CA2393543C - Portable authorization device for authorizing use of protected information and associated method - Google Patents
Portable authorization device for authorizing use of protected information and associated method Download PDFInfo
- Publication number
- CA2393543C CA2393543C CA002393543A CA2393543A CA2393543C CA 2393543 C CA2393543 C CA 2393543C CA 002393543 A CA002393543 A CA 002393543A CA 2393543 A CA2393543 A CA 2393543A CA 2393543 C CA2393543 C CA 2393543C
- Authority
- CA
- Canada
- Prior art keywords
- information
- key
- authorization
- authorization device
- portable
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
- H04L9/16—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16950699P | 1999-12-07 | 1999-12-07 | |
US60/169,506 | 1999-12-07 | ||
US09/503,778 US7032240B1 (en) | 1999-12-07 | 2000-02-14 | Portable authorization device for authorizing use of protected information and associated method |
US09/503,778 | 2000-02-14 | ||
PCT/US2000/012906 WO2001042888A1 (en) | 1999-12-07 | 2000-05-10 | Portable authorization device for authorizing use of protected information and associated method |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2393543A1 CA2393543A1 (en) | 2001-06-14 |
CA2393543C true CA2393543C (en) | 2007-04-17 |
Family
ID=26865117
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002393543A Expired - Lifetime CA2393543C (en) | 1999-12-07 | 2000-05-10 | Portable authorization device for authorizing use of protected information and associated method |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP1236074A1 (zh) |
JP (2) | JP2003516578A (zh) |
CN (1) | CN1254723C (zh) |
AU (1) | AU778380B2 (zh) |
CA (1) | CA2393543C (zh) |
IL (2) | IL149804A0 (zh) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005202650A (ja) * | 2004-01-15 | 2005-07-28 | Casio Comput Co Ltd | 認証システム |
US7747872B2 (en) * | 2004-03-25 | 2010-06-29 | Franklin Electronic Publishers, Inc. | Secure portable electronic reference device |
JP2005346702A (ja) * | 2004-05-04 | 2005-12-15 | Heidelberger Druckmas Ag | 識別表示装置を備える診断システム |
KR100834990B1 (ko) | 2005-08-01 | 2008-06-04 | 민정홍 | 이동식저장장치에서 실행되는 보안시스템 |
US7752139B2 (en) | 2005-12-27 | 2010-07-06 | Michael Noel Hu | Method and system for managing software licenses and reducing unauthorized use of software |
JP2007226405A (ja) * | 2006-02-22 | 2007-09-06 | Toshiba Corp | 監視制御システム |
EP2080100A4 (en) * | 2006-10-04 | 2011-03-02 | Trek 2000 Int Ltd | METHOD, DEVICE AND SYSTEM FOR AUTHENTICATING EXTERNAL STORAGE DEVICES |
JP2008140091A (ja) * | 2006-12-01 | 2008-06-19 | Shimadzu Corp | 分析データ管理システム |
JP2008140175A (ja) * | 2006-12-01 | 2008-06-19 | Yazaki Corp | プロテクタ共通化装置、プロテクタ共通化プログラム、プロテクタ共通化方法、ライセンス管理システム、及び、プロテクタ |
JP4729051B2 (ja) * | 2008-01-04 | 2011-07-20 | 東芝テック株式会社 | 情報処理装置 |
JP5130126B2 (ja) * | 2008-06-11 | 2013-01-30 | 京セラドキュメントソリューションズ株式会社 | ライセンス数管理装置、ライセンス数管理方法及びライセンス数管理プログラム |
US9311504B2 (en) | 2014-06-23 | 2016-04-12 | Ivo Welch | Anti-identity-theft method and hardware database device |
CN105249126A (zh) * | 2015-10-26 | 2016-01-20 | 胡本奎 | 一种杨梅复合保健晶的制作方法 |
KR101757149B1 (ko) * | 2016-11-09 | 2017-07-12 | 알서포트 주식회사 | 권한 부여 기동장치를 이용한 스마트기기 응용프로그램의 자동 시험방법 |
CN111190614B (zh) * | 2019-12-26 | 2023-12-19 | 北京威努特技术有限公司 | 一种软件安装的方法及计算机设备 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS58195975A (ja) * | 1982-05-12 | 1983-11-15 | Canon Inc | 電子機器の使用者認識パツク |
US4562306A (en) * | 1983-09-14 | 1985-12-31 | Chou Wayne W | Method and apparatus for protecting computer software utilizing an active coded hardware device |
JP2544101B2 (ja) * | 1985-05-23 | 1996-10-16 | 株式会社 メルコ | コンピユ−タプログラムの盗用防止装置 |
EP0253885A4 (en) * | 1985-12-26 | 1991-03-20 | Gordian Systems | Solid state key for controlling access to computer systems and to computer software and/or for secure communications |
FR2667173B1 (fr) * | 1990-09-21 | 1993-07-16 | Telemecanique | Procede de protection des droits d'utilisation de plusieurs logiciels sur un poste de travail informatique ou d'automatisme industriel et systeme pour sa mise en óoeuvre. |
US5778071A (en) * | 1994-07-12 | 1998-07-07 | Information Resource Engineering, Inc. | Pocket encrypting and authenticating communications device |
JPH1031587A (ja) * | 1996-07-15 | 1998-02-03 | Hitachi Ltd | データ端末装置およびコンピュータプログラム |
US5854891A (en) * | 1996-08-09 | 1998-12-29 | Tritheim Technologies, Inc. | Smart card reader having multiple data enabling storage compartments |
DE19731380C2 (de) * | 1997-07-22 | 1999-08-05 | Wolfgang Neifer | Sicherheits-Matrix für eine Mehrzahl von Sicherheitslogik-Chipkarten |
GB2328148B (en) * | 1997-08-12 | 2001-11-07 | Boucherie Nv G B | A method of endrounding loose fibres |
JPH11203124A (ja) * | 1998-01-20 | 1999-07-30 | Oki Electric Ind Co Ltd | ソフトウェアの駆動方法 |
-
2000
- 2000-05-10 CA CA002393543A patent/CA2393543C/en not_active Expired - Lifetime
- 2000-05-10 CN CNB008168016A patent/CN1254723C/zh not_active Expired - Lifetime
- 2000-05-10 AU AU48394/00A patent/AU778380B2/en not_active Expired
- 2000-05-10 IL IL14980400A patent/IL149804A0/xx active IP Right Grant
- 2000-05-10 EP EP00930601A patent/EP1236074A1/en not_active Ceased
- 2000-05-10 JP JP2001544114A patent/JP2003516578A/ja active Pending
-
2002
- 2002-05-22 IL IL149804A patent/IL149804A/en not_active IP Right Cessation
-
2005
- 2005-01-05 JP JP2005000757A patent/JP4541901B2/ja not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
JP4541901B2 (ja) | 2010-09-08 |
CN1408082A (zh) | 2003-04-02 |
IL149804A0 (en) | 2002-11-10 |
EP1236074A1 (en) | 2002-09-04 |
CA2393543A1 (en) | 2001-06-14 |
JP2005174359A (ja) | 2005-06-30 |
AU4839400A (en) | 2001-06-18 |
CN1254723C (zh) | 2006-05-03 |
AU778380B2 (en) | 2004-12-02 |
JP2003516578A (ja) | 2003-05-13 |
IL149804A (en) | 2007-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7032240B1 (en) | Portable authorization device for authorizing use of protected information and associated method | |
EP1942430B1 (en) | Token Passing Technique for Media Playback Devices | |
EP1423771B1 (en) | Method to protect software against unauthorized use | |
JP4118092B2 (ja) | 記憶装置および情報処理装置 | |
WO2021128244A1 (zh) | 一种注册授权方法及系统 | |
US20030028786A1 (en) | System and method for software anti-piracy licensing and distribution | |
US6684198B1 (en) | Program data distribution via open network | |
US8799654B2 (en) | Methods and apparatus for authenticating data as originating from a storage and processing device and for securing software and data stored on the storage and processing device | |
KR100785715B1 (ko) | 로그인 시스템 및 방법 | |
EP0268141A2 (en) | Remote access terminal security | |
CA2393543C (en) | Portable authorization device for authorizing use of protected information and associated method | |
US20050210236A1 (en) | Digital rights management structure, portable storage device, and contents management method using the portable storage device | |
CN101142599A (zh) | 基于硬件识别的数字权利管理系统 | |
JP2001175468A (ja) | ソフトウエア使用制御方法とその装置 | |
JP2002518727A (ja) | ソフトウェア製品の実行の制御方法 | |
JPH07123086A (ja) | Icカードを利用した著作物通信管理システム | |
US20040255136A1 (en) | Method and device for protecting information against unauthorised use | |
KR100423506B1 (ko) | 아이씨칩내장카드를 이용한 온라인상에서의 소프트웨어불법복제방지방법 | |
WO1999003031A1 (en) | A method and system for protecting intellectual property products distributed in mass market | |
JP2000207197A (ja) | コンピュ―タソフトウェアのプロテクトシステム及び方法 | |
KR20030015192A (ko) | 다른 소프트웨어가 정당한 사용자에 의해서만 사용되도록제한하는 소프트웨어 및 그 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request |