CA2226386A1 - Protection of software against use without permit - Google Patents
Protection of software against use without permitInfo
- Publication number
- CA2226386A1 CA2226386A1 CA002226386A CA2226386A CA2226386A1 CA 2226386 A1 CA2226386 A1 CA 2226386A1 CA 002226386 A CA002226386 A CA 002226386A CA 2226386 A CA2226386 A CA 2226386A CA 2226386 A1 CA2226386 A1 CA 2226386A1
- Authority
- CA
- Canada
- Prior art keywords
- software
- key
- utilized
- decryption
- result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
An arrangement to protect software, particularly freely distributed application software, against utilization without permission of the copyright holder. By encrypting the software employing a key (k1) which is different from that key (k2) which is employed in the decryption, better protection is obtained against unauthorized utilization when the decryption key is kept secret to the user. Further improved security is achieved by additionally executing scrambling-descrambling of the communication between the computer in which the software is utilized and the external unit in which the decryption key is stored. Also, the external unit is arranged such that it returns to the host computer, the result from its processing of data received from the host, the result then being utilized in the further execution of the respective program.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NO952795A NO302388B1 (en) | 1995-07-13 | 1995-07-13 | Procedure and apparatus for protecting software against unauthorized use |
NO952795 | 1995-07-13 | ||
PCT/NO1996/000171 WO1997003398A1 (en) | 1995-07-13 | 1996-07-10 | Protection of software against use without permit |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2226386A1 true CA2226386A1 (en) | 1997-01-30 |
CA2226386C CA2226386C (en) | 2006-12-05 |
Family
ID=37560838
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002226386A Expired - Fee Related CA2226386C (en) | 1995-07-13 | 1996-07-10 | Protection of software against use without permit |
Country Status (1)
Country | Link |
---|---|
CA (1) | CA2226386C (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7177428B2 (en) | 2000-09-26 | 2007-02-13 | Spielo Manufacturing Ulc | System and method for downloading electronic information to a video lottery terminal |
-
1996
- 1996-07-10 CA CA002226386A patent/CA2226386C/en not_active Expired - Fee Related
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7177428B2 (en) | 2000-09-26 | 2007-02-13 | Spielo Manufacturing Ulc | System and method for downloading electronic information to a video lottery terminal |
US8488789B2 (en) | 2000-09-26 | 2013-07-16 | Spielo International Canada, Ulc | System and method for downloading electronic information to a video lottery terminal |
US8769254B2 (en) | 2000-09-26 | 2014-07-01 | Gtech Canada Ulc | System and method for downloading electronic information to a video lottery |
Also Published As
Publication number | Publication date |
---|---|
CA2226386C (en) | 2006-12-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1253503A3 (en) | Protection of software against use without permit | |
EP0583140B1 (en) | System for seamless processing of encrypted and non-encrypted data and instructions | |
WO2003054662A3 (en) | A system and method for preventing unauthorized use of protected software utilizing a portable security device | |
GB0503823D0 (en) | System for realtime game network tracking | |
WO2002056156A3 (en) | Computer system protection | |
EP1202150A3 (en) | Microprocessor with program and data protection function under multi-task environment | |
WO1993021581A3 (en) | Cryptographic data security in a secured computer system | |
EP1505472A3 (en) | An electronic data protection system | |
RU2010114241A (en) | MULTIFACTOR CONTENT PROTECTION | |
CA2543572A1 (en) | Tamper-resistant trusted virtual machine | |
MY146340A (en) | Method of protecting and managing digital contents and system for using thereof | |
GB9422389D0 (en) | Authenticating access control for sensitive functions | |
EP0121853A3 (en) | Data processing system having public encryption and private decryption keys | |
CN111177773B (en) | Full disk encryption and decryption method and system based on network card ROM | |
CA2312967A1 (en) | System and method of sending and receiving secure data with a shared key | |
CA2226386A1 (en) | Protection of software against use without permit | |
WO2002037222A3 (en) | Electronic file protection using location | |
CN2886687Y (en) | Software protection device with data transmission process security control | |
Suhler et al. | Software Authorization Systems. | |
SE9701894L (en) | Method and apparatus for computer systems | |
ES2179775A1 (en) | System for protection against the illegal use and license management of software based on independent processing devices and cryptography | |
WO1999035553A1 (en) | Cryptographic token | |
JPH01194029A (en) | Device for preventing program from being furtively used | |
Everett | “PADLOCK”: solution to software protection? | |
Barry | Data Security: It's Not Just for Secret Agents Anymore |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |