CA2226386A1 - Protection of software against use without permit - Google Patents

Protection of software against use without permit

Info

Publication number
CA2226386A1
CA2226386A1 CA002226386A CA2226386A CA2226386A1 CA 2226386 A1 CA2226386 A1 CA 2226386A1 CA 002226386 A CA002226386 A CA 002226386A CA 2226386 A CA2226386 A CA 2226386A CA 2226386 A1 CA2226386 A1 CA 2226386A1
Authority
CA
Canada
Prior art keywords
software
key
utilized
decryption
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002226386A
Other languages
French (fr)
Other versions
CA2226386C (en
Inventor
Sigurd Sigbjornsen
Magne Arild Haglund
Vladimir A. Oleshchuk
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sospita AS
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from NO952795A external-priority patent/NO302388B1/en
Application filed by Individual filed Critical Individual
Publication of CA2226386A1 publication Critical patent/CA2226386A1/en
Application granted granted Critical
Publication of CA2226386C publication Critical patent/CA2226386C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

An arrangement to protect software, particularly freely distributed application software, against utilization without permission of the copyright holder. By encrypting the software employing a key (k1) which is different from that key (k2) which is employed in the decryption, better protection is obtained against unauthorized utilization when the decryption key is kept secret to the user. Further improved security is achieved by additionally executing scrambling-descrambling of the communication between the computer in which the software is utilized and the external unit in which the decryption key is stored. Also, the external unit is arranged such that it returns to the host computer, the result from its processing of data received from the host, the result then being utilized in the further execution of the respective program.
CA002226386A 1995-07-13 1996-07-10 Protection of software against use without permit Expired - Fee Related CA2226386C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
NO952795A NO302388B1 (en) 1995-07-13 1995-07-13 Procedure and apparatus for protecting software against unauthorized use
NO952795 1995-07-13
PCT/NO1996/000171 WO1997003398A1 (en) 1995-07-13 1996-07-10 Protection of software against use without permit

Publications (2)

Publication Number Publication Date
CA2226386A1 true CA2226386A1 (en) 1997-01-30
CA2226386C CA2226386C (en) 2006-12-05

Family

ID=37560838

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002226386A Expired - Fee Related CA2226386C (en) 1995-07-13 1996-07-10 Protection of software against use without permit

Country Status (1)

Country Link
CA (1) CA2226386C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7177428B2 (en) 2000-09-26 2007-02-13 Spielo Manufacturing Ulc System and method for downloading electronic information to a video lottery terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7177428B2 (en) 2000-09-26 2007-02-13 Spielo Manufacturing Ulc System and method for downloading electronic information to a video lottery terminal
US8488789B2 (en) 2000-09-26 2013-07-16 Spielo International Canada, Ulc System and method for downloading electronic information to a video lottery terminal
US8769254B2 (en) 2000-09-26 2014-07-01 Gtech Canada Ulc System and method for downloading electronic information to a video lottery

Also Published As

Publication number Publication date
CA2226386C (en) 2006-12-05

Similar Documents

Publication Publication Date Title
EP1253503A3 (en) Protection of software against use without permit
EP0583140B1 (en) System for seamless processing of encrypted and non-encrypted data and instructions
WO2003054662A3 (en) A system and method for preventing unauthorized use of protected software utilizing a portable security device
GB0503823D0 (en) System for realtime game network tracking
WO2002056156A3 (en) Computer system protection
EP1202150A3 (en) Microprocessor with program and data protection function under multi-task environment
WO1993021581A3 (en) Cryptographic data security in a secured computer system
EP1505472A3 (en) An electronic data protection system
RU2010114241A (en) MULTIFACTOR CONTENT PROTECTION
CA2543572A1 (en) Tamper-resistant trusted virtual machine
MY146340A (en) Method of protecting and managing digital contents and system for using thereof
GB9422389D0 (en) Authenticating access control for sensitive functions
EP0121853A3 (en) Data processing system having public encryption and private decryption keys
CN111177773B (en) Full disk encryption and decryption method and system based on network card ROM
CA2312967A1 (en) System and method of sending and receiving secure data with a shared key
CA2226386A1 (en) Protection of software against use without permit
WO2002037222A3 (en) Electronic file protection using location
CN2886687Y (en) Software protection device with data transmission process security control
Suhler et al. Software Authorization Systems.
SE9701894L (en) Method and apparatus for computer systems
ES2179775A1 (en) System for protection against the illegal use and license management of software based on independent processing devices and cryptography
WO1999035553A1 (en) Cryptographic token
JPH01194029A (en) Device for preventing program from being furtively used
Everett “PADLOCK”: solution to software protection?
Barry Data Security: It's Not Just for Secret Agents Anymore

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed