DE69720971T2 - Computersystem und Verfahren zum Schutz von Software - Google Patents
Computersystem und Verfahren zum Schutz von SoftwareInfo
- Publication number
- DE69720971T2 DE69720971T2 DE69720971T DE69720971T DE69720971T2 DE 69720971 T2 DE69720971 T2 DE 69720971T2 DE 69720971 T DE69720971 T DE 69720971T DE 69720971 T DE69720971 T DE 69720971T DE 69720971 T2 DE69720971 T2 DE 69720971T2
- Authority
- DE
- Germany
- Prior art keywords
- computer system
- protection method
- software protection
- software
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/605—Copy protection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP97710011A EP0881557B1 (de) | 1997-05-28 | 1997-05-28 | Computersystem und Verfahren zum Schutz von Software |
Publications (2)
Publication Number | Publication Date |
---|---|
DE69720971D1 DE69720971D1 (de) | 2003-05-22 |
DE69720971T2 true DE69720971T2 (de) | 2003-10-30 |
Family
ID=8230128
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE69720971T Expired - Lifetime DE69720971T2 (de) | 1997-05-28 | 1997-05-28 | Computersystem und Verfahren zum Schutz von Software |
Country Status (4)
Country | Link |
---|---|
US (1) | US6678665B1 (de) |
EP (1) | EP0881557B1 (de) |
CN (1) | CN1165847C (de) |
DE (1) | DE69720971T2 (de) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6170014B1 (en) * | 1998-03-25 | 2001-01-02 | Community Learning And Information Network | Computer architecture for managing courseware in a shared use operating environment |
IT1317991B1 (it) * | 2000-06-23 | 2003-07-21 | Ipm Ind Politecnica Meridiona | Dispositivo lettore di smart card con interfaccia usb per collegamento a personal computer e simili |
US7203966B2 (en) * | 2001-06-27 | 2007-04-10 | Microsoft Corporation | Enforcement architecture and method for digital rights management system for roaming a license to a plurality of user devices |
KR100445574B1 (ko) * | 2001-12-19 | 2004-08-25 | 한국전자통신연구원 | 대화형 영 지식 증명을 이용한 패스워드 기반의 인증 및키 교환 프로토콜 설계 방법 |
FR2843819B1 (fr) * | 2002-08-21 | 2006-11-10 | Thomson Licensing Sa | Appareil electrique securise contre le vol, systeme antivol comportant un tel appareil et procede d'appariement d'appareils electriques |
US7315946B1 (en) | 2003-04-14 | 2008-01-01 | Aol Llc | Out-of-band tokens for rights access |
US7647277B1 (en) | 2002-10-25 | 2010-01-12 | Time Warner Inc. | Regulating access to content using a multitiered rule base |
US7373658B1 (en) | 2002-10-25 | 2008-05-13 | Aol Llc | Electronic loose-leaf remote control for enabling access to content from a media player |
GB0228760D0 (en) * | 2002-12-10 | 2003-01-15 | Koninkl Philips Electronics Nv | Efficient implementation of zero knowledge protocols |
US7296294B2 (en) * | 2003-03-03 | 2007-11-13 | Microsoft Corporation | System for binding secrets to a computer system having tolerance for hardware changes |
US7444512B2 (en) * | 2003-04-11 | 2008-10-28 | Intel Corporation | Establishing trust without revealing identity |
US7716474B2 (en) * | 2003-05-12 | 2010-05-11 | Byteblaze, Inc. | Anti-piracy software protection system and method |
EP1761902A1 (de) * | 2004-06-25 | 2007-03-14 | Koninklijke Philips Electronics N.V. | Erneuerbare und private biometrik |
EP2141883A1 (de) * | 2008-07-04 | 2010-01-06 | Alcatel, Lucent | Verfahren in einem Peer zur Authentifizierung des Peer in einem Authentifizierer, entsprechende Vorrichtung und Computerprogrammprodukt dafür |
US9979794B2 (en) * | 2015-09-17 | 2018-05-22 | Ericsson Ab | Entropy sharing in a large distributed system based on entropy verification by an entropy broker |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5109413A (en) * | 1986-11-05 | 1992-04-28 | International Business Machines Corporation | Manipulating rights-to-execute in connection with a software copy protection mechanism |
WO1988005941A1 (en) * | 1987-01-30 | 1988-08-11 | Software Activation, Inc. | Apparatus and method for regulating the use of proprietary computer software |
US5140634A (en) * | 1987-09-07 | 1992-08-18 | U.S Philips Corporation | Method and apparatus for authenticating accreditations and for authenticating and signing messages |
US4932056A (en) * | 1989-03-16 | 1990-06-05 | Yeda Research And Development Company Limited | Method and apparatus for user identification based on permuted kernels |
US5351293A (en) * | 1993-02-01 | 1994-09-27 | Wave Systems Corp. | System method and apparatus for authenticating an encrypted signal |
US5432851A (en) * | 1993-10-21 | 1995-07-11 | Tecsec Incorporated | Personal computer access control system |
WO1995024708A1 (fr) * | 1994-03-07 | 1995-09-14 | Nippon Telegraph And Telephone Corporation | Procede et systeme d'emission d'informations a protocole d'authentification a base de connaissances nulles |
US5724425A (en) * | 1994-06-10 | 1998-03-03 | Sun Microsystems, Inc. | Method and apparatus for enhancing software security and distributing software |
US5557765A (en) * | 1994-08-11 | 1996-09-17 | Trusted Information Systems, Inc. | System and method for data recovery |
US5598473A (en) * | 1994-08-17 | 1997-01-28 | Ibm Corporation | Digital signature generator/verifier/recorder (DS-GVR) for analog transmissions |
US5606617A (en) * | 1994-10-14 | 1997-02-25 | Brands; Stefanus A. | Secret-key certificates |
US5774525A (en) * | 1995-01-23 | 1998-06-30 | International Business Machines Corporation | Method and apparatus utilizing dynamic questioning to provide secure access control |
US5872917A (en) * | 1995-06-07 | 1999-02-16 | America Online, Inc. | Authentication using random challenges |
JP3541522B2 (ja) * | 1995-10-09 | 2004-07-14 | 松下電器産業株式会社 | 機器間通信保護システムおよび機器 |
DE19542910B4 (de) * | 1995-11-17 | 2005-01-05 | Deutsche Telekom Ag | Verfahren und Vorrichtung zum Schutz gespeicherter Daten |
US5841869A (en) * | 1996-08-23 | 1998-11-24 | Cheyenne Property Trust | Method and apparatus for trusted processing |
US6005935A (en) * | 1996-11-20 | 1999-12-21 | At&T Corp. | Method and system of using personal information as a key when distributing information |
IL132877A (en) * | 1997-05-13 | 2003-12-10 | Passlogix Inc | Generalized user identification and authentication system |
DE69724235T2 (de) * | 1997-05-28 | 2004-02-26 | Siemens Ag | Computersystem und Verfahren zum Schutz von Software |
-
1997
- 1997-05-28 DE DE69720971T patent/DE69720971T2/de not_active Expired - Lifetime
- 1997-05-28 EP EP97710011A patent/EP0881557B1/de not_active Expired - Lifetime
- 1997-10-02 US US08/942,743 patent/US6678665B1/en not_active Expired - Lifetime
-
1998
- 1998-05-27 CN CNB981029183A patent/CN1165847C/zh not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN1165847C (zh) | 2004-09-08 |
EP0881557A1 (de) | 1998-12-02 |
US6678665B1 (en) | 2004-01-13 |
DE69720971D1 (de) | 2003-05-22 |
EP0881557B1 (de) | 2003-04-16 |
CN1204088A (zh) | 1999-01-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69724235D1 (de) | Computersystem und Verfahren zum Schutz von Software | |
DE69522423T2 (de) | Digitalisierstift und Verfahren | |
DE69834129D1 (de) | Verfahren und system zum vorausladen von information | |
DE69834401D1 (de) | Businterfacesystem und verfahren | |
DE69839274D1 (de) | System und verfahren zum absichern von sprachtransaktionen | |
DE69814155D1 (de) | System und verfahren zur virtuellen eingabe | |
DE69814199T2 (de) | Verfahren und System zur Eingabe von Zeichen | |
DE69840930D1 (de) | Verfahren und system zum vorhersagen von verzweigungen | |
DE69815599D1 (de) | Verfahren und Vorrichtung zum Schutz von Anwendungsdaten in sicheren Speicherbereichen | |
DE69626055T2 (de) | Gerät und Verfahren zum Datenschutz | |
DE69816400D1 (de) | Verteiltes Objektsystem und Verfahren zum Anbieten von Dienstleistungen darin | |
DE19782227T1 (de) | System und Verfahren zum Verteilen und Indexieren von Computerdokumenten unter Verwendung unabhängiger Agenten | |
DE69837693D1 (de) | Verfahren und System zum Editieren von Bildern | |
DE69939495D1 (de) | Verfahren und system zum testen von computercodes | |
DE69824312D1 (de) | Verfahren und gerät zur beendigung von tachyarrhythmien | |
DE69902251D1 (de) | System und verfahren zum definieren von ortbestimmungsdiensten | |
DE69840903D1 (de) | Paralleles Dateisystem und Verfahren zum Erteilen von Bytebereichtoken | |
DE69928222D1 (de) | Verfahren und System zum Versand von Information | |
DE19580589T1 (de) | Verfahren zum Aktualisieren und Wiederherstellen von Systemfiles | |
DE69720972D1 (de) | Computersystem und Verfahren zum Schutz von Software | |
DE69909379D1 (de) | System und Verfahren zum Schützen von geheimen Informationen gegen analytische Spionage | |
DE69637146D1 (de) | Rechner-interaktorsystem und verfahren zu seiner bereitstellung | |
DE69720971D1 (de) | Computersystem und Verfahren zum Schutz von Software | |
DE69836296D1 (de) | System und Verfahren zum Erfassen von Maschinendaten | |
DE69809150D1 (de) | System und Verfahren zum Synchronisieren von elektronischen Preisschildern |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
8364 | No opposition during term of opposition |