Double key protection method for computer peripheral and architecture for the same
    2.
    发明申请
    Double key protection method for computer peripheral and architecture for the same 审中-公开
    计算机外围设备与建筑双重保护方法相同

    公开(公告)号:US20060021058A1

    公开(公告)日:2006-01-26

    申请号:US11011147

    申请日:2004-12-15

    申请人: Cheng Yuan

    发明人: Cheng Yuan

    IPC分类号: H04N7/16

    摘要: A double key protection method is adapted to computer peripherals and architecture for the same. The present invention equips at least one microprocessor and one storage unit on a computer peripheral, and executes a client program in the computer. A first key is used to check whether the computer peripheral is copyrighted and a second key is used to check whether the client program is copyrighted. The software designer should set a first key value and store the first key value in a storage unit, and then indicate a second key value. Then the microprocessor executes a key procedure and produces a first cyclic redundancy check and programs the second key value and the first cyclic redundancy check into the client program. When operating the client program, the client program can be checked for copyright by checking the first cyclic redundancy check.

    摘要翻译: 双键保护方法适用于计算机外围设备和架构。 本发明在计算机外围设备上配备至少一个微处理器和一个存储单元,并在计算机中执行客户端程序。 第一个密钥用于检查计算机外设是否受版权保护,第二个密钥用于检查客户端程序是否受版权保护。 软件设计人员应设置第一个键值,并将第一个键值存储在存储单元中,然后指示第二个键值。 然后微处理器执行密钥过程并产生第一循环冗余校验,并将第二密钥值和第一循环冗余校验程序编程到客户机程序中。 当操作客户端程序时,可以通过检查第一个循环冗余校验来检查客户端程序的版权。