CA2267516A1 - Method for preventing unauthorized copying of digital media - Google Patents

Method for preventing unauthorized copying of digital media Download PDF

Info

Publication number
CA2267516A1
CA2267516A1 CA 2267516 CA2267516A CA2267516A1 CA 2267516 A1 CA2267516 A1 CA 2267516A1 CA 2267516 CA2267516 CA 2267516 CA 2267516 A CA2267516 A CA 2267516A CA 2267516 A1 CA2267516 A1 CA 2267516A1
Authority
CA
Canada
Prior art keywords
serial number
software
copied
unauthorized copying
initial program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA 2267516
Other languages
French (fr)
Inventor
Ami Rajpal
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CA 2267516 priority Critical patent/CA2267516A1/en
Publication of CA2267516A1 publication Critical patent/CA2267516A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Description

METHOD FOR PREVENTING UNAUTHORIZED COPYING OF DIGITAL MEDIA
Field of the invention The present invention relates to a method for preventing unauthorized copying of software on digital media, such as CD-ROMs, floppy disks, hard disks, graphics cards, sound cards, and the like.
Description of the prior art One of the problems associated with the creation of software is that it can easily be copied and transported. The purpose of the invention is to provide a method for preventing unauthorized copying of the software.
Summary of the invention The object of the invention is to provide a method for preventing unauthorized copying of software integrated or present on digital media such as, but not limited to, CD-ROMs, floppy disks, hard disks, graphics cards, sound cards and the like.
In accordance with the invention, this object is achieved with a method comprising the steps of:
reading a serial number off a physical component; and encoding the serial number in a file contained in the physical component.
Accordingly, if the software that is present in the physical component is copied to another physical component, the software will decode the encoded serial number and verify to see if the decoded serial number and the serial number of the other physical component are the same. If the decoded serial number and the serial number of the other physical component are the same, the software will function properly. However, if the serial numbers do not match, the software will be disabled.
2 Preferably, the method further includes, after reading the serial number, the step of encrypting the serial number.
Brief description of the drawings The present invention and its advantages will be more easily understood after reading the following non-restrictive description of preferred embodiments thereof, made with reference to the following drawings in which:
Figure 1 is a schematic representation of the use of the method on a CD-ROM;
Figure 2 is a schematic representation of the use of the method on hardware, and in particular, a graphics card;
Figure 3 is a schematic representation of the use of the method on a media device such as a hard disk drive;
Figure 4 is a schematic representation of the use of the method for software; and Figure 5 is a schematic representation of the use of the method for two different devices, such as a graphics card and a media device.
Description of a preferred embodiment of the invention The invention, as mentioned above, relates to the unauthorized copying of software that is present on physical media such as CD-ROMs, graphics cards, floppy disks, hard disks, sound card, etc.
The method of the invention is applicable in manufacturing situations, where it is possible to obtain the necessary information to put into practice the method of the invention.
During manufacturing of such physical media as mentioned above, the serial number of the target device, i.e. the physical media, is read.
Optionally, this serial number of the target device can subsequently be encrypted.

' CA 02267516 1999-04-13
3 Once the serial number is read and/or encrypted, it is encoded in the initial program and/or other corresponding file or files that are to be copied to the target device.
The initial program and/or other corresponding files are then copied to the target device.
Should the information contained on the target device be copied to another similar device, when the software is initially run, it will check to see if the encoded and optionally encrypted serial number matches the serial number of the similar device. If the serial numbers match, there will be no problems running the software. However, if the serial numbers do not match, the software will include a set of instructions preventing it from running properly, or preventing it from running at all. Consequently, if unauthorised copying of the software is performed, the software will not function or will function improperly.
Referring now to Fig. 1, there is shown the steps of the method for a CD
ROM. The serial number of the CD-ROM is read (for example, "ABC123). The serial number is then encrypted, resulting in "321 CBA", for example. The encrypted serial number is then copied to the required initial program or corresponding files, which are then copied to the designated media device, in this case the CD-ROM. Should the initial program and other corresponding files be completely copied to another CD-ROM, the initial program and other corresponding files will check to see if the serial number embedded therein matches the serial number of the other CD-ROM. If they do, the initial program and other files will function properly, but if they do not, the initial program and other corresponding files will not function properly or not at all.
Referring now to Fig. 2, there is shown the steps of the method for a piece of hardware, such as a graphics card. As in the previous example, the serial number of the graphics card is read, encrypted, copied to the initial program and/or other corresponding files. The initial program and/or other corresponding files are then copied (during installation of the piece of hardware) to a designated media device, such as a hard disk drive. During installation, the initial program will check to see if the serial number embedded therein matches the serial number on the piece of hardware.
4 Referring now to Fig. 3, there is shown the steps of the method for a media device, such as a hard disk drive. The serial number of the disk drive is read, encrypted, copied to the required initial program or external files to be copied to the designated media device source. The initial program and/or other corresponding files are then copied to the designated media device.
Referring now to Fig 4, there is shown the steps of the method for a typical software program. The serial number of the software is read, encrypted and then copied to the required initial program and/or external file to be copied to the designated media device source. The required initial program and/or external file is then copied to the designated media device source.
Fig. 5 shows a variation of the invention, where two different serial numbers can be encoded and encrypted. It should be noted that the encryption could be combined, or for greater security, separated.
Although the present invention has been explained hereinabove by way of a preferred embodiment thereof, it should be pointed out that any modifications to this preferred embodiment within the scope of the appended claims is not deemed to alter of change the nature and scope of the present invention.

Claims

CA 2267516 1999-04-13 1999-04-13 Method for preventing unauthorized copying of digital media Abandoned CA2267516A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA 2267516 CA2267516A1 (en) 1999-04-13 1999-04-13 Method for preventing unauthorized copying of digital media

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA 2267516 CA2267516A1 (en) 1999-04-13 1999-04-13 Method for preventing unauthorized copying of digital media

Publications (1)

Publication Number Publication Date
CA2267516A1 true CA2267516A1 (en) 2000-10-13

Family

ID=29588658

Family Applications (1)

Application Number Title Priority Date Filing Date
CA 2267516 Abandoned CA2267516A1 (en) 1999-04-13 1999-04-13 Method for preventing unauthorized copying of digital media

Country Status (1)

Country Link
CA (1) CA2267516A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102004040461A1 (en) * 2004-08-20 2006-02-23 Giesecke & Devrient Gmbh Method for loading data into a mass storage medium and a chip

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102004040461A1 (en) * 2004-08-20 2006-02-23 Giesecke & Devrient Gmbh Method for loading data into a mass storage medium and a chip

Similar Documents

Publication Publication Date Title
US20210294879A1 (en) Securing executable code integrity using auto-derivative key
US6748537B2 (en) System and method for controlling the use and duplication of digital content distributed on removable media
EP2264640B1 (en) Feature specific keys for executable code
JP5034921B2 (en) Information processing apparatus, disk, information processing method, and program
MX2007011377A (en) Secure boot.
JP2005506628A (en) How to bind a software data domain to specific hardware
JP2004527031A (en) Protection system and protection method for preventing copy of protection optical disk creation information
WO2003049106A3 (en) Method and apparatus for verifying the integrity of system data
US20060123483A1 (en) Method and system for protecting against illegal copy and/or use of digital contents stored on optical or other media
JP2005513561A (en) Changing the segment size to improve security
US20020146121A1 (en) Method and system for protecting data
US20020144130A1 (en) Apparatus and methods for detecting illicit content that has been imported into a secure domain
CA2393645A1 (en) Computer-readable medium with microprocessor to control reading and computer arranged to communicate with such a medium
MXPA97005402A (en) System of protection of software (programs) of cd-
CA2267516A1 (en) Method for preventing unauthorized copying of digital media
KR20030022817A (en) Apparatus and method for attacking a screening algorithm based on partitioning of content
WO2001052234A1 (en) Protecting compressed content after separation from original source
US20090038016A1 (en) Detecting And Reacting To Protected Content Material In A Display Or Video Drive Unit
US20090092019A1 (en) Information processing apparatus, disc, and information processing method, and computer program used therewith
JP2002268948A (en) Digital information system and method for verifying contents information
JP2004530998A (en) Data protection with irreversible data corruption
JPH0778729B2 (en) Software copy protection system
GB2373091A (en) Copy protection
JP2003173297A (en) Information processing system and method for recording media

Legal Events

Date Code Title Description
FZDE Dead