主权项 |
1. A method for identifying a pirated dongle, comprising:
step S1, determining, by an identification device, whether there is any dongle connected to a host, proceeding to step S2 if there is a dongle connected to the host, or outputting information that no dongle is connected to the host if no dongle is connected to the host; the step S2, obtaining, by the identification device, preset data from a detection list based on a preset rule, wherein the detection list is generated by an encryption device, the detection list is prestored in the identification device, and data volume of the detection list is larger than a storage capacity of the dongle; step S3, obtaining, by the identification device, first input data and first output data based on the preset data; step S4, sending, by the identification device, the first input data to the dongle; step S5, receiving, by the identification device, fifth output data sent by the dongle; and step S6, determining, by the identification device, whether the fifth output data is identical to the first output data, outputting information that the dongle is legitimate if the fifth output data is identical to the first output data, or outputting information that the dongle is pirated if the fifth output data is not identical to the first output data. |