CA2393543C - Portable authorization device for authorizing use of protected information and associated method - Google Patents

Portable authorization device for authorizing use of protected information and associated method Download PDF

Info

Publication number
CA2393543C
CA2393543C CA002393543A CA2393543A CA2393543C CA 2393543 C CA2393543 C CA 2393543C CA 002393543 A CA002393543 A CA 002393543A CA 2393543 A CA2393543 A CA 2393543A CA 2393543 C CA2393543 C CA 2393543C
Authority
CA
Canada
Prior art keywords
information
key
authorization
authorization device
portable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CA002393543A
Other languages
English (en)
French (fr)
Other versions
CA2393543A1 (en
Inventor
Paul Allen Cronce
Joseph M. Fontana
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Pace Anti Piracy Inc
Original Assignee
Pace Anti Piracy Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/503,778 external-priority patent/US7032240B1/en
Application filed by Pace Anti Piracy Inc filed Critical Pace Anti Piracy Inc
Publication of CA2393543A1 publication Critical patent/CA2393543A1/en
Application granted granted Critical
Publication of CA2393543C publication Critical patent/CA2393543C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
CA002393543A 1999-12-07 2000-05-10 Portable authorization device for authorizing use of protected information and associated method Expired - Lifetime CA2393543C (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US16950699P 1999-12-07 1999-12-07
US60/169,506 1999-12-07
US09/503,778 2000-02-14
US09/503,778 US7032240B1 (en) 1999-12-07 2000-02-14 Portable authorization device for authorizing use of protected information and associated method
PCT/US2000/012906 WO2001042888A1 (en) 1999-12-07 2000-05-10 Portable authorization device for authorizing use of protected information and associated method

Publications (2)

Publication Number Publication Date
CA2393543A1 CA2393543A1 (en) 2001-06-14
CA2393543C true CA2393543C (en) 2007-04-17

Family

ID=26865117

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002393543A Expired - Lifetime CA2393543C (en) 1999-12-07 2000-05-10 Portable authorization device for authorizing use of protected information and associated method

Country Status (6)

Country Link
EP (1) EP1236074A1 (ja)
JP (2) JP2003516578A (ja)
CN (1) CN1254723C (ja)
AU (1) AU778380B2 (ja)
CA (1) CA2393543C (ja)
IL (2) IL149804A0 (ja)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005202650A (ja) * 2004-01-15 2005-07-28 Casio Comput Co Ltd 認証システム
US7747872B2 (en) * 2004-03-25 2010-06-29 Franklin Electronic Publishers, Inc. Secure portable electronic reference device
JP2005346702A (ja) * 2004-05-04 2005-12-15 Heidelberger Druckmas Ag 識別表示装置を備える診断システム
KR100834990B1 (ko) 2005-08-01 2008-06-04 민정홍 이동식저장장치에서 실행되는 보안시스템
US7752139B2 (en) 2005-12-27 2010-07-06 Michael Noel Hu Method and system for managing software licenses and reducing unauthorized use of software
JP2007226405A (ja) * 2006-02-22 2007-09-06 Toshiba Corp 監視制御システム
CN101542452B (zh) * 2006-10-04 2016-04-20 特科2000国际有限公司 外部存储设备的认证方法、设备和系统
JP2008140175A (ja) * 2006-12-01 2008-06-19 Yazaki Corp プロテクタ共通化装置、プロテクタ共通化プログラム、プロテクタ共通化方法、ライセンス管理システム、及び、プロテクタ
JP2008140091A (ja) * 2006-12-01 2008-06-19 Shimadzu Corp 分析データ管理システム
JP4729051B2 (ja) * 2008-01-04 2011-07-20 東芝テック株式会社 情報処理装置
JP5130126B2 (ja) * 2008-06-11 2013-01-30 京セラドキュメントソリューションズ株式会社 ライセンス数管理装置、ライセンス数管理方法及びライセンス数管理プログラム
US9311504B2 (en) 2014-06-23 2016-04-12 Ivo Welch Anti-identity-theft method and hardware database device
CN105249126A (zh) * 2015-10-26 2016-01-20 胡本奎 一种杨梅复合保健晶的制作方法
KR101757149B1 (ko) * 2016-11-09 2017-07-12 알서포트 주식회사 권한 부여 기동장치를 이용한 스마트기기 응용프로그램의 자동 시험방법
CN111190614B (zh) * 2019-12-26 2023-12-19 北京威努特技术有限公司 一种软件安装的方法及计算机设备

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS58195975A (ja) * 1982-05-12 1983-11-15 Canon Inc 電子機器の使用者認識パツク
US4562306A (en) * 1983-09-14 1985-12-31 Chou Wayne W Method and apparatus for protecting computer software utilizing an active coded hardware device
JP2544101B2 (ja) * 1985-05-23 1996-10-16 株式会社 メルコ コンピユ−タプログラムの盗用防止装置
WO1987003977A1 (en) * 1985-12-26 1987-07-02 Gordian Systems Solid state key for controlling access to computer systems and to computer software and/or for secure communications
FR2667173B1 (fr) * 1990-09-21 1993-07-16 Telemecanique Procede de protection des droits d'utilisation de plusieurs logiciels sur un poste de travail informatique ou d'automatisme industriel et systeme pour sa mise en óoeuvre.
US5778071A (en) * 1994-07-12 1998-07-07 Information Resource Engineering, Inc. Pocket encrypting and authenticating communications device
JPH1031587A (ja) * 1996-07-15 1998-02-03 Hitachi Ltd データ端末装置およびコンピュータプログラム
US5854891A (en) * 1996-08-09 1998-12-29 Tritheim Technologies, Inc. Smart card reader having multiple data enabling storage compartments
DE19731380C2 (de) * 1997-07-22 1999-08-05 Wolfgang Neifer Sicherheits-Matrix für eine Mehrzahl von Sicherheitslogik-Chipkarten
GB2328148B (en) * 1997-08-12 2001-11-07 Boucherie Nv G B A method of endrounding loose fibres
JPH11203124A (ja) * 1998-01-20 1999-07-30 Oki Electric Ind Co Ltd ソフトウェアの駆動方法

Also Published As

Publication number Publication date
JP2003516578A (ja) 2003-05-13
AU778380B2 (en) 2004-12-02
AU4839400A (en) 2001-06-18
CN1254723C (zh) 2006-05-03
CA2393543A1 (en) 2001-06-14
IL149804A (en) 2007-07-04
CN1408082A (zh) 2003-04-02
JP4541901B2 (ja) 2010-09-08
IL149804A0 (en) 2002-11-10
EP1236074A1 (en) 2002-09-04
JP2005174359A (ja) 2005-06-30

Similar Documents

Publication Publication Date Title
US7032240B1 (en) Portable authorization device for authorizing use of protected information and associated method
EP1942430B1 (en) Token Passing Technique for Media Playback Devices
US4916738A (en) Remote access terminal security
EP1423771B1 (en) Method to protect software against unauthorized use
JP4118092B2 (ja) 記憶装置および情報処理装置
US20030028786A1 (en) System and method for software anti-piracy licensing and distribution
US6684198B1 (en) Program data distribution via open network
US8799654B2 (en) Methods and apparatus for authenticating data as originating from a storage and processing device and for securing software and data stored on the storage and processing device
KR100785715B1 (ko) 로그인 시스템 및 방법
CA2393543C (en) Portable authorization device for authorizing use of protected information and associated method
US20050210236A1 (en) Digital rights management structure, portable storage device, and contents management method using the portable storage device
WO2021128244A1 (zh) 一种注册授权方法及系统
CN101142599A (zh) 基于硬件识别的数字权利管理系统
JP2001175468A (ja) ソフトウエア使用制御方法とその装置
JP2002518727A (ja) ソフトウェア製品の実行の制御方法
JPH07123086A (ja) Icカードを利用した著作物通信管理システム
US20040255136A1 (en) Method and device for protecting information against unauthorised use
KR100423506B1 (ko) 아이씨칩내장카드를 이용한 온라인상에서의 소프트웨어불법복제방지방법
WO1999003031A1 (en) A method and system for protecting intellectual property products distributed in mass market
JP2000207197A (ja) コンピュ―タソフトウェアのプロテクトシステム及び方法
KR20030015192A (ko) 다른 소프트웨어가 정당한 사용자에 의해서만 사용되도록제한하는 소프트웨어 및 그 방법

Legal Events

Date Code Title Description
EEER Examination request