WO1999018490A1 - Procede et appareil de securite des donnees numeriques - Google Patents
Procede et appareil de securite des donnees numeriques Download PDFInfo
- Publication number
- WO1999018490A1 WO1999018490A1 PCT/GB1998/002957 GB9802957W WO9918490A1 WO 1999018490 A1 WO1999018490 A1 WO 1999018490A1 GB 9802957 W GB9802957 W GB 9802957W WO 9918490 A1 WO9918490 A1 WO 9918490A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- user
- machine
- algorithm
- loaded
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 17
- 238000013479 data entry Methods 0.000 claims description 4
- 230000000717 retained effect Effects 0.000 claims description 3
- 238000012217 deletion Methods 0.000 claims description 2
- 230000037430 deletion Effects 0.000 claims description 2
- 238000013475 authorization Methods 0.000 abstract 1
- 230000000694 effects Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
Definitions
- This invention relates to protecting digitally encoded data from unauthorised use.
- the invention is particularly, but not exclusively, concerned with ensuring that computer software can be used on only one machine and cannot be copied in a usable form for use on multiple machines .
- a method of preventing unauthorised use of digital data in which said data is loaded on a carrier medium together with a predetermined algorithm, the carrier medium is supplied to a user together with a separate device in which the same predetermined algorithm is encoded, and when the data is first loaded on a user machine a data item associated with that machine is identified and twice modified by use of the algorithm, once within the user machine and once within the separate device.
- the data when the data is first loaded in a user machine at least one data item unique to that machine is encrypted to form a first number, the first number is displayed on a screen, the
- the user keys the first number into the external device wherein it is decrypted and transformed via the algorithm to provide a second number which is displayed to the user, and the user then enters the second number in the user machine wherein it is subsequently retained.
- the user machine locates said unique data item(s) and encrypts it to form said first number, and compares the first number now generated with the stored second number via the predetermined algorithm to authorise or deny use.
- the data may include software enabling the data to be deinstalled from that user machine by a process including deletion of the algorithm from that machine.
- a device for use in the foregoing method includes data entry means, calculating means including embedded data defining said algorithm, and data output means, whereby entry of said first number leads to the outputting of said second number .
- the data entry means is a keyboard
- the data output means is a display
- the device is a self-contained, readily portable (preferably credit card sized) unit.
- Fig 1 is a flow chart illustrating the method of operation of one embodiment of the invention.
- Fig 2 is a front view of a card for use in the method .
- computer software is supplied to a purchaser on a suitable medium such as a floppy disk in the usual way and this is packaged together with a card 10 which will be described in further detail below.
- the software as supplied includes the security routines which will now be described with reference to Fig 1.
- UDI unique data identifier
- the UDI is encrypted by a simple routine to form a first number.
- the first number is a seven digit number in which some positions are random numbers which are ignored in the further steps to be described, and other positions are the UDI modified by adding or subtracting predefined numbers.
- the card 10 is a credit card sized calculator having a keyboard 12 and a display 14.
- the card 10 contains a conventional chip which has a predefined mathematical algorithm burned in during manufacture. The user keys in the seven digit number which is processed via the algorithm, with the random numbers being ignored, to produce a second number, preferably in the form of five digit number.
- the card 10 may be provided with OK and clear keys. This allows the user to compare the number which he has keyed in with the seven digit number on the computer screen before pressing the OK key.
- the card 10 is preferably set up in such a way that the user may make only a limited number of entries, for example three.
- the software loaded in the computer contains the same algorithm and therefore can translate the second number via the algorithm into the format of the first number and check that these correspond.
- the second, five digit number is retained as part of the software thereafter and each time the software is run the seven digit number is generated and compared via the algorithm of the stored five digit number.
- the effect of this arrangement is that the software can be copied freely from one machine to another but will only ever run on the machine on which it was first installed.
- the invention relies upon the use of an algorithm which is resident in the software and is also resident in an external device such as the card 10, and on the use of the algorithm to manipulate some numerical value which is unique (or nearly so) to a . specific machine.
- the card could become disabled after use and have to be thrown away or returned to the supplier.
- more sophisticated arrangements are possible. For example, it would be possible to make use of similar process steps to deinstall the software from the machine on which it was first loaded and reinstalled on another machine, with the algorithm hidden in the card being used to authorise the deinstallation.
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU92750/98A AU9275098A (en) | 1997-10-04 | 1998-10-05 | Method and apparatus for digital data security |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB9721053.8A GB9721053D0 (en) | 1997-10-04 | 1997-10-04 | Software guardcard |
GB9721053.8 | 1997-10-04 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1999018490A1 true WO1999018490A1 (fr) | 1999-04-15 |
Family
ID=10820037
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB1998/002957 WO1999018490A1 (fr) | 1997-10-04 | 1998-10-05 | Procede et appareil de securite des donnees numeriques |
Country Status (3)
Country | Link |
---|---|
AU (1) | AU9275098A (fr) |
GB (1) | GB9721053D0 (fr) |
WO (1) | WO1999018490A1 (fr) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003036442A2 (fr) * | 2001-10-26 | 2003-05-01 | Koninklijke Philips Electronics N.V. | Procede d'association d'un domaine des donnees logicielles a du materiel specifique |
WO2008034900A1 (fr) * | 2006-09-21 | 2008-03-27 | Boesgaard Soerensen Hans Marti | Fabrication de fichiers de programme exécutables par ordinateur à partir d'un code source |
US8468351B2 (en) | 2006-12-15 | 2013-06-18 | Codesealer Aps | Digital data authentication |
US9471910B2 (en) | 1999-10-25 | 2016-10-18 | Smartflash, LLC | Data storage and access systems |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0302710A2 (fr) * | 1987-08-05 | 1989-02-08 | International Business Machines Corporation | Une méthode pour commander l'utilisation des programmes d'ordinateur |
FR2654234A1 (fr) * | 1989-11-03 | 1991-05-10 | Gremillet Dominique | Dispositif et procede pour la realisation de verrouillages materiels ou logiciels, dynamiques et aleatoires, associes a des clefs dynamiques et intelligentes. |
US5259029A (en) * | 1990-05-16 | 1993-11-02 | Duncan Jr F Jeff | Decoding device for computer software protection |
-
1997
- 1997-10-04 GB GBGB9721053.8A patent/GB9721053D0/en not_active Ceased
-
1998
- 1998-10-05 WO PCT/GB1998/002957 patent/WO1999018490A1/fr active Application Filing
- 1998-10-05 AU AU92750/98A patent/AU9275098A/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0302710A2 (fr) * | 1987-08-05 | 1989-02-08 | International Business Machines Corporation | Une méthode pour commander l'utilisation des programmes d'ordinateur |
FR2654234A1 (fr) * | 1989-11-03 | 1991-05-10 | Gremillet Dominique | Dispositif et procede pour la realisation de verrouillages materiels ou logiciels, dynamiques et aleatoires, associes a des clefs dynamiques et intelligentes. |
US5259029A (en) * | 1990-05-16 | 1993-11-02 | Duncan Jr F Jeff | Decoding device for computer software protection |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9471910B2 (en) | 1999-10-25 | 2016-10-18 | Smartflash, LLC | Data storage and access systems |
WO2003036442A2 (fr) * | 2001-10-26 | 2003-05-01 | Koninklijke Philips Electronics N.V. | Procede d'association d'un domaine des donnees logicielles a du materiel specifique |
WO2003036442A3 (fr) * | 2001-10-26 | 2004-03-18 | Koninkl Philips Electronics Nv | Procede d'association d'un domaine des donnees logicielles a du materiel specifique |
WO2008034900A1 (fr) * | 2006-09-21 | 2008-03-27 | Boesgaard Soerensen Hans Marti | Fabrication de fichiers de programme exécutables par ordinateur à partir d'un code source |
US8468351B2 (en) | 2006-12-15 | 2013-06-18 | Codesealer Aps | Digital data authentication |
US8949607B2 (en) | 2006-12-15 | 2015-02-03 | Codesealer Aps | Digital data authentication |
Also Published As
Publication number | Publication date |
---|---|
AU9275098A (en) | 1999-04-27 |
GB9721053D0 (en) | 1997-12-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5737416A (en) | Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption stub | |
US5689560A (en) | Method and apparatus for enabling trial period use of software products: method and apparatus for allowing a try-and-buy user interaction | |
EP0679977B1 (fr) | Méthode et appareil permettant de prendre des logiciels à l'essai et permettant la distribution des objets de logiciels | |
US5757908A (en) | Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing an encryption header | |
US5757907A (en) | Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-dependent identification | |
JP3243331B2 (ja) | ソフトウェア管理用階層媒体の作成方法,ソフトウェア管理用階層媒体の作成装置およびソフトウェア管理用階層媒体 | |
US5490216A (en) | System for software registration | |
US5103476A (en) | Secure system for activating personal computer software at remote locations | |
US5553139A (en) | Method and apparatus for electronic license distribution | |
US20060112019A1 (en) | System and method of authenticating licensed computer programs | |
EP0636962A3 (fr) | Méthode de protection de distribution de logiciels | |
WO2000075760A1 (fr) | Procede et systeme destines a empecher l'utilisation non autorisee d'un logiciel | |
JPH10240520A (ja) | 情報の流通の際に個人情報をキーとして用いる方法およびシステム | |
KR19990029307A (ko) | 전자적으로 제공되는 서비스에 대한 액세스 제어방법 및 시스템 | |
JPH08335182A (ja) | ファイル保護システム及びそのファイル保護システムを用いたソフトウエア利用システム及びそのソフトウエア利用システムに用いられる記録媒体 | |
JP2002116839A (ja) | コンピュータ・ソフトウェア及び/又はコンピュータで読取り可能なデータを保護する方法、並びに保護装置 | |
US20060212649A1 (en) | License table for software protection | |
JP2001175468A (ja) | ソフトウエア使用制御方法とその装置 | |
US5710817A (en) | Method and device for preventing unauthorized access to a computer system | |
JP2000047987A (ja) | データ出力方法および装置並びに記録媒体 | |
WO1999018490A1 (fr) | Procede et appareil de securite des donnees numeriques | |
EP0624267B1 (fr) | Procede et dispositif interdisant l'acces non autorise a un systeme informatique | |
US6992563B1 (en) | Method for protecting devices, specially car radios, against theft | |
JP2009003700A (ja) | アプリケーション所定処理許可プログラム | |
JP3289656B2 (ja) | プログラムの実行制御方式 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1998945422 Country of ref document: EP |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
NENP | Non-entry into the national phase |
Ref country code: KR |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1998945422 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: CA |