WO1999018490A1 - Procede et appareil de securite des donnees numeriques - Google Patents

Procede et appareil de securite des donnees numeriques Download PDF

Info

Publication number
WO1999018490A1
WO1999018490A1 PCT/GB1998/002957 GB9802957W WO9918490A1 WO 1999018490 A1 WO1999018490 A1 WO 1999018490A1 GB 9802957 W GB9802957 W GB 9802957W WO 9918490 A1 WO9918490 A1 WO 9918490A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
user
machine
algorithm
loaded
Prior art date
Application number
PCT/GB1998/002957
Other languages
English (en)
Inventor
Angus Lamberton Jamieson
Original Assignee
I.P.R. Co. (21) Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by I.P.R. Co. (21) Limited filed Critical I.P.R. Co. (21) Limited
Priority to AU92750/98A priority Critical patent/AU9275098A/en
Publication of WO1999018490A1 publication Critical patent/WO1999018490A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress

Definitions

  • This invention relates to protecting digitally encoded data from unauthorised use.
  • the invention is particularly, but not exclusively, concerned with ensuring that computer software can be used on only one machine and cannot be copied in a usable form for use on multiple machines .
  • a method of preventing unauthorised use of digital data in which said data is loaded on a carrier medium together with a predetermined algorithm, the carrier medium is supplied to a user together with a separate device in which the same predetermined algorithm is encoded, and when the data is first loaded on a user machine a data item associated with that machine is identified and twice modified by use of the algorithm, once within the user machine and once within the separate device.
  • the data when the data is first loaded in a user machine at least one data item unique to that machine is encrypted to form a first number, the first number is displayed on a screen, the
  • the user keys the first number into the external device wherein it is decrypted and transformed via the algorithm to provide a second number which is displayed to the user, and the user then enters the second number in the user machine wherein it is subsequently retained.
  • the user machine locates said unique data item(s) and encrypts it to form said first number, and compares the first number now generated with the stored second number via the predetermined algorithm to authorise or deny use.
  • the data may include software enabling the data to be deinstalled from that user machine by a process including deletion of the algorithm from that machine.
  • a device for use in the foregoing method includes data entry means, calculating means including embedded data defining said algorithm, and data output means, whereby entry of said first number leads to the outputting of said second number .
  • the data entry means is a keyboard
  • the data output means is a display
  • the device is a self-contained, readily portable (preferably credit card sized) unit.
  • Fig 1 is a flow chart illustrating the method of operation of one embodiment of the invention.
  • Fig 2 is a front view of a card for use in the method .
  • computer software is supplied to a purchaser on a suitable medium such as a floppy disk in the usual way and this is packaged together with a card 10 which will be described in further detail below.
  • the software as supplied includes the security routines which will now be described with reference to Fig 1.
  • UDI unique data identifier
  • the UDI is encrypted by a simple routine to form a first number.
  • the first number is a seven digit number in which some positions are random numbers which are ignored in the further steps to be described, and other positions are the UDI modified by adding or subtracting predefined numbers.
  • the card 10 is a credit card sized calculator having a keyboard 12 and a display 14.
  • the card 10 contains a conventional chip which has a predefined mathematical algorithm burned in during manufacture. The user keys in the seven digit number which is processed via the algorithm, with the random numbers being ignored, to produce a second number, preferably in the form of five digit number.
  • the card 10 may be provided with OK and clear keys. This allows the user to compare the number which he has keyed in with the seven digit number on the computer screen before pressing the OK key.
  • the card 10 is preferably set up in such a way that the user may make only a limited number of entries, for example three.
  • the software loaded in the computer contains the same algorithm and therefore can translate the second number via the algorithm into the format of the first number and check that these correspond.
  • the second, five digit number is retained as part of the software thereafter and each time the software is run the seven digit number is generated and compared via the algorithm of the stored five digit number.
  • the effect of this arrangement is that the software can be copied freely from one machine to another but will only ever run on the machine on which it was first installed.
  • the invention relies upon the use of an algorithm which is resident in the software and is also resident in an external device such as the card 10, and on the use of the algorithm to manipulate some numerical value which is unique (or nearly so) to a . specific machine.
  • the card could become disabled after use and have to be thrown away or returned to the supplier.
  • more sophisticated arrangements are possible. For example, it would be possible to make use of similar process steps to deinstall the software from the machine on which it was first loaded and reinstalled on another machine, with the algorithm hidden in the card being used to authorise the deinstallation.

Abstract

L'invention concerne un procédé permettant d'empêcher l'utilisation multiple non autorisée de logiciels ou analogues, utilisant un algorithme prédéterminé prévu aussi bien dans le logiciel, que dans un dispositif extérieur afin d'exécuter une routine d'autorisation qui comprend l'utilisation de l'algorithme pour transformer une donnée élémentaire propre à la machine particulière sur laquelle le logiciel a été chargé en premier.
PCT/GB1998/002957 1997-10-04 1998-10-05 Procede et appareil de securite des donnees numeriques WO1999018490A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU92750/98A AU9275098A (en) 1997-10-04 1998-10-05 Method and apparatus for digital data security

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB9721053.8A GB9721053D0 (en) 1997-10-04 1997-10-04 Software guardcard
GB9721053.8 1997-10-04

Publications (1)

Publication Number Publication Date
WO1999018490A1 true WO1999018490A1 (fr) 1999-04-15

Family

ID=10820037

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1998/002957 WO1999018490A1 (fr) 1997-10-04 1998-10-05 Procede et appareil de securite des donnees numeriques

Country Status (3)

Country Link
AU (1) AU9275098A (fr)
GB (1) GB9721053D0 (fr)
WO (1) WO1999018490A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003036442A2 (fr) * 2001-10-26 2003-05-01 Koninklijke Philips Electronics N.V. Procede d'association d'un domaine des donnees logicielles a du materiel specifique
WO2008034900A1 (fr) * 2006-09-21 2008-03-27 Boesgaard Soerensen Hans Marti Fabrication de fichiers de programme exécutables par ordinateur à partir d'un code source
US8468351B2 (en) 2006-12-15 2013-06-18 Codesealer Aps Digital data authentication
US9471910B2 (en) 1999-10-25 2016-10-18 Smartflash, LLC Data storage and access systems

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0302710A2 (fr) * 1987-08-05 1989-02-08 International Business Machines Corporation Une méthode pour commander l'utilisation des programmes d'ordinateur
FR2654234A1 (fr) * 1989-11-03 1991-05-10 Gremillet Dominique Dispositif et procede pour la realisation de verrouillages materiels ou logiciels, dynamiques et aleatoires, associes a des clefs dynamiques et intelligentes.
US5259029A (en) * 1990-05-16 1993-11-02 Duncan Jr F Jeff Decoding device for computer software protection

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0302710A2 (fr) * 1987-08-05 1989-02-08 International Business Machines Corporation Une méthode pour commander l'utilisation des programmes d'ordinateur
FR2654234A1 (fr) * 1989-11-03 1991-05-10 Gremillet Dominique Dispositif et procede pour la realisation de verrouillages materiels ou logiciels, dynamiques et aleatoires, associes a des clefs dynamiques et intelligentes.
US5259029A (en) * 1990-05-16 1993-11-02 Duncan Jr F Jeff Decoding device for computer software protection

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9471910B2 (en) 1999-10-25 2016-10-18 Smartflash, LLC Data storage and access systems
WO2003036442A2 (fr) * 2001-10-26 2003-05-01 Koninklijke Philips Electronics N.V. Procede d'association d'un domaine des donnees logicielles a du materiel specifique
WO2003036442A3 (fr) * 2001-10-26 2004-03-18 Koninkl Philips Electronics Nv Procede d'association d'un domaine des donnees logicielles a du materiel specifique
WO2008034900A1 (fr) * 2006-09-21 2008-03-27 Boesgaard Soerensen Hans Marti Fabrication de fichiers de programme exécutables par ordinateur à partir d'un code source
US8468351B2 (en) 2006-12-15 2013-06-18 Codesealer Aps Digital data authentication
US8949607B2 (en) 2006-12-15 2015-02-03 Codesealer Aps Digital data authentication

Also Published As

Publication number Publication date
AU9275098A (en) 1999-04-27
GB9721053D0 (en) 1997-12-03

Similar Documents

Publication Publication Date Title
US5737416A (en) Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption stub
US5689560A (en) Method and apparatus for enabling trial period use of software products: method and apparatus for allowing a try-and-buy user interaction
EP0679977B1 (fr) Méthode et appareil permettant de prendre des logiciels à l'essai et permettant la distribution des objets de logiciels
US5757908A (en) Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing an encryption header
US5757907A (en) Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-dependent identification
JP3243331B2 (ja) ソフトウェア管理用階層媒体の作成方法,ソフトウェア管理用階層媒体の作成装置およびソフトウェア管理用階層媒体
US5490216A (en) System for software registration
US5103476A (en) Secure system for activating personal computer software at remote locations
US5553139A (en) Method and apparatus for electronic license distribution
US20060112019A1 (en) System and method of authenticating licensed computer programs
EP0636962A3 (fr) Méthode de protection de distribution de logiciels
WO2000075760A1 (fr) Procede et systeme destines a empecher l'utilisation non autorisee d'un logiciel
JPH10240520A (ja) 情報の流通の際に個人情報をキーとして用いる方法およびシステム
KR19990029307A (ko) 전자적으로 제공되는 서비스에 대한 액세스 제어방법 및 시스템
JPH08335182A (ja) ファイル保護システム及びそのファイル保護システムを用いたソフトウエア利用システム及びそのソフトウエア利用システムに用いられる記録媒体
JP2002116839A (ja) コンピュータ・ソフトウェア及び/又はコンピュータで読取り可能なデータを保護する方法、並びに保護装置
US20060212649A1 (en) License table for software protection
JP2001175468A (ja) ソフトウエア使用制御方法とその装置
US5710817A (en) Method and device for preventing unauthorized access to a computer system
JP2000047987A (ja) データ出力方法および装置並びに記録媒体
WO1999018490A1 (fr) Procede et appareil de securite des donnees numeriques
EP0624267B1 (fr) Procede et dispositif interdisant l'acces non autorise a un systeme informatique
US6992563B1 (en) Method for protecting devices, specially car radios, against theft
JP2009003700A (ja) アプリケーション所定処理許可プログラム
JP3289656B2 (ja) プログラムの実行制御方式

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

WWE Wipo information: entry into national phase

Ref document number: 1998945422

Country of ref document: EP

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
NENP Non-entry into the national phase

Ref country code: KR

WWW Wipo information: withdrawn in national office

Ref document number: 1998945422

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA