WO1999013392A2 - Protection of software products - Google Patents

Protection of software products Download PDF

Info

Publication number
WO1999013392A2
WO1999013392A2 PCT/DE1997/001984 DE9701984W WO9913392A2 WO 1999013392 A2 WO1999013392 A2 WO 1999013392A2 DE 9701984 W DE9701984 W DE 9701984W WO 9913392 A2 WO9913392 A2 WO 9913392A2
Authority
WO
WIPO (PCT)
Prior art keywords
software
protection
program
time
diskette
Prior art date
Application number
PCT/DE1997/001984
Other languages
German (de)
French (fr)
Other versions
WO1999013392A8 (en
Inventor
Reno Byckiewicz
Original Assignee
Reno Byckiewicz
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from DE19735607A external-priority patent/DE19735607A1/en
Application filed by Reno Byckiewicz filed Critical Reno Byckiewicz
Priority to PCT/DE1997/001984 priority Critical patent/WO1999013392A2/en
Priority to DE19739307A priority patent/DE19739307A1/en
Publication of WO1999013392A2 publication Critical patent/WO1999013392A2/en
Publication of WO1999013392A8 publication Critical patent/WO1999013392A8/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Definitions

  • This program can protect software products under all FAT-based systems.
  • All the information necessary to protect the software is stored on a data carrier in a data structure comprising 100 bytes.
  • This diskette cannot be copied and authorizes the user to install the software protection once. Repeated installation attempts are recognized and prevented.
  • Time-limited use (defined by start stop and date / time)
  • Time-limited usage defined by real usage hours / minutes

Description

ie Beschreibung The description
Bezeichnung der Erfindung:Title of the invention:
Schutz von Software-ProduktenProtection of software products
Technisches Gebiet auf das Die Erfindung betrifft den Schutz von sich die Erfindung bezieht: selbstentwickelten Software-ProduktenTechnical field to which the invention relates to the protection of the invention relates to: self-developed software products
Auf Grund des weiterhin zunehmenden Einsatzes von branchenspezifischen Softwareprodukten sowohl im öffentlich-rechtlichen als auch privatrechtlichen Bereich erscheinen neue Methoden des Schutzes von Software als notv/endig. Besonders für klein- und mittelständische Unternehmen ist der Schutz von selbsteintwickelten Soflwareproduk- ten existenzentscheidend.Due to the increasing use of industry-specific software products in both public and private law, new methods of protecting software appear to be necessary. The protection of self-developed software products is vital for small and medium-sized companies in particular.
Derzeitiger Stand bei SoftEs existieren bereits verschiedene ware-Schutzprogrammen: Lösungen im Software- bzw. Hardwarebereich bzw. Mischlösungen, die in ihrer Zuverlässigkeit, Handhabung und Kombination mit anderen Softwareprodukten sehr unterschiedlich sind Vorteilhafte Wirkung der ErDer vorliegende Schutz ist eine reine findung: Softwarelösung.The current status of SoftEs already includes various goods protection programs: solutions in the software or hardware area or mixed solutions, which are very different in their reliability, handling and combination with other software products Advantageous effect of the earth The existing protection is a pure invention: software solution.
Durch dieses Programm können Softwareprodukte unter allen FAT- basierten Systemen geschützt werden.This program can protect software products under all FAT-based systems.
Alle zum Schutz der Software notwendigen Informationen werden in einer 100 Byte umfassenden Datenstruktur auf einem Datenträger abgelegt.All the information necessary to protect the software is stored on a data carrier in a data structure comprising 100 bytes.
Der beste Weg zur AusfühMit Hilfe des MASTER-Programms rung der Erfingung, bzw. kann eine Installationsdiskette erFunktionsweise zeugt werden.The best way to do this is with the help of the MASTER program, or an installation diskette can be created.
Diese Diskette ist nicht kopierbar und berechtigt den Benutzer zur einmaligen Installation des Softwareschutzes. Wiederholte Installationsversuche werden erkannt und unterbunden.This diskette cannot be copied and authorizes the user to install the software protection once. Repeated installation attempts are recognized and prevented.
Die Implementation erfolgt durch Aufruf der Überprüfungsroutinen im Quellcode des jeweiligen Softwareprodukts Erreichte Vorteile • KopierschutzThe implementation takes place by calling the verification routines in the source code of the respective software product Advantages achieved • Copy protection
Zeitbegrenzte Nutzung (definiert durch Start Stop und Datum/Uhrzeit)Time-limited use (defined by start stop and date / time)
Zeitbegrenzte Nutzung (definiert durch reale Nutzungsdauer Stunden/Minuten)Time-limited usage (defined by real usage hours / minutes)
differenzierte Verwaltung von Programmteilen der betreffenden Softwaredifferentiated management of program parts of the software in question
Plausibilitätsprüfung aller relevanten system- und softwarespezifischer ParameterPlausibility check of all relevant system- and software-specific parameters
Differenzierung aller möglichen Schutzverletzungsformen incl.Differentiation of all possible types of protection faults incl.
FehlertoleranzFault tolerance
• Update aller Schutz-Parameter über Datenträger oder Remote Access möglich • All protection parameters can be updated via data carriers or remote access

Claims

Patentansprüche claims
/. Oberbegriff des Schutz von selbstentwickelunabhängigen Paten Software-Produkten tentanspruchs/. General term for the protection of self-developed godparents
Durch dieses Programm können Sofwareprodukte unter allen FAT-basierten Systemen geschützt werden.This program can protect software products under all FAT-based systems.
Die zum Schutz der Software notwendigen Informationen werden in einer 100 Byte umfassenden Datenstruktur auf einem Datenträger abgelegt.The information required to protect the software is stored on a data carrier in a 100-byte data structure.
Die Implementation erfolgt durch Aufruf der Überprüfungsroutinen im Quellcode des jeweiligen SoftwareproduktsThe implementation takes place by calling the verification routines in the source code of the respective software product
//. Kennzeichnender gekennzeichnet durch: 1. Kopierschutz Teil//. Characteristic characterized by: 1. Copy protection part
2. Zeitbegrenzte Nutzung (definiert durch Start/Stop und Datum/Uhrzeit)2. Time-limited use (defined by start / stop and date / time)
3. Zeitbegrenzte Nutzung (definiert durch reale Nutzungsdauer Stunden/Minuten)3. Time-limited usage (defined by real usage hours / minutes)
4. differenzierte Verwaltung von Programmteilen der betreffenden Software 4. differentiated management of program parts of the software in question
5. Plausibilitätsprüfung aller relevanten System- und softwarespezifischer Parameter5. Plausibility check of all relevant system and software-specific parameters
6. Differenzierung aller möglichen Schutzverletzungsformen incl. Fehlertoleranz6. Differentiation of all possible types of protection faults including fault tolerance
7. Update aller Schutz- Parameter über Datenträger oder Remote Access möglich7. All protection parameters can be updated via data medium or remote access
III. Abhängiger Pa- Erzeugung einer Installati- tentanspruch onsdiskette mit Hilfe desIII. Dependent Pa generation of an installer claim on diskette using the
Master-Programms.Masters program.
Diese Diskette kann nur einmal installiert werden, wiederholte Installationsversuche erkennt das Programm und diese werden nicht ausgeführt. This diskette can only be installed once, repeated installation attempts are recognized by the program and these are not executed.
PCT/DE1997/001984 1997-08-15 1997-09-08 Protection of software products WO1999013392A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/DE1997/001984 WO1999013392A2 (en) 1997-08-15 1997-09-08 Protection of software products
DE19739307A DE19739307A1 (en) 1997-09-08 1997-09-08 Protection of self-developed software products

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE19735607A DE19735607A1 (en) 1997-08-15 1997-08-15 Process for the preparation of a data stream for the object-based coding of moving images
PCT/DE1997/001984 WO1999013392A2 (en) 1997-08-15 1997-09-08 Protection of software products

Publications (2)

Publication Number Publication Date
WO1999013392A2 true WO1999013392A2 (en) 1999-03-18
WO1999013392A8 WO1999013392A8 (en) 1999-06-03

Family

ID=25962926

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/DE1997/001984 WO1999013392A2 (en) 1997-08-15 1997-09-08 Protection of software products

Country Status (1)

Country Link
WO (1) WO1999013392A2 (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0413350A2 (en) * 1989-08-18 1991-02-20 Kabushiki Kaisha Toshiba Illegal copy prevention apparatus

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0413350A2 (en) * 1989-08-18 1991-02-20 Kabushiki Kaisha Toshiba Illegal copy prevention apparatus

Also Published As

Publication number Publication date
WO1999013392A8 (en) 1999-06-03

Similar Documents

Publication Publication Date Title
DE69630751T2 (en) License Display System
EP1923814A3 (en) Systems and methods for secure transaction management and electronic rights protection
ATE223083T1 (en) SYSTEM AND METHOD FOR MANAGING INTERNAL COMMAND EXECUTION THREADS
CA2172860A1 (en) Method of Token Verification in a Key Management System
NO980068L (en) Method and apparatus for modifying existing relational database schemas to reflect changes made to an associated object model
SE9103512L (en) PROCEDURES AND ARRANGEMENTS TO REDUCE THE QUANTITY OF INFORMATION REQUIRED IN UNITUAL REVIEW OF SOFTWARE IN A MULTIPLE USER UNITS IN A COMPUTER SYSTEM
DE19963471A1 (en) Device for prevention of pirate copies of computer programs being made for use with a computer, has input- and output-devices corresponding to a module-port of the computer so that they are insertable into the port
WO1998025373A3 (en) Web site copy protection system and method
CN108133023B (en) Automobile detection information system based on block chain technology
DE10028500A1 (en) Process for installing software in hardware
WO1999013392A2 (en) Protection of software products
DE19530095A1 (en) Access monitoring for software, data carriers
DE19739307A1 (en) Protection of self-developed software products
Yun et al. Cost limit replacement policy under imperfect repair
DE69907236T2 (en) METHOD FOR PRODUCING AN INSOLUBLE LINKING BETWEEN AN ELECTRONIC DOCUMENT AND OLE OBJECTS
Mathes Three mile island: the management communication role
Dauskardt Local state, segregation and transport provision: the Atteridgeville bus boycott, 1947
EP0137075B1 (en) Method for the protection of machine readable programmes against reading and copying
Noor et al. THE CONNECTED OF THE SUPREME COURT DECISION NUMBER 109/PK/PDT/2022 WITH THE BASIC AGRARIAN LAW NUMBER 5 OF 1960 CONCERNING EIGENDOM VERPONDING
Pearce Minutes of the meeting on modulator controls
Vetter Computer Access Control Software
GB9221706D0 (en) Repair of damaged electrode in impressed current corrosion protection system
DE4329316C2 (en) Method for monitoring storage devices of program-controlled devices for an unauthorized storage of programs
Pols et al. Entrepreneurs' behaviour in water management
JPM SUBMITTED BY Q

Legal Events

Date Code Title Description
AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
AK Designated states

Kind code of ref document: C1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: C1

Designated state(s): GH KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG

CFP Corrected version of a pamphlet front page
CR1 Correction of entry in section i

Free format text: PAT. BUL. 11/99 UNDER (81) ADD "AL, AM, AT, AU, AZ, BA, BB, BG, BR, BY, CA, CH, CN, CU, CZ, DE, DK,EE, ES, FI, GB, GE, GH, HU, ID, IL, IS, JP, KE, KG, KP, KR, KZ, LC, LK, LR, LS, LT, LU, LV, MD, MG, MK, MN, MW, MX, NO, NZ, PL, PT, RO, RU, SD, SE, SG, SI, SK, SL, TJ, TM, TR, TT, UA, UG, US, UZ, VN, YU, ZW"; DUE TO LATE TRANSMITTAL BY THE RECEIVING OFFICE

NENP Non-entry into the national phase

Ref country code: CA

122 Ep: pct application non-entry in european phase