AU778380B2 - Portable authorization device for authorizing use of protected information and associated method - Google Patents

Portable authorization device for authorizing use of protected information and associated method Download PDF

Info

Publication number
AU778380B2
AU778380B2 AU48394/00A AU4839400A AU778380B2 AU 778380 B2 AU778380 B2 AU 778380B2 AU 48394/00 A AU48394/00 A AU 48394/00A AU 4839400 A AU4839400 A AU 4839400A AU 778380 B2 AU778380 B2 AU 778380B2
Authority
AU
Australia
Prior art keywords
information
key
authorization
authorization device
computer system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired
Application number
AU48394/00A
Other languages
English (en)
Other versions
AU4839400A (en
Inventor
Paul Allen Cronce
Joseph M. Fontana
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Pace Anti Piracy Inc
Original Assignee
Pace Anti Piracy Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/503,778 external-priority patent/US7032240B1/en
Application filed by Pace Anti Piracy Inc filed Critical Pace Anti Piracy Inc
Publication of AU4839400A publication Critical patent/AU4839400A/en
Application granted granted Critical
Publication of AU778380B2 publication Critical patent/AU778380B2/en
Anticipated expiration legal-status Critical
Expired legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
AU48394/00A 1999-12-07 2000-05-10 Portable authorization device for authorizing use of protected information and associated method Expired AU778380B2 (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US16950699P 1999-12-07 1999-12-07
US60/169506 1999-12-07
US09/503778 2000-02-14
US09/503,778 US7032240B1 (en) 1999-12-07 2000-02-14 Portable authorization device for authorizing use of protected information and associated method
PCT/US2000/012906 WO2001042888A1 (en) 1999-12-07 2000-05-10 Portable authorization device for authorizing use of protected information and associated method

Publications (2)

Publication Number Publication Date
AU4839400A AU4839400A (en) 2001-06-18
AU778380B2 true AU778380B2 (en) 2004-12-02

Family

ID=26865117

Family Applications (1)

Application Number Title Priority Date Filing Date
AU48394/00A Expired AU778380B2 (en) 1999-12-07 2000-05-10 Portable authorization device for authorizing use of protected information and associated method

Country Status (6)

Country Link
EP (1) EP1236074A1 (zh)
JP (2) JP2003516578A (zh)
CN (1) CN1254723C (zh)
AU (1) AU778380B2 (zh)
CA (1) CA2393543C (zh)
IL (2) IL149804A0 (zh)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005202650A (ja) * 2004-01-15 2005-07-28 Casio Comput Co Ltd 認証システム
US7747872B2 (en) * 2004-03-25 2010-06-29 Franklin Electronic Publishers, Inc. Secure portable electronic reference device
JP2005346702A (ja) * 2004-05-04 2005-12-15 Heidelberger Druckmas Ag 識別表示装置を備える診断システム
KR100834990B1 (ko) 2005-08-01 2008-06-04 민정홍 이동식저장장치에서 실행되는 보안시스템
US7752139B2 (en) 2005-12-27 2010-07-06 Michael Noel Hu Method and system for managing software licenses and reducing unauthorized use of software
JP2007226405A (ja) * 2006-02-22 2007-09-06 Toshiba Corp 監視制御システム
EP2080100A4 (en) * 2006-10-04 2011-03-02 Trek 2000 Int Ltd METHOD, DEVICE AND SYSTEM FOR AUTHENTICATING EXTERNAL STORAGE DEVICES
JP2008140091A (ja) * 2006-12-01 2008-06-19 Shimadzu Corp 分析データ管理システム
JP2008140175A (ja) * 2006-12-01 2008-06-19 Yazaki Corp プロテクタ共通化装置、プロテクタ共通化プログラム、プロテクタ共通化方法、ライセンス管理システム、及び、プロテクタ
JP4729051B2 (ja) * 2008-01-04 2011-07-20 東芝テック株式会社 情報処理装置
JP5130126B2 (ja) * 2008-06-11 2013-01-30 京セラドキュメントソリューションズ株式会社 ライセンス数管理装置、ライセンス数管理方法及びライセンス数管理プログラム
US9311504B2 (en) 2014-06-23 2016-04-12 Ivo Welch Anti-identity-theft method and hardware database device
CN105249126A (zh) * 2015-10-26 2016-01-20 胡本奎 一种杨梅复合保健晶的制作方法
KR101757149B1 (ko) * 2016-11-09 2017-07-12 알서포트 주식회사 권한 부여 기동장치를 이용한 스마트기기 응용프로그램의 자동 시험방법
CN111190614B (zh) * 2019-12-26 2023-12-19 北京威努特技术有限公司 一种软件安装的方法及计算机设备

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2667173A1 (fr) * 1990-09-21 1992-03-27 Telemecanique Procede de protection des droits d'utilisation de plusieurs logiciels sur un poste de travail informatique ou d'automatisme industriel et systeme pour sa mise en óoeuvre.
WO1999007255A1 (en) * 1997-08-12 1999-02-18 G.B. Boucherie N.V. A method of endrounding loose fibres

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS58195975A (ja) * 1982-05-12 1983-11-15 Canon Inc 電子機器の使用者認識パツク
US4562306A (en) * 1983-09-14 1985-12-31 Chou Wayne W Method and apparatus for protecting computer software utilizing an active coded hardware device
JP2544101B2 (ja) * 1985-05-23 1996-10-16 株式会社 メルコ コンピユ−タプログラムの盗用防止装置
EP0253885A4 (en) * 1985-12-26 1991-03-20 Gordian Systems Solid state key for controlling access to computer systems and to computer software and/or for secure communications
US5778071A (en) * 1994-07-12 1998-07-07 Information Resource Engineering, Inc. Pocket encrypting and authenticating communications device
JPH1031587A (ja) * 1996-07-15 1998-02-03 Hitachi Ltd データ端末装置およびコンピュータプログラム
US5854891A (en) * 1996-08-09 1998-12-29 Tritheim Technologies, Inc. Smart card reader having multiple data enabling storage compartments
DE19731380C2 (de) * 1997-07-22 1999-08-05 Wolfgang Neifer Sicherheits-Matrix für eine Mehrzahl von Sicherheitslogik-Chipkarten
JPH11203124A (ja) * 1998-01-20 1999-07-30 Oki Electric Ind Co Ltd ソフトウェアの駆動方法

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2667173A1 (fr) * 1990-09-21 1992-03-27 Telemecanique Procede de protection des droits d'utilisation de plusieurs logiciels sur un poste de travail informatique ou d'automatisme industriel et systeme pour sa mise en óoeuvre.
WO1999007255A1 (en) * 1997-08-12 1999-02-18 G.B. Boucherie N.V. A method of endrounding loose fibres

Also Published As

Publication number Publication date
CA2393543C (en) 2007-04-17
JP4541901B2 (ja) 2010-09-08
CN1408082A (zh) 2003-04-02
IL149804A0 (en) 2002-11-10
EP1236074A1 (en) 2002-09-04
CA2393543A1 (en) 2001-06-14
JP2005174359A (ja) 2005-06-30
AU4839400A (en) 2001-06-18
CN1254723C (zh) 2006-05-03
JP2003516578A (ja) 2003-05-13
IL149804A (en) 2007-07-04

Similar Documents

Publication Publication Date Title
US7032240B1 (en) Portable authorization device for authorizing use of protected information and associated method
EP1942430B1 (en) Token Passing Technique for Media Playback Devices
EP1423771B1 (en) Method to protect software against unauthorized use
WO2021128244A1 (zh) 一种注册授权方法及系统
US6684198B1 (en) Program data distribution via open network
US8799654B2 (en) Methods and apparatus for authenticating data as originating from a storage and processing device and for securing software and data stored on the storage and processing device
US20030028786A1 (en) System and method for software anti-piracy licensing and distribution
AU778380B2 (en) Portable authorization device for authorizing use of protected information and associated method
US20050210236A1 (en) Digital rights management structure, portable storage device, and contents management method using the portable storage device
US20050204405A1 (en) Method and system for digital rights management
CN101142599A (zh) 基于硬件识别的数字权利管理系统
WO2001052019A1 (en) Encrypting a digital object based on a key id selected therefor
JP2004021755A (ja) 記憶装置
WO2001052020A1 (en) Releasing decrypted digital content to an authenticated path
JP2004528632A (ja) プログラマブル携帯データ記憶媒体用プログラムの分散生成方法およびシステム
JP2001175468A (ja) ソフトウエア使用制御方法とその装置
JP2002518727A (ja) ソフトウェア製品の実行の制御方法
JPH07123086A (ja) Icカードを利用した著作物通信管理システム
US20040255136A1 (en) Method and device for protecting information against unauthorised use
JP2000047866A (ja) プログラム実行プロテクト方法およびicカード、並びに記録媒体
KR100423506B1 (ko) 아이씨칩내장카드를 이용한 온라인상에서의 소프트웨어불법복제방지방법
JP2001109625A (ja) ソフトウェア課金システム
WO1999003031A1 (en) A method and system for protecting intellectual property products distributed in mass market
JP2000207197A (ja) コンピュ―タソフトウェアのプロテクトシステム及び方法
WO2001052471A1 (en) Producing a new black box for a digital rights management (drm) system

Legal Events

Date Code Title Description
MK14 Patent ceased section 143(a) (annual fees not paid) or expired