首页> 外国专利> METHOD LIMITATIONS OF OPPORTUNITIES software, hardware and firmware RESOURCES ELECTRONIC DEVICE TO PROTECT INTELLECTUAL PROPERTY RIGHTS

METHOD LIMITATIONS OF OPPORTUNITIES software, hardware and firmware RESOURCES ELECTRONIC DEVICE TO PROTECT INTELLECTUAL PROPERTY RIGHTS

机译:方法的局限性软件,硬件和固件资源保护知识产权的电子设备

摘要

1. A method of limiting access to the capabilities of software, hardware and firmware of an electronic device for the protection of intellectual 's rights, wherein the electronic device is turned off, if the electronic device microprocessor detects that an electronic device in which it is installed, there is no electronic hardware key, giving him a signal to continue operation of the electronic device, despite the fact that the dongle contains the operating system, which controls the electronic device controlling the electronic device all electronic computing processes and files, which interact with the electronic computing processes, despite the fact that control is to determine what can be given file and computing process they produced and what is not; files are objects of protection of the inventive method for the violations of intellectual property rights contained on the server that also contains data on all electronic key works by the claimed process, despite the fact that these files are distributed to customers in an encrypted vide.2. A method according to Clause 1, characterized in that the claimed method involves the use of at least one server that contains the files for protecting the inventive method, despite the fact that from the server containing the files, files are distributed to customers over the Internet in encrypted vide.3. The method of claim. 1, characterized in that each electronic key used by the claimed process is assigned a unique identification number applied external to the housing Electrical
机译:1.一种限制访问电子设备的软件,硬件和固件以保护知识产权的方法,其中,如果电子设备微处理器检测到其中装有电子设备的电子设备,则关闭电子设备尽管加密狗包含操作系统(该操作系统控制着控制电子设备的所有电子计算过程和文件的操作系统),但是没有安装硬件,没有电子硬件密钥给他发出继续电子设备操作的信号。尽管实际上控制是确定可以给定的文件和文件产生的计算过程,而不能确定的却是与电子计算过程进行交互的事实;文件是本发明方法的保护对象,用于保护服务器上所包含的知识产权,该服务器还包含所要求保护的过程中所有电子密钥作品的数据,尽管事实上这些文件是通过加密的视频分发给客户的。2 。 2.根据权利要求1所述的方法,其特征在于,所要求保护的方法包括使用至少一个包含文件的服务器来保护本发明的方法,尽管事实是,通过包含文件的服务器,文件是通过因特网分发给客户的。在加密的视频中3。权利要求的方法。具体实施方式如图1所示,其特征在于,要求保护的过程所使用的每个电子钥匙都被分配了一个唯一的识别号,该识别号被施加到外壳的外部。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号