Double key protection method for computer peripheral and architecture for the same

Number of patents in Portfolio can not be more than 2000

United States of America Patent

APP PUB NO 20060021058A1
SERIAL NO

11011147

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A double key protection method is adapted to computer peripherals and architecture for the same. The present invention equips at least one microprocessor and one storage unit on a computer peripheral, and executes a client program in the computer. A first key is used to check whether the computer peripheral is copyrighted and a second key is used to check whether the client program is copyrighted. The software designer should set a first key value and store the first key value in a storage unit, and then indicate a second key value. Then the microprocessor executes a key procedure and produces a first cyclic redundancy check and programs the second key value and the first cyclic redundancy check into the client program. When operating the client program, the client program can be checked for copyright by checking the first cyclic redundancy check.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddress
ADVANTECH CO LTDTAIPEI 114

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Yuan, Cheng Chih Taipei, TW 1 2

Cited Art Landscape

Load Citation

Patent Citation Ranking

Forward Cite Landscape

Load Citation