DE69720971T2 - Computersystem und Verfahren zum Schutz von Software - Google Patents

Computersystem und Verfahren zum Schutz von Software

Info

Publication number
DE69720971T2
DE69720971T2 DE69720971T DE69720971T DE69720971T2 DE 69720971 T2 DE69720971 T2 DE 69720971T2 DE 69720971 T DE69720971 T DE 69720971T DE 69720971 T DE69720971 T DE 69720971T DE 69720971 T2 DE69720971 T2 DE 69720971T2
Authority
DE
Germany
Prior art keywords
computer system
protection method
software protection
software
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
DE69720971T
Other languages
English (en)
Other versions
DE69720971D1 (de
Inventor
Glenn Dr Benson
Markus Dr Dichtl
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens AG
Original Assignee
Siemens AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens AG filed Critical Siemens AG
Application granted granted Critical
Publication of DE69720971D1 publication Critical patent/DE69720971D1/de
Publication of DE69720971T2 publication Critical patent/DE69720971T2/de
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/605Copy protection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
DE69720971T 1997-05-28 1997-05-28 Computersystem und Verfahren zum Schutz von Software Expired - Lifetime DE69720971T2 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP97710011A EP0881557B1 (de) 1997-05-28 1997-05-28 Computersystem und Verfahren zum Schutz von Software

Publications (2)

Publication Number Publication Date
DE69720971D1 DE69720971D1 (de) 2003-05-22
DE69720971T2 true DE69720971T2 (de) 2003-10-30

Family

ID=8230128

Family Applications (1)

Application Number Title Priority Date Filing Date
DE69720971T Expired - Lifetime DE69720971T2 (de) 1997-05-28 1997-05-28 Computersystem und Verfahren zum Schutz von Software

Country Status (4)

Country Link
US (1) US6678665B1 (de)
EP (1) EP0881557B1 (de)
CN (1) CN1165847C (de)
DE (1) DE69720971T2 (de)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6170014B1 (en) * 1998-03-25 2001-01-02 Community Learning And Information Network Computer architecture for managing courseware in a shared use operating environment
IT1317991B1 (it) * 2000-06-23 2003-07-21 Ipm Ind Politecnica Meridiona Dispositivo lettore di smart card con interfaccia usb per collegamento a personal computer e simili
US7203966B2 (en) * 2001-06-27 2007-04-10 Microsoft Corporation Enforcement architecture and method for digital rights management system for roaming a license to a plurality of user devices
KR100445574B1 (ko) * 2001-12-19 2004-08-25 한국전자통신연구원 대화형 영 지식 증명을 이용한 패스워드 기반의 인증 및키 교환 프로토콜 설계 방법
FR2843819B1 (fr) * 2002-08-21 2006-11-10 Thomson Licensing Sa Appareil electrique securise contre le vol, systeme antivol comportant un tel appareil et procede d'appariement d'appareils electriques
US7315946B1 (en) 2003-04-14 2008-01-01 Aol Llc Out-of-band tokens for rights access
US7647277B1 (en) 2002-10-25 2010-01-12 Time Warner Inc. Regulating access to content using a multitiered rule base
US7373658B1 (en) 2002-10-25 2008-05-13 Aol Llc Electronic loose-leaf remote control for enabling access to content from a media player
GB0228760D0 (en) * 2002-12-10 2003-01-15 Koninkl Philips Electronics Nv Efficient implementation of zero knowledge protocols
US7296294B2 (en) * 2003-03-03 2007-11-13 Microsoft Corporation System for binding secrets to a computer system having tolerance for hardware changes
US7444512B2 (en) * 2003-04-11 2008-10-28 Intel Corporation Establishing trust without revealing identity
US7716474B2 (en) * 2003-05-12 2010-05-11 Byteblaze, Inc. Anti-piracy software protection system and method
EP1761902A1 (de) * 2004-06-25 2007-03-14 Koninklijke Philips Electronics N.V. Erneuerbare und private biometrik
EP2141883A1 (de) * 2008-07-04 2010-01-06 Alcatel, Lucent Verfahren in einem Peer zur Authentifizierung des Peer in einem Authentifizierer, entsprechende Vorrichtung und Computerprogrammprodukt dafür
US9979794B2 (en) * 2015-09-17 2018-05-22 Ericsson Ab Entropy sharing in a large distributed system based on entropy verification by an entropy broker

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5109413A (en) * 1986-11-05 1992-04-28 International Business Machines Corporation Manipulating rights-to-execute in connection with a software copy protection mechanism
WO1988005941A1 (en) * 1987-01-30 1988-08-11 Software Activation, Inc. Apparatus and method for regulating the use of proprietary computer software
US5140634A (en) * 1987-09-07 1992-08-18 U.S Philips Corporation Method and apparatus for authenticating accreditations and for authenticating and signing messages
US4932056A (en) * 1989-03-16 1990-06-05 Yeda Research And Development Company Limited Method and apparatus for user identification based on permuted kernels
US5351293A (en) * 1993-02-01 1994-09-27 Wave Systems Corp. System method and apparatus for authenticating an encrypted signal
US5432851A (en) * 1993-10-21 1995-07-11 Tecsec Incorporated Personal computer access control system
WO1995024708A1 (fr) * 1994-03-07 1995-09-14 Nippon Telegraph And Telephone Corporation Procede et systeme d'emission d'informations a protocole d'authentification a base de connaissances nulles
US5724425A (en) * 1994-06-10 1998-03-03 Sun Microsystems, Inc. Method and apparatus for enhancing software security and distributing software
US5557765A (en) * 1994-08-11 1996-09-17 Trusted Information Systems, Inc. System and method for data recovery
US5598473A (en) * 1994-08-17 1997-01-28 Ibm Corporation Digital signature generator/verifier/recorder (DS-GVR) for analog transmissions
US5606617A (en) * 1994-10-14 1997-02-25 Brands; Stefanus A. Secret-key certificates
US5774525A (en) * 1995-01-23 1998-06-30 International Business Machines Corporation Method and apparatus utilizing dynamic questioning to provide secure access control
US5872917A (en) * 1995-06-07 1999-02-16 America Online, Inc. Authentication using random challenges
JP3541522B2 (ja) * 1995-10-09 2004-07-14 松下電器産業株式会社 機器間通信保護システムおよび機器
DE19542910B4 (de) * 1995-11-17 2005-01-05 Deutsche Telekom Ag Verfahren und Vorrichtung zum Schutz gespeicherter Daten
US5841869A (en) * 1996-08-23 1998-11-24 Cheyenne Property Trust Method and apparatus for trusted processing
US6005935A (en) * 1996-11-20 1999-12-21 At&T Corp. Method and system of using personal information as a key when distributing information
IL132877A (en) * 1997-05-13 2003-12-10 Passlogix Inc Generalized user identification and authentication system
DE69724235T2 (de) * 1997-05-28 2004-02-26 Siemens Ag Computersystem und Verfahren zum Schutz von Software

Also Published As

Publication number Publication date
CN1165847C (zh) 2004-09-08
EP0881557A1 (de) 1998-12-02
US6678665B1 (en) 2004-01-13
DE69720971D1 (de) 2003-05-22
EP0881557B1 (de) 2003-04-16
CN1204088A (zh) 1999-01-06

Similar Documents

Publication Publication Date Title
DE69724235D1 (de) Computersystem und Verfahren zum Schutz von Software
DE69522423T2 (de) Digitalisierstift und Verfahren
DE69834129D1 (de) Verfahren und system zum vorausladen von information
DE69834401D1 (de) Businterfacesystem und verfahren
DE69839274D1 (de) System und verfahren zum absichern von sprachtransaktionen
DE69814155D1 (de) System und verfahren zur virtuellen eingabe
DE69814199T2 (de) Verfahren und System zur Eingabe von Zeichen
DE69840930D1 (de) Verfahren und system zum vorhersagen von verzweigungen
DE69815599D1 (de) Verfahren und Vorrichtung zum Schutz von Anwendungsdaten in sicheren Speicherbereichen
DE69626055T2 (de) Gerät und Verfahren zum Datenschutz
DE69816400D1 (de) Verteiltes Objektsystem und Verfahren zum Anbieten von Dienstleistungen darin
DE19782227T1 (de) System und Verfahren zum Verteilen und Indexieren von Computerdokumenten unter Verwendung unabhängiger Agenten
DE69837693D1 (de) Verfahren und System zum Editieren von Bildern
DE69939495D1 (de) Verfahren und system zum testen von computercodes
DE69824312D1 (de) Verfahren und gerät zur beendigung von tachyarrhythmien
DE69902251D1 (de) System und verfahren zum definieren von ortbestimmungsdiensten
DE69840903D1 (de) Paralleles Dateisystem und Verfahren zum Erteilen von Bytebereichtoken
DE69928222D1 (de) Verfahren und System zum Versand von Information
DE19580589T1 (de) Verfahren zum Aktualisieren und Wiederherstellen von Systemfiles
DE69720972D1 (de) Computersystem und Verfahren zum Schutz von Software
DE69909379D1 (de) System und Verfahren zum Schützen von geheimen Informationen gegen analytische Spionage
DE69637146D1 (de) Rechner-interaktorsystem und verfahren zu seiner bereitstellung
DE69720971D1 (de) Computersystem und Verfahren zum Schutz von Software
DE69836296D1 (de) System und Verfahren zum Erfassen von Maschinendaten
DE69809150D1 (de) System und Verfahren zum Synchronisieren von elektronischen Preisschildern

Legal Events

Date Code Title Description
8364 No opposition during term of opposition