection status of the network. Γ 2 ^ Server, 8 connections. Step 304 judges whether it can be compared with the server 辂 and 仃. For example, by implementing the UNIX public broadcast of the ping protocol: reach a 1P address to the server 8 and wait for the server 8 to test whether it can connect to the health machine 8. The discrimination at step 4 = 8 ', ^ can be connected to feeder 8', then proceed to step 305, if it is unable to communicate with server Γ step H, then proceed to step 3U to obtain a temporary authorization code 28, and In γ township 312, the use right of software 7 is opened with a temporary authorization code 28. ^ In step 305, the server login module 13 calls and = module 82 stored in the feeder 8 to log in to the server 8 to read the third identification information =. As described above, the login module 82 may be an ASp program module, and a program module that automatically performs a login action if H has specific identification information. Right Feng ASP program module, the user 6 must enter, for example, the user code and password. Page 13 556076 5. Invention Description (ίο) code, etc., to perform the input action. ^ Module, it can be based on, for example, ^ tf The program-identification information that automatically performs the login action is to perform the automatic login action transmitted by the server login module 13. After the login is successful, the step is compared to step 0. Step 6 6 It is judged that the number read from the server 8 = the information 83 and the memory card 2 are stored in the t ^ ^ ^ 4 > μ a Second, whether the identification information 22 matches. μ ^ Township 3 0 6 compares whether the card number 221 and the serial number 222 stored on the memory card 2 are different. | The 你 %% I knife stored on the lower ζ is the same as the user registration card 8 3 1 stored in the feeder 8 and the user registration 戽 ♦, but not 8 8 2. If they are not the same, the process proceeds to step 317, and the user 6 is rejected to use ^ " 1 text software 7. The right is the same, then go to the next step, step 307. In step 307, the memory card information reading device 5 reads from the memory card 2: Authorization code ', and in step 308, the use of the software 7 is restricted to the user 6 and the user 6 is allowed to use it. Software 7. The part about granting user software permission with authorization code is well known to those skilled in this technology, so it will not be repeated here. In this embodiment, after the user 6 obtains the use right of the software 7, in addition to the user 6 actively exiting the software 7, there are two situations that will cause the user to lose the right to use the software 7. One is with the server. The network connection of 8 is interrupted, the other is that the memory card 2 is removed or the user exits the software 7. These two conditions are explained in detail below. In step 309, if the network connection with the server 8 is interrupted, step 3 1 3 will be entered to calculate the offline use time of the user when the software can be used. In this step, the aforementioned offline use time management module 25 will start to calculate when the user 6 can enable the connection with the feeder 8 via the network 9

第14頁 556076Page 14 556076

== 午線使用時間23 ’並視實際需要,將此離線使 ,曰° 、录於3己憶卡2中。離線使用時間管理模组25叶 =使夺間,作…前述之網路狀態偵測模組 8 'έ &έ H* \ 田網路狀態偵測模組1 2發現無法與伺服器 8連線寸,即呼叫離線使用時間管理模組25, 線使用時間23。 间始。1* #離 行牛之外,前述之步驟312完成之後也接著進 灯^驟313。兩者的差別在於,若由步驟3〇9進行至步驟 =、隹表:ί前有成功地與伺服器8連線過,而若是由步驟 312進仃至步驟313,則表示從一開始就無法 而/本實施例中,不論是上述的哪-種狀況使用 者θ均可在一定期間之内,取得軟體7的使用權限。此種 Γ/Λντ心。首先,離線使料間23可視為使用 里枓眷、士人體7之奴试用時間,使其可於試用滿意以後, 為正式的會員;若使用者無意付胃,則使用者6 P使持有圮憶卡2 ,也無法在試用時間用完後繼續使用 體7。再者即使網路9因為某些不可抗力無法運作,使用 者6也不會因此而無法使用軟體7。當網路斷線時,使用 6仍可在有限的離線使用時間23之内繼續使用 間進行存播或備份的工作。如此,將可兼顧= 與使用者的安全性與便利性。 用者6 則進 、若在步驟310與步驟315中,記憶卡2被移除或使 退出軟體7,或於步驟314中,離線使用時間23為零 入步驟316,終止使用者6對於軟體7的使用權限。== Use time of the mid-day line 23 ′ and according to actual needs, take this offline, say °, and record it in 3 Ji memory card 2. Offline use time management module 25 leaves = make a win, make ... the aforementioned network status detection module 8 'έ & έ H * \ Tian network status detection module 1 2 found that it could not connect to server 8 Line size, namely call offline use time management module 25, line use time 23. Begin. 1 * #In addition to leaving the cattle, proceed to step 313 after completing the aforementioned step 312. The difference between the two is that if you go from step 309 to step =, then: You have successfully connected to server 8 before, but if you go from step 312 to step 313, it means that from the beginning It is impossible / in this embodiment, the user θ can obtain the use right of the software 7 within a certain period of time regardless of the above-mentioned conditions. This Γ / Λντ heart. First of all, offline use of the material room 23 can be regarded as the trial time of the servants and the slaves of the human body 7, so that they can become full members after the trial is satisfied; if the user does not intend to pay the stomach, the user 6 P makes圮 Memory card 2, also can not continue to use the body 7 after the trial time runs out. Furthermore, even if the network 9 cannot work due to some force majeure, the user 6 will not be unable to use the software 7 because of this. When the network is disconnected, using 6 can still continue to work for storage or backup within the limited offline use time23. In this way, the safety and convenience of the user can be balanced. The user 6 enters, if in step 310 and step 315, the memory card 2 is removed or the software 7 is exited, or in step 314, the offline use time 23 is zero and step 316 is terminated, and the user 6 terminates the software 7 Usage rights.

第15頁 556076 -- -— 五、發明說明(12) 請參照圖4,少— 可直接利用網路9幻路為可正常連線之狀態下,使用者6 更新動作。首先/、在1服器8進行記憶卡2上所错存資料之 所輸入之使用者輪中’接收模組11接收使用者6 斷使用者輸入識別資I j貝讯。接者進行步驟402,以判 否相符。若不相與記憶卡2上的第—識別資訊21是 若相同則進入;步驟^ ’請使用者6重— 中的 ί=8?,’^ 83。接著步驟404判以二入广?,讀取第三識別資訊 記憶卡2上儲存的第]!态8頊取之第三識別資訊83與 則進入步驟tot 別資訊22是否相符。若不相同, 進入步驟405,以進者6使用軟體7。若為相同,則 期限24的更新。丁 έ己憶卡2上之離線使用時間23或有效 在步驟405中,由协伯田土 β , 伺服器8之雙重:切、,=用ί6之身份已經過記憶卡2與 時間管理模έ2卩〜 權限官理模組1 4可呼叫離線使用 23,^ =期己憶卡2所儲存之離線使用時間 之使^者理模組26 ’以根據飼服器8所健存 2,使用者帳戒資料81重新設定記憶卡2所儲存之有效期: 來作;ΐ;ΐ2’,在Λ貫身施:匕’:,所述,由於以智慧卡 時間管理模組25與有效期限管理模組26均可儲存 、思上,並以内建於記憶卡2上的微處理器來執行。 第16頁 556076 五、發明說明(13) ㊁二離線使用時間f理模組25與有 記Γ來保護軟體之系統1中。如此,^ 2,並由以卡任戈何僅具有記憶功能之卡片來作為記憶卡 線使用時間5 3盘有效7統1來進行記憶卡2上離 了间“興有效期限24的管理與設定。 憶卡限的認證時,依本發明之以記 使用=…因此其可有效地防止未付費之使用者持績 卡被明;保護軟體之系、统,由於當記憶 :::多除日守*用者即失去軟體的使用權限,因 限被”的狀況發生,,當使用 Π 走記憶卡,其它人即無法盜用 其帳唬,如此可避免習知技術中,使用者 出,則其帳號會被後續其它使用者盜用的危:…體- 路斷發=記憶卡來保護軟體之系統與方法,在網 路斷線時,使用者仍可繼續使用—段時間 使用上的便利性。 八%捉开ί 依本發明之以記憶卡來保護軟體之系統與方法,舍網 路恢復連線時,系統會自動檢查記憶卡上的有效期限二離 線使用時間’並重新進行設定。如此,使用者的權限有效 期限與離線使用時間均可以自動地進行線上更新,大幅提 升了使用者使用軟體的便利性。 以上所述僅為舉例性,而非為限制性者。任何未脫離 第17頁 556076 五、發明說明(14) 本發明之精神與範疇,而對其進行之等效修改或變更,均 應包含於後附之申請專利範圍中。Page 15 556076 ----- V. Description of the invention (12) Please refer to Figure 4, less — the user 9 can update the action by directly using the network 9 and the magic road can be connected normally. First // in the user's input of the data stored on the memory card 2 by the server 8 ', the receiving module 11 receives the user 6's user input identification information. The receiver then proceeds to step 402 to determine a match. If it is not the same as the first-identification information 21 on the memory card 2, go to the same if it is the same; Step ^ 'Please ask the user for 6 times-ί = 8?,' ^ 83. Then step 404 is judged to be two into the Cantonese? , Read the third identification information on the memory card 2]]! The third identification information 83 captured by the state 8 and the procedure goes to step tot whether the information 22 matches. If they are not the same, proceed to step 405 to use the software 7 by the entrant 6. If they are the same, the update period is 24. The offline use time 23 on Dingjiji card 2 or valid in step 405 is doubled by Xie Botian soil β, server 8: cut ,, = the identity of 6 has passed the memory card 2 and time management module 2έ ~ The authority management module 1 4 can be called for offline use 23, ^ = the offline management time stored in the Jiji memory card 2 ^ management module 26 'to save according to the feeder 8 health 2, user account For the data 81, reset the validity period stored in the memory card 2: :; ΐ; ΐ 2 ', in the Λ gang body: dagger' :, said, because the smart card time management module 25 and the validity period management module 26 Both can be stored, thought, and executed by a microprocessor built into the memory card 2. Page 16 556076 V. Description of the invention (13) Secondly, the system 1 is used to protect the software by using the time management module 25 and the record Γ offline. In this way, ^ 2, and the use of Ka Ren Ge He only has a memory function of the card as a memory card line use time 5 3 disks valid 7 unified 1 to carry out the management and setting of the expiration date 24 on the memory card 2 . When the card-restricted authentication is used according to the invention = ... Therefore, it can effectively prevent the unpaid user's performance card from being known; the system and system of protecting software, because when the memory ::: multi-day The user who keeps the software will lose the right to use the software, and the situation will be limited. When using a memory card, other people will not be able to misappropriate his account. In this way, in the conventional technology, if the user comes out, then his Danger of account misappropriation by other users: ...-System and method of software interruption = memory card to protect software. When the network is disconnected, users can continue to use-convenience for a period of time. Eighty percent of the time, the system and method for protecting software with a memory card according to the present invention. When the network is restored, the system will automatically check the expiration date on the memory card and use the offline time 'and reset it. In this way, both the validity period of the user's rights and offline use time can be automatically updated online, which greatly improves the convenience of the user to use the software. The above description is exemplary only, and not restrictive. Any equivalent modification or change made to the invention without departing from the spirit and scope of the invention on page 17 556076 (14) shall be included in the scope of the attached patent application.

第18頁 556076 圖式簡單說明 【圖式之簡單說明】 圖1為一示意圖,顯示依本私 ^ 卡來保護軟體之系統的架構。明較佳實施例之以記憶 圖2 ( A )為一示意圖,顯示印斤 圖2⑴為-示意圖,顯示所儲存之資料。 圖3為-流程圖,顯示依本了:/:,存之… 卡來保護軟體之方法的流程。*啟佳貫施例之以记憶 圖4為一流程圖,顯示在依 憶卡來保護軟體之方法中,更X月較佳實施例之以記 線使用時間的流程❶ θ慧卡上之有效日期或離 【圖式符號說明】 11121314 2212112222122223 以冗憶卡來保護軟體 接收模組 網路狀態偵測模組 飼服器登入模組 權限管理模組 記憶卡 第—識別資訊 個人識別號碼 第二識別資訊 卡號 序號 離線使用時間 之系統Page 18 556076 Schematic description of the diagram [Simplified description of the diagram] Fig. 1 is a schematic diagram showing the architecture of a system for protecting software based on the private card. Figure 2 (A) is a schematic diagram showing the printed weight. Figure 2 (a) is a schematic diagram showing the stored data. Figure 3 is a flow chart showing the flow of the method of protecting software by saving the :::: card. * The memory of Qi Jiaguan's example is shown in Figure 4 as a flow chart, which is shown in the method of protecting software by memory card, and the flow of recording the time of use in the preferred embodiment of the month. 之Valid date or departure [Illustration of graphical symbols] 11121314 2212112222122223 Use a redundant memory card to protect the software receiving module Network status detection module Feeder login module Authority management module Memory card No. 2—identification information Personal identification number No. 2 System for identifying information card number serial number offline use time

第19頁 556076Page 19 556076

第20頁 圖式簡單說明 24 有效期限 25 離線使用時間管理模組 26 有效期限管理模組 27 授權碼 28 臨時授權碼 3 以記憶卡來保護軟體之方法 301 〜317 以記憶卡來保護軟體之方法的步驟 401 〜406 更新使用期限或離線使用時間之步驟 5 記憶卡資訊讀取裝置 6 使用者 7 軟體 8 伺月艮器 81 使用者帳號資料 ’ 82 登入模組 83 第三識別資訊 831 使用者登錄卡號 832 使用者登錄序號 9 網路Schematic description on page 20 24 Validity period 25 Offline time management module 26 Validity period management module 27 Authorization code 28 Temporary authorization code 3 Method to protect software with a memory card 301 ~ 317 Method to protect software with a memory card Steps 401 to 406 Steps to update the use period or offline use time Step 5 Memory card information reading device 6 User 7 Software 8 Server server 81 User account information '82 Login module 83 Third identification information 831 User registration Card No. 832 User Registration No. 9 Internet

Claims (1)

、申凊專利範圍 種以兄憶卡來伴★舊 及一伺服器配合,琴人體之系統,其係與一記憶卡以 識別資訊,該彳IM、卡儲存一第一識別資訊與一第二 該以記憶卡來保護軟體之貝訊, —接收模組,其接 田、j匕3 · 識別資訊; "" 文 使用者所輸入之一使用者輸入 別該以;z = f偵測模組,其伯測網路之連線狀態,以判 服器進;亍:線來保護軟體之系統是否能夠經由網路與該伺 人钤0 ^器登入模組,其係當該使用者輸入識別資訊符 ^思/所儲存之該第一識別資訊,且該以記憶卡來保 :二之糸統能夠經由網路與該伺服器進行連線時,經由 祛&:」儲,於該伺服器之登入函數,以登入該伺服器並 Μ司服器中所儲存之該第三識別資訊;以及 +所Μ 2限官理模組,其係當該第三識別資訊符合該記憶 使用者。子之該第二識別資訊時,開放軟體之使用權限給該 2·如申請專利範圍第丨項所述之以記憶卡來保護軟體 統’更包含: 乐 …夠讀取該記憶卡健存之 體之系 3·如申請專利範圍第1項所述之以記憶卡來保護軟 556076The scope of Shenyin's patents is accompanied by a brother memory card. The old and a server system, the piano body system, is associated with a memory card to identify information. The IM and card store a first identification information and a second The memory card should be used to protect the software. —Receiving module, which is connected to the field, j D3 · Identification information; " " One of the user's input should be entered by the user; z = f detection Module, which measures the connection status of the network to judge the server; 亍: Whether the system that protects the software through the network can log in to the module with the server through the network, which is when the user Enter the identification information 思 thinking / the first identification information stored, and the memory card should be used to protect: When the Erzhi system can connect with the server via the network, it is stored through the &: A login function of the server to log in to the server and the third identification information stored in the server; and + the M 2 limited official management module, which is used when the third identification information matches the memory By. In the case of the second identification information, the use right of the open software is granted to the software. As described in item 丨 of the scope of patent application, the use of a memory card to protect the software system includes: System 3. Protect the software with a memory card as described in item 1 of the scope of patent application 556076 、該記憶卡更儲存一離線使用時間,且當該離線使用時 間為零時’該使用者對於該軟體的使用權限即被終止。 4 ·如申請專利範圍第3項所述之以記憶卡來保護軟體之系 統,其中 當該使用者輸入識別資訊符合該記憶卡所儲存之該第 ,別資訊’該以記憶卡來保護軟體之系統能夠經由網路 與該伺服器進行連線,且該第三識別資訊符合該記憶卡所 儲存之該第二識別資訊時,該記憶卡上所儲存之該離線使 用時間即被重新設定。 〕·如申請專利範圍第3項所述之以記憶卡來保護軟體之系 統,更包含: 一離線使用時間管理模組,其當該以記憶卡來保護軟 體之系統無法經由網路與該伺服器進行連線時,計算該使 用者能夠使用該軟體之該離線使用時間。 ^ δ,如申請專利範圍第1項所述之以記憶卡來保護軟體之系 統,其中 ’ 該伺服器更儲存一使用者帳號資料; 該記憶卡更儲存一有效期限;且 當該使用者輸入識別資訊符合該記憶卡所儲存之該第 一識別資訊,該以記憶卡來保護軟體之系統能夠經由網路2. The memory card further stores an offline use time, and when the offline use time is zero, the user's right to use the software is terminated. 4 · A system for protecting software with a memory card as described in item 3 of the scope of the patent application, wherein when the user's input identification information matches the number stored in the memory card, the other information 'the software should be protected with a memory card When the system can connect to the server via the network and the third identification information matches the second identification information stored on the memory card, the offline use time stored on the memory card is reset. 】 · The system for protecting software with a memory card as described in item 3 of the scope of patent application, further including: An offline time management module, when the system using the memory card to protect the software cannot communicate with the server via the network When the device is connected, calculate the offline usage time that the user can use the software. ^ δ, a system for protecting software with a memory card as described in item 1 of the scope of the patent application, wherein the server further stores a user account data; the memory card further stores a validity period; and when the user enters The identification information matches the first identification information stored in the memory card, and the system for protecting software with the memory card can pass through the network 第22頁 556076 六、申請專利範圍 與該伺服器進行連線,且該第三識別資訊符合該記憶卡所 儲存之該第二識別資訊時,該有效期限將依據該伺服器所 儲存之該使用者帳號資料重新設定。 7 ·如申凊專利範圍第1項所述之以記憶卡來保護軟體之系 統’其中該第一識別資訊包含一個人識別號碼(p丨N, personal identification number ) 〇 8·如申請專利範圍第1項所述之以記憶卡來保護軟體之系 統’其中該第二識別資訊包含一記憶卡編號。 9·如申請專利範圍第1項所述之以記憶卡來保護軟體之系 統,其中該第二識別資訊包含一序號(serial number )° 10·如申請專利範圍第1項所述之以記憶卡來保護軟體之 系統’其中該第三識別資訊包含一記憶卡編號。 11·如申請專利範圍第1項所述之以記憶卡來保護軟體之 系統’其中該第三識別資訊包含一序號(serial number )° 12. 一種以$己憶卡來保護軟體之方法,其係實施於一使用 者端電腦系統,並與一記憶卡以及一伺服器配合,該記憶 IH 第23頁 556076 六、申請專利範圍 _ η 一第一識別資訊與一第二識別資訊 存一第三識別資訊, 飞柯服器則儲 ::記憶卡來保護軟體之方法包 接收一使用者所輸入之一使 二驟. 偵測網路之連線狀態,以= 訊,· 否能夠經由網路與該伺服器進行連^使用者、電腦系統是 备該使用者輸入識別資訊符合該記憶卡 一識別資訊,且該使用者端電腦系統能夠經網 = ::進行連線時,㈣網路呼叫儲存於該飼服=二:: ^ ,以登入該伺服器並讀取該伺服器中所儲# $第- 識別資訊;以及 τ所儲存之該第二 當該第三識別資訊符合該記憶卡所儲 資訊時,開放軟體之使用權限給該使用者。δ亥第一為別 1 3 ·如申請專利範圍第1 2項所述之以記憶卡來保護軟體之 方法,其中 該使用者端電腦系統係以一記憶卡資訊讀取裝置來讀 取該記憶卡儲存之該第一識別資訊與該第二識別資訊。 14·如申請專利範圍第1 2項所述之以記憶卡來保護軟體之 方法,其中 該記憶卡更儲存一離線使用時間’且當該離線使用時 間為零時,該使用者對於該軟體的使用權限即被終止。 第24頁 556076 六、申請專利範圍 ' T明哥刊範圍 1 5 ·如申請專利範圍第1 4項所述之以記憶卡來保護軟體之 方法,更包含: 當該使用者端電腦系統無法级由網路與該伺服器進行 連線時,計算該使用者能夠使用該軟體之該離線使用時 間。 16·如申請專利範圍第1 4項所述之以記憶卡來保護軟體之 方法,更包含: 當該使用者輸入識別資訊符合該記憶卡所儲存之該第 一識別資訊’該使用者端電腦系統能夠經由網路與該飼服 器進行連線,且該第三識別資訊符合該記憶卡所儲存之該 第二識別資訊時,重新設定該記憶卡上所儲存之該離 ^ 用時間。 ^ 、、,更 17. 方法,其中 如申請專利範圍第12項所述之以記憶卡來保護軟之 ,其中 該伺服器更儲存一使用者帳號資料; 該記憶卡更儲存一有效期限;且 該方法更包含: 當該使用者輪入識別資訊符合該 一識別資㉛,該使用者端電腦系統能思所儲存之該第 器進行連線,且該第三識別資訊符合^,由網路與該伺服 第二識別資訊時,依據該伺服器所二二記憶卡所儲存之該 重新設定該有效期限。 子之使用者帳號資料Page 22 556076 6. When the scope of patent application is connected with the server, and the third identification information matches the second identification information stored in the memory card, the validity period will be based on the use stored in the server User account data reset. 7 · A system for protecting software with a memory card as described in item 1 of the scope of patent application 'wherein the first identification information includes a personal identification number (p 丨 N, personal identification number) 〇8. A system for protecting software with a memory card according to the above item, wherein the second identification information includes a memory card number. 9 · A system for protecting software with a memory card as described in item 1 of the scope of patent application, wherein the second identification information includes a serial number ° 10 · A memory card as described in item 1 of the scope of patent application A system to protect software 'wherein the third identification information includes a memory card number. 11. A system for protecting software with a memory card as described in item 1 of the scope of the patent application, wherein the third identification information includes a serial number. 12. A method for protecting software with a $ memory card, which It is implemented in a user-end computer system and cooperates with a memory card and a server. The memory IH page 23 556076. 6. Scope of patent application_ η A first identification information and a second identification information are stored a third Identification information, Feike server stores :: memory card to protect the software package receiving one input from a user to make two steps. Detect the connection status of the network with = message, whether it can go through the network Connect with the server ^ The user and the computer system are prepared for the user to input identification information that matches the identification information of the memory card, and the client computer system is able to make a network call when connected via the network = :: Stored in the feeding clothing = 2 :: ^ to log in to the server and read the # $ 第-identification information stored in the server; and the second when the third identification information stored in τ matches the memory card Stored Information , The usage rights of open software to the user. Delta Hai is the first one. The method of protecting software with a memory card as described in item 12 of the patent application scope, wherein the user-side computer system uses a memory card information reading device to read the memory. The first identification information and the second identification information stored in the card. 14. The method for protecting software by using a memory card as described in item 12 of the scope of the patent application, wherein the memory card further stores an offline use time 'and when the offline use time is zero, the user's The use right is terminated. Page 24 556076 VI. Scope of patent application 'Ting Ming Ge Scope 1 5 · The method of protecting software with a memory card as described in Item 14 of the scope of patent application, including: When the user-end computer system cannot be upgraded When the network is connected to the server, the offline usage time for which the user can use the software is calculated. 16. The method for protecting software by using a memory card as described in item 14 of the scope of patent application, further comprising: when the user's input identification information matches the first identification information stored in the memory card 'the client computer When the system can connect to the feeder through the network, and the third identification information matches the second identification information stored on the memory card, reset the deactivation time stored on the memory card. ^ ,,, and more 17. Method, wherein the soft card is protected as described in item 12 of the scope of patent application, wherein the server further stores a user account data; the memory card further stores an expiration date; and The method further includes: when the user's turn identification information matches the identification resource, the user-end computer system can connect to the stored device, and the third identification information matches ^, and the network When the second identification information is related to the servo, the validity period is reset according to the storage of the second memory card of the server. Child account information 第25頁 556076Page 556 076 六、申請專利範圍 18·如申請專利範圍第丨2項所述之以記憶卡來保護軟體之 方法,其中該第一識別資訊包含一個人識別號碍(p I N, personal identification number ) 〇 19. 如申請專利範圍第1 2項所述之以記憶卡來保護軟體之 方法,其中該第二識別資訊包含一記憶卡編號。 20. 如申請專利範圍第1 2項所述之以記憶卡來保護軟體之 方法,其中該第二識別資訊包含 序號(serial number 21. 如申請專利範圍第1 2項所述之以記憶卡來保護軟體之 方法,其中該第三識別資訊包含一記憶卡編號。 22. 如申請專利範圍第1 2項所述之以記憶卡來保護軟體之 方法,其中該第三識別資訊包含一序號(serial number )0 2 3. —種伺服器’其係與一%憶卡配合’以保護一使用者 端電腦裝置上所安裝之軟體,該記憶卡儲存一第一識別資 訊與一第二識別資机’ 該伺服器包含: 一電腦可讀取之儲存裝置’其儲存一第三識別資訊;6. Scope of patent application 18. The method for protecting software with a memory card as described in item 丨 2 of the scope of patent application, wherein the first identification information includes a personal identification number (p IN, personal identification number) 〇19. Such as The method for protecting software by using a memory card as described in item 12 of the scope of patent application, wherein the second identification information includes a memory card number. 20. The method for protecting software by using a memory card as described in Item 12 of the scope of patent application, wherein the second identification information includes a serial number (serial number 21. As described in Item 12 of the scope of patent application, using a memory card to protect the software) A method for protecting software, wherein the third identification information includes a memory card number. 22. The method for protecting software by a memory card as described in item 12 of the scope of patent application, wherein the third identification information includes a serial number (serial number) 0 2 3. —A server 'which cooperates with a% memory card' to protect software installed on a client computer device, the memory card stores a first identification information and a second identification information machine 'The server contains: a computer-readable storage device' which stores a third identification information; 556076 六、申請專利範圍 以及 一登入模組,其接党該使用者端電腦裝置之呼叫以登 入該伺服器並讀取該伺服器中所儲存之該第三識別資訊, 其中 該使用者端電腦裝置於呼叫該登入模組之前,先接收 一使用者所輸入之一使用者輸入識別資訊,並判斷該使用 者輸入識別資訊是否符合該記憶卡所儲存之該第一識別資 訊, ' 三該 第之 該存。 取儲限 讀所權 並卡用 組憶使 模記之 入該體 登合軟 該符得 叫訊取 呼資即 於別者 置識用 裝三使 腦第該 電該, 端當時 者,訊 用後資 使訊別 該資識 別二 識第 時 使止 線終 中離被 其該即 ,當限 器且權 服,用 伺間使 之時的 述用體 所使軟 項線該 22離於 第一對 圍存者 範儲用 利更使 專卡該 請憶, 申記時 如該零 為 24間 2 5 j, •如申請專利範圍第2 4項所述之伺服器,其中 —▲當該使用者輸入識別資訊符合該記憶卡所儲存之該第 一識別資訊,該使用者端電腦系統能夠經由網路與該伺服 了 =仃連線,且該第三識別資訊符合該記憶卡所儲存之該 :~ 4別資訊時,該記憶卡上所儲存之該離線使用時間即 被重新設定。 26·如申請專利範圍第22項所述之伺服器,其中556076 6. The scope of the patent application and a login module that receives calls from the client computer device to log in to the server and read the third identification information stored in the server, where the client computer Before calling the login module, the device first receives user input identification information input by a user, and determines whether the user input identification information matches the first identification information stored in the memory card. It should be saved. Retrieve and store the right to limit reading and use the group memory to make the module enter the body, register the soft, and the symbol can be called to obtain the call, that is, the other person can use the equipment to make the brain, and the information should be appropriate. Use the latter to make the farewell, the asset identification, the second recognition, the time to stop the line, and the immediate limit, the limiter and the right to serve, using the time to make the use of the statement by the user to make the soft line 22 The first pair of depositors Fan Chuli used the special card to remember, if the zero is 24 2 5 j when applying, • The server described in item 24 of the scope of patent application, where-▲ 当The user input identification information matches the first identification information stored on the memory card, the client computer system is able to connect to the server via the network, and the third identification information matches the storage card. When it should be: ~ 4 different information, the offline time stored on the memory card will be reset. 26. The server as described in item 22 of the scope of patent application, wherein 556076556076 該饲服器更儲存一使用者帳號資料; 該δ己憶卡更儲存一有效期限;且 ^當該使用者輸入識別資訊符合該記憶卡所儲存之該第 二識別資訊’該使用者端電腦系統能夠經由網路與該飼服 °進彳卞連線且该第三識別資訊符合該記憶卡所儲存之兮 第一識別資訊時,該有效期限將依據該伺服器 二 使用者帳號資料重新設定。 w存之該 27·如申請專利範圍第22項所述之伺服器,其中哕钕 , 如次% —人 1必弟一識 乃J貝Λ包含一個人識別號碼(PIN,personal identificati〇n number )。 28·如申請專利範圍第22項所述之伺服器,其中該第二識 別資訊包含一記憶卡編號。 扣 29.如申請專利範圍第22項所述之伺服器,其中該第二識 別資訊包含一序號(serial number)。 3 0·如申請專利範圍第2 2項所述之伺服器,其中該第三識 別資訊包含一記憶卡編號。 31.如申請專利範圍第2 2項所述之伺服器’其中該第三識 別資訊包含一序號(serial number )。The feeder further stores a user account data; the δ self-memory card further stores an expiration date; and ^ when the user input identification information matches the second identification information stored in the memory card 'the client computer When the system can connect to the feeding service via the network and the third identification information matches the first identification information stored in the memory card, the validity period will be reset according to the user account data of the server . The 27. The server as described in item 22 of the scope of patent application, in which dysprosium and neodymium, such as the following% — person 1 must be the first person to know that J Bei Λ contains a personal identification number (PIN, personal identification number) . 28. The server according to item 22 of the scope of patent application, wherein the second identification information includes a memory card number. Deduction 29. The server according to item 22 of the scope of patent application, wherein the second identification information includes a serial number. 30. The server as described in item 22 of the scope of patent application, wherein the third identification information includes a memory card number. 31. The server according to item 22 of the scope of patent application, wherein the third identification information includes a serial number. 第28頁Page 28
TW90107332A 2001-03-28 2001-03-28 System and method for protecting software using memory card TW556076B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW90107332A TW556076B (en) 2001-03-28 2001-03-28 System and method for protecting software using memory card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW90107332A TW556076B (en) 2001-03-28 2001-03-28 System and method for protecting software using memory card

Publications (1)

Publication Number Publication Date
TW556076B true TW556076B (en) 2003-10-01

Family

ID=32228032

Family Applications (1)

Application Number Title Priority Date Filing Date
TW90107332A TW556076B (en) 2001-03-28 2001-03-28 System and method for protecting software using memory card

Country Status (1)

Country Link
TW (1) TW556076B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8621560B2 (en) 2005-05-24 2013-12-31 International Business Machines Corporation User authentication using personal objects
CN103530063A (en) * 2012-07-05 2014-01-22 昆达电脑科技(昆山)有限公司 Resource sharing system, storage device and method for sharing host end device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8621560B2 (en) 2005-05-24 2013-12-31 International Business Machines Corporation User authentication using personal objects
CN103530063A (en) * 2012-07-05 2014-01-22 昆达电脑科技(昆山)有限公司 Resource sharing system, storage device and method for sharing host end device

Similar Documents

Publication Publication Date Title
CN107833052B (en) Block chain-based aggregated payment system and working method
US8751395B2 (en) Verification methods for fraud prevention in money transfer receive transactions
US20090119756A1 (en) Credential Verification using Credential Repository
US20090119757A1 (en) Credential Verification using Credential Repository
US20100094732A1 (en) Systems and Methods to Verify Payment Transactions
CN109684811A (en) Pinpoint personal identification method, device and the server of authorization
US20060212407A1 (en) User authentication and secure transaction system
US20030046237A1 (en) Method and system for enabling the issuance of biometrically secured online credit or other online payment transactions without tokens
US11182774B1 (en) Use of mobile identification credential in merchant and personal transactions
US20210383490A1 (en) Emergency services/virtual travel wallet
WO2017178816A1 (en) Event tickets with user biometric verification on the user mobile terminal
JP6175573B2 (en) Procedure management system and procedure management method
CN101335619A (en) Authorized using method of disposal dynamic cipher telephone or short message
WO2009000130A1 (en) Method and system for realizing network payment
US11392949B2 (en) Use of mobile identification credential in know your customer assessment
CN109711847A (en) Method, apparatus, electronic equipment and the computer storage medium of near-field information certification
US20220301050A1 (en) Digital identity lock
JP2007094874A (en) Financial service providing system
US20140372303A1 (en) Online Authentication and Payment Service
KR20070029537A (en) Authentication system and method using individual unique code linked with wireless terminal
US20180276669A1 (en) Fraud Remedy Tool
KR102121938B1 (en) Apparatus and method for providing a simple settlement service of a corporation account
TW556076B (en) System and method for protecting software using memory card
CN104579690B (en) High in the clouds KEY systems and application method
CN107491967B (en) Method and system for inputting password through network payment

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees