CA2267516A1 - Method for preventing unauthorized copying of digital media - Google Patents
Method for preventing unauthorized copying of digital media Download PDFInfo
- Publication number
- CA2267516A1 CA2267516A1 CA 2267516 CA2267516A CA2267516A1 CA 2267516 A1 CA2267516 A1 CA 2267516A1 CA 2267516 CA2267516 CA 2267516 CA 2267516 A CA2267516 A CA 2267516A CA 2267516 A1 CA2267516 A1 CA 2267516A1
- Authority
- CA
- Canada
- Prior art keywords
- serial number
- software
- copied
- unauthorized copying
- initial program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Description
METHOD FOR PREVENTING UNAUTHORIZED COPYING OF DIGITAL MEDIA
Field of the invention The present invention relates to a method for preventing unauthorized copying of software on digital media, such as CD-ROMs, floppy disks, hard disks, graphics cards, sound cards, and the like.
Description of the prior art One of the problems associated with the creation of software is that it can easily be copied and transported. The purpose of the invention is to provide a method for preventing unauthorized copying of the software.
Summary of the invention The object of the invention is to provide a method for preventing unauthorized copying of software integrated or present on digital media such as, but not limited to, CD-ROMs, floppy disks, hard disks, graphics cards, sound cards and the like.
In accordance with the invention, this object is achieved with a method comprising the steps of:
reading a serial number off a physical component; and encoding the serial number in a file contained in the physical component.
Accordingly, if the software that is present in the physical component is copied to another physical component, the software will decode the encoded serial number and verify to see if the decoded serial number and the serial number of the other physical component are the same. If the decoded serial number and the serial number of the other physical component are the same, the software will function properly. However, if the serial numbers do not match, the software will be disabled.
Field of the invention The present invention relates to a method for preventing unauthorized copying of software on digital media, such as CD-ROMs, floppy disks, hard disks, graphics cards, sound cards, and the like.
Description of the prior art One of the problems associated with the creation of software is that it can easily be copied and transported. The purpose of the invention is to provide a method for preventing unauthorized copying of the software.
Summary of the invention The object of the invention is to provide a method for preventing unauthorized copying of software integrated or present on digital media such as, but not limited to, CD-ROMs, floppy disks, hard disks, graphics cards, sound cards and the like.
In accordance with the invention, this object is achieved with a method comprising the steps of:
reading a serial number off a physical component; and encoding the serial number in a file contained in the physical component.
Accordingly, if the software that is present in the physical component is copied to another physical component, the software will decode the encoded serial number and verify to see if the decoded serial number and the serial number of the other physical component are the same. If the decoded serial number and the serial number of the other physical component are the same, the software will function properly. However, if the serial numbers do not match, the software will be disabled.
2 Preferably, the method further includes, after reading the serial number, the step of encrypting the serial number.
Brief description of the drawings The present invention and its advantages will be more easily understood after reading the following non-restrictive description of preferred embodiments thereof, made with reference to the following drawings in which:
Figure 1 is a schematic representation of the use of the method on a CD-ROM;
Figure 2 is a schematic representation of the use of the method on hardware, and in particular, a graphics card;
Figure 3 is a schematic representation of the use of the method on a media device such as a hard disk drive;
Figure 4 is a schematic representation of the use of the method for software; and Figure 5 is a schematic representation of the use of the method for two different devices, such as a graphics card and a media device.
Description of a preferred embodiment of the invention The invention, as mentioned above, relates to the unauthorized copying of software that is present on physical media such as CD-ROMs, graphics cards, floppy disks, hard disks, sound card, etc.
The method of the invention is applicable in manufacturing situations, where it is possible to obtain the necessary information to put into practice the method of the invention.
During manufacturing of such physical media as mentioned above, the serial number of the target device, i.e. the physical media, is read.
Optionally, this serial number of the target device can subsequently be encrypted.
' CA 02267516 1999-04-13
Brief description of the drawings The present invention and its advantages will be more easily understood after reading the following non-restrictive description of preferred embodiments thereof, made with reference to the following drawings in which:
Figure 1 is a schematic representation of the use of the method on a CD-ROM;
Figure 2 is a schematic representation of the use of the method on hardware, and in particular, a graphics card;
Figure 3 is a schematic representation of the use of the method on a media device such as a hard disk drive;
Figure 4 is a schematic representation of the use of the method for software; and Figure 5 is a schematic representation of the use of the method for two different devices, such as a graphics card and a media device.
Description of a preferred embodiment of the invention The invention, as mentioned above, relates to the unauthorized copying of software that is present on physical media such as CD-ROMs, graphics cards, floppy disks, hard disks, sound card, etc.
The method of the invention is applicable in manufacturing situations, where it is possible to obtain the necessary information to put into practice the method of the invention.
During manufacturing of such physical media as mentioned above, the serial number of the target device, i.e. the physical media, is read.
Optionally, this serial number of the target device can subsequently be encrypted.
' CA 02267516 1999-04-13
3 Once the serial number is read and/or encrypted, it is encoded in the initial program and/or other corresponding file or files that are to be copied to the target device.
The initial program and/or other corresponding files are then copied to the target device.
Should the information contained on the target device be copied to another similar device, when the software is initially run, it will check to see if the encoded and optionally encrypted serial number matches the serial number of the similar device. If the serial numbers match, there will be no problems running the software. However, if the serial numbers do not match, the software will include a set of instructions preventing it from running properly, or preventing it from running at all. Consequently, if unauthorised copying of the software is performed, the software will not function or will function improperly.
Referring now to Fig. 1, there is shown the steps of the method for a CD
ROM. The serial number of the CD-ROM is read (for example, "ABC123). The serial number is then encrypted, resulting in "321 CBA", for example. The encrypted serial number is then copied to the required initial program or corresponding files, which are then copied to the designated media device, in this case the CD-ROM. Should the initial program and other corresponding files be completely copied to another CD-ROM, the initial program and other corresponding files will check to see if the serial number embedded therein matches the serial number of the other CD-ROM. If they do, the initial program and other files will function properly, but if they do not, the initial program and other corresponding files will not function properly or not at all.
Referring now to Fig. 2, there is shown the steps of the method for a piece of hardware, such as a graphics card. As in the previous example, the serial number of the graphics card is read, encrypted, copied to the initial program and/or other corresponding files. The initial program and/or other corresponding files are then copied (during installation of the piece of hardware) to a designated media device, such as a hard disk drive. During installation, the initial program will check to see if the serial number embedded therein matches the serial number on the piece of hardware.
The initial program and/or other corresponding files are then copied to the target device.
Should the information contained on the target device be copied to another similar device, when the software is initially run, it will check to see if the encoded and optionally encrypted serial number matches the serial number of the similar device. If the serial numbers match, there will be no problems running the software. However, if the serial numbers do not match, the software will include a set of instructions preventing it from running properly, or preventing it from running at all. Consequently, if unauthorised copying of the software is performed, the software will not function or will function improperly.
Referring now to Fig. 1, there is shown the steps of the method for a CD
ROM. The serial number of the CD-ROM is read (for example, "ABC123). The serial number is then encrypted, resulting in "321 CBA", for example. The encrypted serial number is then copied to the required initial program or corresponding files, which are then copied to the designated media device, in this case the CD-ROM. Should the initial program and other corresponding files be completely copied to another CD-ROM, the initial program and other corresponding files will check to see if the serial number embedded therein matches the serial number of the other CD-ROM. If they do, the initial program and other files will function properly, but if they do not, the initial program and other corresponding files will not function properly or not at all.
Referring now to Fig. 2, there is shown the steps of the method for a piece of hardware, such as a graphics card. As in the previous example, the serial number of the graphics card is read, encrypted, copied to the initial program and/or other corresponding files. The initial program and/or other corresponding files are then copied (during installation of the piece of hardware) to a designated media device, such as a hard disk drive. During installation, the initial program will check to see if the serial number embedded therein matches the serial number on the piece of hardware.
4 Referring now to Fig. 3, there is shown the steps of the method for a media device, such as a hard disk drive. The serial number of the disk drive is read, encrypted, copied to the required initial program or external files to be copied to the designated media device source. The initial program and/or other corresponding files are then copied to the designated media device.
Referring now to Fig 4, there is shown the steps of the method for a typical software program. The serial number of the software is read, encrypted and then copied to the required initial program and/or external file to be copied to the designated media device source. The required initial program and/or external file is then copied to the designated media device source.
Fig. 5 shows a variation of the invention, where two different serial numbers can be encoded and encrypted. It should be noted that the encryption could be combined, or for greater security, separated.
Although the present invention has been explained hereinabove by way of a preferred embodiment thereof, it should be pointed out that any modifications to this preferred embodiment within the scope of the appended claims is not deemed to alter of change the nature and scope of the present invention.
Referring now to Fig 4, there is shown the steps of the method for a typical software program. The serial number of the software is read, encrypted and then copied to the required initial program and/or external file to be copied to the designated media device source. The required initial program and/or external file is then copied to the designated media device source.
Fig. 5 shows a variation of the invention, where two different serial numbers can be encoded and encrypted. It should be noted that the encryption could be combined, or for greater security, separated.
Although the present invention has been explained hereinabove by way of a preferred embodiment thereof, it should be pointed out that any modifications to this preferred embodiment within the scope of the appended claims is not deemed to alter of change the nature and scope of the present invention.
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA 2267516 CA2267516A1 (en) | 1999-04-13 | 1999-04-13 | Method for preventing unauthorized copying of digital media |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA 2267516 CA2267516A1 (en) | 1999-04-13 | 1999-04-13 | Method for preventing unauthorized copying of digital media |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2267516A1 true CA2267516A1 (en) | 2000-10-13 |
Family
ID=29588658
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA 2267516 Abandoned CA2267516A1 (en) | 1999-04-13 | 1999-04-13 | Method for preventing unauthorized copying of digital media |
Country Status (1)
Country | Link |
---|---|
CA (1) | CA2267516A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102004040461A1 (en) * | 2004-08-20 | 2006-02-23 | Giesecke & Devrient Gmbh | Method for loading data into a mass storage medium and a chip |
-
1999
- 1999-04-13 CA CA 2267516 patent/CA2267516A1/en not_active Abandoned
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102004040461A1 (en) * | 2004-08-20 | 2006-02-23 | Giesecke & Devrient Gmbh | Method for loading data into a mass storage medium and a chip |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210294879A1 (en) | Securing executable code integrity using auto-derivative key | |
US6748537B2 (en) | System and method for controlling the use and duplication of digital content distributed on removable media | |
EP2264640B1 (en) | Feature specific keys for executable code | |
JP5034921B2 (en) | Information processing apparatus, disk, information processing method, and program | |
MX2007011377A (en) | Secure boot. | |
JP2005506628A (en) | How to bind a software data domain to specific hardware | |
JP2004527031A (en) | Protection system and protection method for preventing copy of protection optical disk creation information | |
WO2003049106A3 (en) | Method and apparatus for verifying the integrity of system data | |
US20060123483A1 (en) | Method and system for protecting against illegal copy and/or use of digital contents stored on optical or other media | |
JP2005513561A (en) | Changing the segment size to improve security | |
US20020146121A1 (en) | Method and system for protecting data | |
US20020144130A1 (en) | Apparatus and methods for detecting illicit content that has been imported into a secure domain | |
CA2393645A1 (en) | Computer-readable medium with microprocessor to control reading and computer arranged to communicate with such a medium | |
MXPA97005402A (en) | System of protection of software (programs) of cd- | |
CA2267516A1 (en) | Method for preventing unauthorized copying of digital media | |
KR20030022817A (en) | Apparatus and method for attacking a screening algorithm based on partitioning of content | |
WO2001052234A1 (en) | Protecting compressed content after separation from original source | |
US20090038016A1 (en) | Detecting And Reacting To Protected Content Material In A Display Or Video Drive Unit | |
US20090092019A1 (en) | Information processing apparatus, disc, and information processing method, and computer program used therewith | |
JP2002268948A (en) | Digital information system and method for verifying contents information | |
JP2004530998A (en) | Data protection with irreversible data corruption | |
JPH0778729B2 (en) | Software copy protection system | |
GB2373091A (en) | Copy protection | |
JP2003173297A (en) | Information processing system and method for recording media |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FZDE | Dead |