Movatterモバイル変換


[0]ホーム

URL:


CN114357384A - Method, computing device, and computer-readable medium for activating software based on authorization file - Google Patents

Method, computing device, and computer-readable medium for activating software based on authorization file
Download PDF

Info

Publication number
CN114357384A
CN114357384ACN202111544486.1ACN202111544486ACN114357384ACN 114357384 ACN114357384 ACN 114357384ACN 202111544486 ACN202111544486 ACN 202111544486ACN 114357384 ACN114357384 ACN 114357384A
Authority
CN
China
Prior art keywords
authorization file
software product
source code
server
user source
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202111544486.1A
Other languages
Chinese (zh)
Inventor
杨肖铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yozosoft Co ltd
Original Assignee
Yozosoft Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yozosoft Co ltdfiledCriticalYozosoft Co ltd
Priority to CN202111544486.1ApriorityCriticalpatent/CN114357384A/en
Publication of CN114357384ApublicationCriticalpatent/CN114357384A/en
Withdrawnlegal-statusCriticalCurrent

Links

Images

Landscapes

Abstract

The invention provides a method for activating software based on an authorization file, a computing device and a computer readable medium, wherein the method for activating software based on the authorization file comprises the following steps: encrypting a user source code in a server to obtain an authorization file, and transferring the authorization file to the computer equipment, wherein the user source code only corresponds to one computer equipment; opening a software product on a computer device and selecting activation, opening an authorization file by using the software product to perform activation verification, and performing the following steps when performing the activation verification: the software product decrypts the authorization file to obtain a user source code; the software product acquires the information of the local computer equipment to obtain a user source code of the local computer equipment; and the software product compares the user source code obtained by decryption with the locally acquired user source code to confirm whether the activation verification is successful, and if the user source code is matched with the locally acquired user source code, the activation verification is considered to be successful. Compared with the prior art, the method and the system can activate the software based on the authorization file, thereby improving the network security.

Description

Translated fromChinese
基于授权文件激活软件的方法、计算装置以及计算机可读 介质Method, computing device and computer readable medium for activating software based on authorization file

技术领域technical field

本发明涉及软件激活技术领域,尤其涉及一种基于授权文件激活软件的方法、计算装置以及计算机可读介质。The present invention relates to the technical field of software activation, and in particular, to a method, a computing device and a computer-readable medium for activating software based on an authorization file.

背景技术Background technique

在大数据、信息化的时代,随着计算机发展的不断推进,计算机应用已经融入了人们的日常生活。一方面,各种不法公司发行盗版产品,网络安全成为计算机产品的一项重要因素,另一方面,公司不断推出的新产品、新应用,有时用户需要每个依次购买激活方式,而这种基于授权文件的激活,可以有效的保护应用,并且提供给用户一个统一的管理一个公司产品的钥匙,公司可以根据每一个不同的用户所提供的信息独立的控制并掌握发放其激活规则,实现“一机一码”的安全控制。但是,基于授权文件激活软件的实现方式存在技术难度。In the era of big data and informatization, with the continuous advancement of computer development, computer applications have been integrated into people's daily life. On the one hand, various illegal companies issue pirated products, and network security has become an important factor for computer products. The activation of the authorization file can effectively protect the application and provide users with a unified key to manage a company's products. "One Code for the Machine" security control. However, there are technical difficulties in the implementation of software activation based on the authorization file.

因此,有必要提供一种新的技术方案来解决上述问题。Therefore, it is necessary to provide a new technical solution to solve the above problems.

发明内容SUMMARY OF THE INVENTION

本发明的目的在于提供一种基于授权文件激活软件的方法、计算装置以及计算机可读介质,其可以基于“一机一码”的授权文件激活软件,从而提高网络安全性。The purpose of the present invention is to provide a method, a computing device and a computer-readable medium for activating software based on an authorization file, which can activate software based on the "one machine, one code" authorization file, thereby improving network security.

根据本发明的一个方面,本发明提供一种基于授权文件激活软件的方法,其包括:在服务器中对用户源码进行加密得到授权文件,将所述授权文件转移至所述计算机设备中,其中所述用户源码唯一对应一台计算机设备;在所述计算机设备上打开软件产品并选择激活,此时利用所述软件产品打开所述授权文件进行激活校验,在进行激活校验时执行如下步骤:所述软件产品对所述授权文件进行解密得到所述用户源码;所述软件产品采集本地计算机设备的信息得到本地计算机设备的用户源码;所述软件产品将解密得到的用户源码和本地采集的用户源码进行比对以确认激活校验是否成功,若匹配,则认为激活校验成功,能够正常使用所述软件产品。According to one aspect of the present invention, the present invention provides a method for activating software based on an authorization file, comprising: encrypting a user source code in a server to obtain an authorization file, and transferring the authorization file to the computer device, wherein the The user source code uniquely corresponds to a computer device; open the software product on the computer device and select activation, then use the software product to open the authorization file for activation verification, and perform the following steps when performing activation verification: The software product decrypts the authorization file to obtain the user source code; the software product collects the information of the local computer equipment to obtain the user source code of the local computer equipment; the software product decrypts the obtained user source code and the locally collected user source code The source code is compared to confirm whether the activation verification is successful. If there is a match, the activation verification is considered to be successful, and the software product can be used normally.

根据本发明的另一个方面,本发明提供一种计算装置,其包括处理器和存储器,所述存储器中存储有程序指令,该程序指令由处理器执行以实现上述的基于授权文件激活软件的方法。According to another aspect of the present invention, the present invention provides a computing device comprising a processor and a memory, wherein the memory stores program instructions, the program instructions are executed by the processor to implement the above-mentioned method for activating software based on an authorization file .

根据本发明的再一个方面,本发明提供一种计算机可读介质,其内存储有程序指令,该程序指令被执行以实现上述的基于授权文件激活软件的方法。According to yet another aspect of the present invention, the present invention provides a computer-readable medium having program instructions stored therein, the program instructions being executed to implement the above-mentioned method for activating software based on an authorization file.

与现有技术相比,本发明的授权文件激活软件的方式,相比于统一发放的CD-key,需要针对每一个用户进行独立的,特别的供应。它具有一定的保密性以及协议性,它需要用户提供部分源码,这样用户可以对自己购买的产品建立一定的安全保护,发行商则需要根据用户提供的源码,再通过本公司独有的加密技术,进行加密后,发放给用户,起到一机一码的作用,从而提高网络安全性。Compared with the prior art, the way of activating the software by the authorization file of the present invention, compared with the CD-key issued uniformly, requires independent and special supply for each user. It has a certain degree of confidentiality and agreement. It requires users to provide some source code, so that users can establish certain security protection for the products they buy. Publishers need to use the source code provided by users, and then pass the company's unique encryption technology. , encrypted, and distributed to users, playing the role of one machine and one code, thereby improving network security.

附图说明Description of drawings

图1为本发明中的基于授权文件激活软件的方法在一个实施例中的流程示意图。FIG. 1 is a schematic flowchart of a method for activating software based on an authorization file in one embodiment of the present invention.

具体实施方式Detailed ways

为更进一步阐述本发明为达成预定发明目的所采取的技术手段及功效,以下结合附图及较佳实施例,对依据本发明的具体实施方式、结构、特征及其功效,详细说明如下。In order to further illustrate the technical means and effects adopted by the present invention to achieve the predetermined purpose of the invention, the specific embodiments, structures, features and effects of the present invention are described in detail below in conjunction with the accompanying drawings and preferred embodiments.

为更进一步阐述本发明为达成预定发明目的所采取的技术手段及功效,以下结合附图及较佳实施例,对依据本发明的具体实施方式、结构、特征及其功效,详细说明如下。In order to further illustrate the technical means and effects adopted by the present invention to achieve the predetermined purpose of the invention, the specific embodiments, structures, features and effects of the present invention are described in detail below in conjunction with the accompanying drawings and preferred embodiments.

首先,对本发明中的相关术语进行介绍:First, the relevant terms in the present invention are introduced:

1.授权文件:可以是以Lic格式结尾用于激活的一种文件。1. Authorization file: a file that can be used for activation at the end of Lic format.

2.CD-key:商业软件用于安装的序列码,也称为秘钥。2. CD-key: The serial code used by commercial software for installation, also known as the secret key.

3.源码、加密码:根据特定算法,将通过一定规则获取的字符串,称之为源码,并且加密成具有规则的、可以反解密成的字符串,称之为加密码。3. Source code and encryption code: According to a specific algorithm, the string obtained through certain rules is called the source code, and encrypted into a string with rules that can be decrypted, which is called encryption code.

4:一机一码:一台用户计算机对应一个授权文件,即激活码。4: One machine, one code: One user computer corresponds to one authorization file, that is, the activation code.

通过大量的分析,总结出基于授权文件激活软件的难点在于:Through a lot of analysis, it is concluded that the difficulties of activating software based on authorization files are:

1.需要通过用户获取源码,且加密规则通用;1. The source code needs to be obtained from the user, and the encryption rules are common;

2.相比于统一发放的CD-key,授权文件基于每台用户生成;2. Compared with the uniformly issued CD-key, the authorization file is generated based on each user;

3.同一台计算机,用户有意或无意的修改了授权文件,需要进行二次校验;3. On the same computer, the user modifies the authorization file intentionally or unintentionally, and a second verification is required;

4.授权文件需要具有不可识别性,不能轻易被用户及不良商家反编码破解;4. The authorization file needs to be unrecognizable and cannot be easily deciphered by users and bad merchants;

5.实现“一机一码”。5. Realize "one machine, one code".

基于上述分析,本发明提供一种基于授权文件激活软件的方法。Based on the above analysis, the present invention provides a method for activating software based on an authorization file.

请参考图1所示,为本发明中的基于授权文件激活软件的方法在一个实施例中的流程示意图。如图1所示,基于授权文件激活软件的方法包括如下步骤。Please refer to FIG. 1 , which is a schematic flowchart of a method for activating software based on an authorization file in one embodiment of the present invention. As shown in FIG. 1 , the method for activating software based on an authorization file includes the following steps.

步骤110、在服务器中对用户源码进行加密得到授权文件,将所述授权文件转移至所述计算机设备中,其中所述用户源码唯一对应一台计算机设备。在一个实施例中,所述服务器由所述软件产品的发行商运行。Step 110: Encrypt the user source code in the server to obtain an authorization file, and transfer the authorization file to the computer device, wherein the user source code uniquely corresponds to one computer device. In one embodiment, the server is run by a publisher of the software product.

在一个实施例中,步骤110中具体包括如下步骤。In one embodiment,step 110 specifically includes the following steps.

用户在一台计算机设备上通过浏览器登录所述服务器并选择获取授权文件。通常来将,用户通过自己的用户名和密码通过浏览器登录所述服务器,如果所述用户购买过对应的软件产品,所述服务器会知晓所述用户已经购买过的软件产品的数量、类型、已经被授权使用的数量、已经激活的数量等。举例来说,用户张三购买了永中软件的1套文字处理系统,未在计算机设备上授权使用,也未激活。The user logs into the server through a browser on a computer device and selects to obtain an authorization file. Usually, the user logs in to the server through a browser through his user name and password. If the user has purchased the corresponding software product, the server will know the number, type, and number of software products that the user has purchased. The number of authorized use, the number of activated, etc. For example, user Zhang San purchased a word processing system from Yongzhong Software, which was neither authorized nor activated on the computer equipment.

所述服务器通过所述浏览器获取该台计算机设备唯一对应的用户源码,并对所述用户源码进行加密得到授权文件。当然,如果所述用户没有未在计算机设备上授权使用的软件产品,则无法制作授权文件。在一个实施例中,所述用户源码包括对应的计算机设备的MAC地址、CPU地址中的一个或多个,即所述用户源码唯一对应这台计算机设备;所述服务器将所述用户源码和一组随机的字符串一起进行加密得到所述授权文件,比如加密时可以采用MD5加密算法。The server obtains the unique corresponding user source code of the computer device through the browser, and encrypts the user source code to obtain an authorization file. Of course, if the user does not have a software product that is not authorized for use on the computer device, the authorization file cannot be created. In one embodiment, the user source code includes one or more of the MAC address and CPU address of the corresponding computer device, that is, the user source code uniquely corresponds to this computer device; the server combines the user source code with a A group of random character strings are encrypted together to obtain the authorization file, for example, the MD5 encryption algorithm can be used for encryption.

所述用户通过所述浏览器下载所述授权文件至所述计算机设备上。The user downloads the authorization file to the computer device through the browser.

在另一个实施例中,步骤110包括如下步骤。In another embodiment,step 110 includes the following steps.

在所述计算机设备上打开软件产品并选择获取授权文件,所述软件产品的通讯模组被启动以与所述服务器建立通讯连接。在此实施例中,所述软件产品具有通讯组件,以便与指定的服务器进行联系,所述软件产品也具有选择获取授权文件的入口,这样可以使得授权文件的获取更为简便。The software product is opened on the computer device and an authorization file is selected to be obtained, and the communication module of the software product is activated to establish a communication connection with the server. In this embodiment, the software product has a communication component to communicate with a designated server, and the software product also has an entry for selecting an authorization file, so that the authorization file can be obtained more easily.

所述软件产品将购买软件产品后获得的购买凭据信息发送至所述服务器以供验证。用户在购买所述软件产品后,发行商会给用户提供购买凭据信息,利用所述购买凭据信息可以获得授权。所述购买凭据信息可以是一个字符串,也可以是用户的用户名和密码。The software product sends purchase credential information obtained after purchasing the software product to the server for verification. After the user purchases the software product, the publisher will provide the user with purchase credential information, and authorization can be obtained by using the purchase credential information. The purchase credential information may be a character string, or may be the user's username and password.

在服务器验证所述购买凭据信息确认该用户已经购买了所述软件产品且未在计算机设备中授权使用后,服务器通过运行于所述计算机设备上的软件产品获取此台计算机设备的用户源码,并将所述用户源码和一组随机的字符串一起进行加密得到所述授权文件。After the server verifies the purchase credential information and confirms that the user has purchased the software product and is not authorized to use it in the computer device, the server obtains the user source code of the computer device through the software product running on the computer device, and The authorization file is obtained by encrypting the user source code together with a set of random character strings.

服务器将所述授权文件通过所述软件产品的通讯模组发送至所述计算机设备上,并登记所述购买凭据信息对应的软件产品已经被授权使用。The server sends the authorization file to the computer device through the communication module of the software product, and registers that the software product corresponding to the purchase credential information has been authorized to use.

步骤120、在所述计算机设备上打开软件产品并选择激活,此时利用所述软件产品打开所述授权文件进行激活校验,在进行激活校验时执行如下步骤:Step 120: Open the software product on the computer device and select activation, and then use the software product to open the authorization file for activation verification, and perform the following steps when performing activation verification:

所述软件产品对所述授权文件进行解密得到所述用户源码;The software product decrypts the authorization file to obtain the user source code;

所述软件产品采集本地计算机设备的信息得到本地计算机设备的用户源码;The software product collects the information of the local computer equipment to obtain the user source code of the local computer equipment;

所述软件产品将解密得到的用户源码和本地采集的用户源码进行比对以确认激活校验是否成功,若匹配,则认为激活校验成功,能够正常使用所述软件产品。若不匹配,则验证激活校验不成功,用户无法正常使用所述软件产品。The software product compares the decrypted user source code with the locally collected user source code to confirm whether the activation verification is successful. If they match, the activation verification is considered to be successful, and the software product can be used normally. If it does not match, the verification and activation verification is unsuccessful, and the user cannot use the software product normally.

在激活校验成功后,所述服务器中登记所述购买凭据信息对应的软件产品已经被激活校验,这样所述购买凭据信息则无法再次在其他计算机设备上激活所述软件产品了。After the activation verification is successful, the software product corresponding to the purchase credential information registered in the server has been activated and verified, so that the purchase credential information cannot activate the software product on other computer devices again.

在一个实施例中,所述授权文件具有不可识别性;所述授权文件基于每台计算机设备生成,以实现一机一码,所述授权文件采取文件激活的方式,所述计算机设备使用文件浏览激活所述软件产品。所述授权文件是以Lic格式结尾用于激活的一种文件。In one embodiment, the authorization file is non-identifiable; the authorization file is generated based on each computer device to realize one machine, one code, and the authorization file adopts a file activation method, and the computer device uses the file browsing method Activate the software product. The authorization file is a file ending in Lic format for activation.

如果用户希望将软件产品更换至另一台计算机设备上,用户将所述软件产品在原来的计算机设备上卸载掉,之后重新从所述服务器上获取授权文件,并重新在另一台计算机设备上利用所述授权文件进行激活校验。If the user wishes to replace the software product to another computer device, the user uninstalls the software product from the original computer device, then obtains the authorization file from the server again, and re-installs the software product on the other computer device. Activation verification is performed using the authorization file.

综上所述,本发明的授权文件激活软件的方式,相比于统一发放的CD-key,需要针对每一个用户进行独立的,特别的供应。它具有一定的保密性以及协议性,它需要用户提供部分源码,这样用户可以对自己购买的产品建立一定的安全保护,发行商则需要根据用户提供的源码,再通过本公司独有的加密技术,进行加密后,发放给用户,起到一机一码的作用。除此之外,产品还需要对用户使用的授权文件进行激活校验。在一个实施例中,相比于传统的CD-key激活方式,本发明中的授权文件采取文件激活的方式,用户可以更加方便的使用文件浏览激活;在一个具体。对文件形式的激活码来说,用户会更加容易方便管理和存储。这一方面可以更加提高安全性与统一性。To sum up, the method of activating the software by the authorization file of the present invention, compared with the CD-key issued uniformly, needs to be provided independently and specially for each user. It has a certain degree of confidentiality and agreement. It requires users to provide some source code, so that users can establish certain security protection for the products they buy. Publishers need to use the source code provided by users, and then pass the company's unique encryption technology. , encrypted, and distributed to users, playing the role of one machine, one code. In addition, the product also needs to perform activation verification on the authorization file used by the user. In one embodiment, compared with the traditional CD-key activation method, the authorization file in the present invention adopts the file activation method, and the user can use the file browsing activation method more conveniently; in a specific example. For the activation code in the form of a file, it will be easier for the user to manage and store it more conveniently. This aspect can further improve security and uniformity.

在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,除了包含所列的那些要素,而且还可包含没有明确列出的其他要素。As used herein, the terms "comprising", "comprising" or any other variation thereof are intended to encompass non-exclusive inclusion, in addition to those elements listed, but also other elements not expressly listed.

在本文中,所涉及的前、后、上、下等方位词是以附图中零部件位于图中以及零部件相互之间的位置来定义的,只是为了表达技术方案的清楚及方便。应当理解,所述方位词的使用不应限制本申请请求保护的范围。In this document, the related terms such as front, rear, upper and lower are defined by the positions of the components in the drawings and the positions between the components, which are only for the clarity and convenience of expressing the technical solution. It should be understood that the use of the locative words should not limit the scope of protection claimed in this application.

在不冲突的情况下,本文中上述实施例及实施例中的特征可以相互结合。The above-described embodiments and features of the embodiments herein may be combined with each other without conflict.

以上所述仅为本发明的较佳实施例,并不用以限制本发明,凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention shall be included in the protection of the present invention. within the range.

Claims (10)

CN202111544486.1A2021-12-162021-12-16 Method, computing device, and computer-readable medium for activating software based on authorization fileWithdrawnCN114357384A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202111544486.1ACN114357384A (en)2021-12-162021-12-16 Method, computing device, and computer-readable medium for activating software based on authorization file

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202111544486.1ACN114357384A (en)2021-12-162021-12-16 Method, computing device, and computer-readable medium for activating software based on authorization file

Publications (1)

Publication NumberPublication Date
CN114357384Atrue CN114357384A (en)2022-04-15

Family

ID=81098687

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202111544486.1AWithdrawnCN114357384A (en)2021-12-162021-12-16 Method, computing device, and computer-readable medium for activating software based on authorization file

Country Status (1)

CountryLink
CN (1)CN114357384A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN116415222A (en)*2023-05-092023-07-11南京中图数码科技有限公司Authorization management method and system for cloud design platform of process industrial digital factory

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104618384A (en)*2015-02-132015-05-13成都中科合迅科技有限公司Single authentication method based on AD (Access Device) server
US20170085532A1 (en)*2015-03-272017-03-23Arris Enterprises LlcCryptographic service with output redirection
CN109583156A (en)*2018-12-052019-04-05杭州安恒信息技术股份有限公司Code protection method, device, system and equipment based on Certificate Authority
CN113268715A (en)*2020-02-142021-08-17中移(苏州)软件技术有限公司Software encryption method, device, equipment and storage medium
CN113761483A (en)*2021-08-312021-12-07山东浪潮通软信息科技有限公司Software product protection method, device and medium based on soft encryption application program

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104618384A (en)*2015-02-132015-05-13成都中科合迅科技有限公司Single authentication method based on AD (Access Device) server
US20170085532A1 (en)*2015-03-272017-03-23Arris Enterprises LlcCryptographic service with output redirection
CN109583156A (en)*2018-12-052019-04-05杭州安恒信息技术股份有限公司Code protection method, device, system and equipment based on Certificate Authority
CN113268715A (en)*2020-02-142021-08-17中移(苏州)软件技术有限公司Software encryption method, device, equipment and storage medium
CN113761483A (en)*2021-08-312021-12-07山东浪潮通软信息科技有限公司Software product protection method, device and medium based on soft encryption application program

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN116415222A (en)*2023-05-092023-07-11南京中图数码科技有限公司Authorization management method and system for cloud design platform of process industrial digital factory
CN116415222B (en)*2023-05-092023-10-20南京中图数码科技有限公司Authorization management method and system for cloud design platform of process industrial digital factory

Similar Documents

PublicationPublication DateTitle
US10491379B2 (en)System, device, and method of secure entry and handling of passwords
CN109075976B (en) Certificate issuance depending on key authentication
US7475254B2 (en)Method for authenticating software using protected master key
US6961852B2 (en)System and method for authenticating software using hidden intermediate keys
CN103995991B (en)Method for binding hardware information and secret keys in software copyright protection
CN101174295B (en)Off-line DRM authentication method and system
CN102426640B (en)For the fail-safe software product identifiers of Product Validation and activation
US7516491B1 (en)License tracking system
WO2021128244A1 (en)Registration authorization method and system
CN104063788B (en)Mobile platform credibility payment system and method
CN103946858A (en)Decryption and encryption of application data
TWI436235B (en)Data encryption method and system, data decryption method
CN109284603A (en)A kind of configuration data processing method, device and storage medium
JP6357091B2 (en) Information processing apparatus and computer program
US20190044709A1 (en)Incorporating software date information into a key exchange protocol to reduce software tampering
KR20080065661A (en) Methods for controlling access to file systems, related systems for use in file systems, SIM cards and computer program products
CN104866736B (en)The system for numeral copyright management and method of a kind of non-proliferation
CN114357384A (en) Method, computing device, and computer-readable medium for activating software based on authorization file
JP2009032165A (en)Software license management system, program and device
JP4192738B2 (en) Electronic document editing device, electronic document editing program
KR102854414B1 (en)Authentication methods and authentication systems that restrict unauthorized installation of software products
CN114448635B (en) A method, device, equipment and product for website licensing
US20250272362A1 (en)Protection-level based mechanism for securing artificial intelligence models
JP6047718B2 (en) License management system, method and module
Huang et al.A software licensing authorization scheme based on hardware component identifiers

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
WW01Invention patent application withdrawn after publication

Application publication date:20220415

WW01Invention patent application withdrawn after publication

[8]ページ先頭

©2009-2025 Movatter.jp