TW396327B - Distribution system with authentication - Google Patents

Distribution system with authentication Download PDF

Info

Publication number
TW396327B
TW396327B TW086119894A TW86119894A TW396327B TW 396327 B TW396327 B TW 396327B TW 086119894 A TW086119894 A TW 086119894A TW 86119894 A TW86119894 A TW 86119894A TW 396327 B TW396327 B TW 396327B
Authority
TW
Taiwan
Prior art keywords
item
services
software
patent application
service
Prior art date
Application number
TW086119894A
Other languages
Chinese (zh)
Inventor
Michael Joseph Mapson
Lyal Sidney Collins
Original Assignee
Commw Bank Of Australia
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Commw Bank Of Australia filed Critical Commw Bank Of Australia
Application granted granted Critical
Publication of TW396327B publication Critical patent/TW396327B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to distribution systems, particularly those in which the delivery of goods/services can be authenticated as to their integrity or condition of delivery. In one particular, but not exclusive use, the present can be used to verify or authenticate the distribution and use of software via a relatively insecure environment. The present invention stems from the realisation that distribution verification and authentication can be provided by 'attachinh', associating and / or incorporating and integrity Check Value (ICV) or some form of identification discernible only by the distributed product to each product or service so distributed.

Description

經濟部中央標準局員工消費合作社印製 A7 _B7__ 五、發明説明(1 ) 發明領域 本發明係有關分布系統,並特別是有關於貨品/服務之運 送可認證其完整性或運送狀況的分布系統。在一項特別但 非唯獨的應用中,本發明可用於驗證或認證軟體經由一相 對地不安全環境之分布和使用》 發明背景 軟體經由非安全保密或不可信賴管道之分布,當使用開 放、公開或不可信賴網路時,乃是一項具風險的因素。 一項隨附的風險源始於爲了要確保遠端操作的軟體係以 未經更改的方式而操作,包括所有內部的功能和內部的資 料値。 這些風險尤其是適用於網際網路商業,但亦包括發源自 遠端或在遠端所處理資訊之收受者需要確保資訊以已知方 式受到保護的所、其他領域。 發明槪要 本發明之一目的在於提供一種系統、方法及/或裝置,其 可核對經由一至少部分地爲非安全保密網路而分布之軟體-的完整性》 爲達此目的,本發明提供一種系統來經由一至少部分地 爲非安全保密的媒介分布物品及/或服務,此系統包括: 機構用來建立一完整性核對値; 與物品及/或服務之分布有關的儲存機以及 比較機構,用來求算是否經分布後的物品及/或服務與分 布前的物品及/或服務具有相同的完整性核對値。 i· ______3 本紙張尺度適用中國il家標準(CNS ) A4規格(210X 297公釐) : --------f .裝— (請先閲讀背面之注項再填寫本頁) '訂 經濟部中央標準局員工消费合作社印裝 A7 ___B7_ 五、發明説明(少) 本發明亦提供一種分布物品及/或服務爲主產品之一個或 多個複本的方法,此方法包括的步驟有: 決定出所述產品之唯獨的辨識値(UI); 決定出完整性核對値; 編密該完整性核對値; 將該完整性核對値儲存在一第一位置; 以可以由該第一位置和該物品二者所決定之方式重新計 ί該完整性核對値; 分布該產品之複本到一遠離開該第一位置的第二位置, 所分布的產品係隨附有經重新計算的完整性核對値;以及 將該所分布產品的完整性核對値與該第一位置所已知的 完整性核對値相比較》 該完整性核對値之編密可以是依據該產品及/或該唯獨的 '辨識値。 再者,本發明係提供一種機制來以具有相對確保的完整 性和操作的方式,分布並使用軟體於非安全保密的環境中。 本發明乃源自於認知到,分布驗證和認證係可藉由將完-整性核對値或僅可由分布者以及被分布產品所辨別的某種 形式辨識“附加"、關聯及/或納入到如此分布的每一產品 或服務而提供。 本發明的一種形態係使得軟體程式可經由任何管道而被 分布到遠端位置,包括不可信賴的傅输戒路,而可相對確 保所接收到的軟體未曾被以任何方式更動或改變。 本發明描述了一種方法和裝置來經由非安全保密的分布 ___4_ 本紙張尺度ΐϊ用中國國家標準( CNSrA4規格(210X297公釐) -------i.·^------;ΐτ------^L (請先閲讀背面之注意事項再填寫本頁) 經濟部中央楳準局員工消费合作社印製 A7 B7 —..... .丨.- ............... ....... ......... ~· ' ~ 五、發明説明(分) 機制分布軟體程式,其具有可確保這些軟體程式之完整性 的能力,不論是在此程式的第一設置位置或是在所有後續 使用上》 程式可以公用、公開或私人網路中的電子機構來分布, 或是藉由涵納於儲存媒介上來分布。 本發明揭示了一種方法和裝置來驗證程式已經以未經更 動的狀態,或是呈程式創作者所欲的方式,被安裝到中央 (可信靠的)伺服器。 本發明亦給出一種方法和裝置來使得所述程式可經由非 可信靠的網路,在啓動時以及在任何後續的時間裏,向一 中央(可信靠的)伺服器證明完整性。 結果是,位在遠端的程式(可能是操作於非可信靠的環 境中)可相對確保其在以被認,可或所欲求的方式操作,此 認可方式包括確保程式或是程式的使用者係與其所想要的 網路個體(伺服器)通訊,同時網路個體(伺服器)可相 對確保遠端程式係以已知的方式操作。 程式之每一分布複本係可被個別地或唯獨地加以辨認》 程式個別複本之使用可被加以監控。 個別程式的使用時間、日期和頻率可監控其是否有異常 情況或不希望的使用態樣。 程式可拒絕執行進一步的操作,除非完整性已經過中央 (可信靠的)伺服器的驗證。 ( 操作到或透過一中央服務伺服器之程式的個別複本,可 藉由在中央(可信靠的)伺服器處將一有效性指示器設爲 本紙張尺度適用中國國家標準(CNS ) Α4規格(210X297公釐) --------^ ,裝----^---:訂------ (請先閱讀背面之注意事項再填寫本頁) 經濟部中央標準局員工消费合作社印製 A7 _B7____ 五、發明説明(士) “僞”値,而在遠端予以禁制。 現將參照附圖描述本發明之一較佳實施例,其中: 圖1示出分布和起始有效性的一種形式; 圖2示出後續有效性的一種形式; 圖3示出有效性請求的一種形式; 圖4示出有效性認可的一種形式;以及 圖5示出一種用來賓現本發明之有性的裝置。 雖然接下來的說明爲有關於軟體,但必須理解的是,本 發明亦可應用於其他的物品/服務,諸如(而非侷限於)著 作權物、使用於例如經由開放或非安全保密網路之金融服 務的安全功能、以及服務之處理需要驗證和監控之情況下 的註策冊服務》 在此實施例中,假設軟體程式係從一中央位置而分布, 並含有一唯獨的辨識(不一定是要順序的號碼).(UI)値》 此唯獨的辨識値可予嵌含在檔案或程式中,使該檔案或程 式有二進位制唯獨的順序。 藉由使用密碼上散列算法技術,軟體的每一複本因而有-一在密碼學上唯獨的散列値(完整性核對値或ICV)。 一含有該等唯獨辨識値和相應散列値的資料庫亦可予保 存在一中央處所。 當軟體的特定複本係被致動時,散列値係以一爲軟體和 中央處所二者所知的特定方式被重新計算(。 所接收到散列計算/重新計算的結果係被電傳到該中央 處所,並相對資料庫中的ICV項確認其有效性。若有效性 _____ 6 本紙張尺度適用中國國家標準(CNS ) A4規格(2丨OX297公J§T) (請先閱讀背面之注意事項再填寫本頁) 装· I. ^ A7 _B7___ 五、發明説明(<) 驗證爲成功的話,程式便可以所想要的方式繼續操作。 一旦出現正的線上有效性驗證結果,依應用需求而定, 亦可擴展程序來嵌含一新的或衍生的唯獨辨識子(Unique Identifier, UI)»此可能在起始分布驗證時發生,或是在每 一次“登入”到一中央或有效性驗證伺服器(validation server, VS)時藉由更新程式而發生。後續的驗證將因而產 生一“推移的”ICV,使得萬一出現以非推移並因而爲不正 確的ICV登入時,一程式的未經授權複本可被辨識出》 例如,若是軟體於其分布時或分布之後或是在後續安裝 時已被毀壞或擅改的話,則軟體將產生出一結果,在所選 取散列演繹法的限制內,此結果係一不同於爲中央處所所 已知或預期的ICV,並因而有效性驗證將不通過。在此情 況下,該軟體之使用將終止或是複本被一適當的機制或指 '令所刪除或被令爲無法使用》 ‘· 通常,有效性驗證將發生在軟體之起始安裝期間,及/或 在軟體的後續使用期間。此乃確保軟體從起始安裝和最好 是直到程式的每一次使用都有一連串的授權驗證》 - 經濟部中央標準局貝工消费合作社印製 (請先閲讀背面之注意事項再填寫本頁) 典型地,所計算出散列値的結果將被涵括在每一項交易、 訊息或是由遠端軟體程式所產生的通訊期間。其可被利用 來提供軟體使用之稽核登入,補強使用者活動之稽核登入, 其係被唯獨地鏈結到軟體程式之特定複本和每一項最終所 獲致的交易二者。 ( 本發明之操作係涉及到一個或兩個明確不同的階段。 這些階段係軟體程式之具完整性地起始分布,和程式完 經濟部中央標率局員工消費合作社印掣 A7 B7五、發明説明(t ) 整性在使用中的有效性驗證。 下載完整性機制 在此描述於下載/安裝階段期間確保軟髋完整性的四種例 示性技術。 D1以帶有一由分布者所嵌含的唯獨辨識子値之方式來分 布軟體β D2將軟體以一“正版”之完全相同複本來分布,並由另 一管道來分布唯獨辨識子値,此唯獨辨識子値將在安裝的 時候由隨軟體分布之可信靠工具來嵌含。 D3如同上列D1情況,加上一盤問/回應步驟。 D4如同上列D2情況,加上一盤問/回應步驟。 D5如同上列D3或D4情況,加上一偏移指標供使用於ICV 計算程序》所述偏移可以任何可決定的方式算出,且所算 出的値可爲UI値的函數或是可涵括UI値。 D6如同上列D3或D4情況,惟含入一方向指標以指出 程式資料通過ICV計算程序的方向,例如從起始槽到植案 結束,或是從檔案結束到檔案的開始。 D7如同上列D6情況,惟含入一偏移指標供使用於ICV 計算程序。所述偏移可以任何可決定的方式算出,且其値 可爲UI値的函數或是可涵括UI値。 在此,盤問/回應的例子可爲一項程序,藉此,程序有效 性驗證伺服器(VS)(或是某使得資料對(VS爲已知的VS 代理)發出某(例如可爲與日期/時間有關的、隨機的和記 錄的)資料予軟體要求作有效性驗證。所述資料後可被涵 (請先閱讀背面之注意事項再填寫本頁) -裝 訂Printed by the Employees' Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs A7 _B7__ V. Description of the Invention (1) Field of the Invention The present invention relates to distribution systems, and in particular to distribution systems that can verify the integrity or transportation status of goods / services. In a special but not exclusive application, the present invention can be used to verify or certify the distribution and use of software through a relatively unsafe environment. BACKGROUND OF THE INVENTION Software is distributed through non-secure or untrusted channels. When the Internet is public or untrustworthy, it is a risky factor. An accompanying source of risk begins with the intention to ensure that the soft system for remote operations operates in an unaltered manner, including all internal functions and internal data. These risks apply in particular to Internet commerce, but also include other areas where recipients of information originating at or remotely processed need to ensure that information is protected in a known manner. SUMMARY OF THE INVENTION It is an object of the present invention to provide a system, method and / or device that can check the integrity of software distributed via an at least partially non-secure and secure network. To achieve this, the present invention provides A system for distributing goods and / or services via an at least partially non-secure medium, the system comprising: an organization used to establish an integrity check; a storage machine related to the distribution of goods and / or services; and a comparison organization , Used to determine whether the distributed goods and / or services have the same integrity check as the distributed goods and / or services. i · ______3 This paper size is applicable to China Il Standard (CNS) A4 specification (210X 297mm): -------- f. Loading— (Please read the note on the back before filling this page) 'Order Printed by the Consumer Standards Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs A7 _B7_ V. Description of the Invention (Less) The present invention also provides a method for distributing one or more copies of goods and / or services as main products. The method includes the following steps: decision To produce the unique identification card (UI) of the product; to determine the integrity check card; to compile the integrity check card; to store the integrity check card in a first place; The integrity check is recalculated in a manner determined by both of the items; distributing the copy of the product to a second location far away from the first location, the distributed product is accompanied by a recalculated integrity check以及; and comparing the integrity check of the distributed product with the integrity check known at the first location. The compilation of the integrity check may be based on the product and / or the unique ' Identify 値. Furthermore, the present invention provides a mechanism to distribute and use software in a non-secure environment in a manner that has relatively ensured integrity and operation. The present invention is derived from the recognition that distribution verification and certification can be identified by adding or quoting, associating, and / or incorporating some form of discernment of integrity-integrity or only by the distributor and the product being distributed. To each product or service so distributed. One form of the present invention allows software programs to be distributed to remote locations via any channel, including unreliable Fu input loops, which relatively ensures the received The software has not been altered or changed in any way. The present invention describes a method and device to distribute non-secure and confidential ___4_ This paper size uses the Chinese national standard (CNSrA4 specification (210X297 mm) ------- i. · ^ ------; ΐτ ------ ^ L (Please read the notes on the back before filling out this page) Printed by A7 B7 —... ... 丨 .- ............... ................... ~~ '~ V. Description of the invention (points) Mechanism distribution Software programs that have the ability to ensure the integrity of these software programs, whether in the first setting of the program or in all subsequent programs The program can be distributed by electronic institutions in public, public or private networks, or distributed by being contained on a storage medium. The present invention discloses a method and device for verifying that the program has been in an unmodified state, Or it can be installed by the creator of the program to a central (trusted) server. The invention also provides a method and device to enable the program to be launched via an untrusted network Prove integrity to a central (trusted) server at any time and at any subsequent time. As a result, a remotely located program (perhaps operating in an untrusted environment) can relatively ensure its Operate in a recognized, available, or desired manner. This means of approval includes ensuring that the program or the user of the program communicates with the network entity (server) it wants, and that the network entity (server) can be compared Ensure that remote programs operate in a known manner. Each distributed copy of the program can be identified individually or exclusively. The use of individual copies of the program can be monitored. Individual programs The use time, date and frequency can be monitored for abnormal conditions or unwanted usage patterns. The program can refuse to perform further operations unless the integrity has been verified by a central (trusted) server. (Operation Individual copies of the program to or through a central service server can be made by setting a validity indicator at the central (trustworthy) server to the paper size applicable to the Chinese National Standard (CNS) Α4 specification (210X297 (Mm) -------- ^, installed ---- ^ ---: order ---- (Please read the notes on the back before filling out this page) Staff Consumption of the Central Bureau of Standards, Ministry of Economic Affairs The cooperative prints A7 _B7____ 5. The description of the invention (taxi) is “pseudo”, and it is banned at the far end. A preferred embodiment of the present invention will now be described with reference to the accompanying drawings, in which: FIG. 1 shows a form of distribution and initial validity; FIG. 2 shows a form of subsequent validity; FIG. 3 shows the validity request A form; FIG. 4 shows a form of validity recognition; and FIG. 5 shows a device for embodying the nature of the present invention. Although the following description is about software, it must be understood that the present invention can also be applied to other goods / services, such as (but not limited to) copyrighted materials, used for example via an open or non-secure network. Security functions of financial services, and policy book services in cases where service processing requires verification and monitoring "In this embodiment, it is assumed that the software program is distributed from a central location and contains a unique identification (not necessarily (The number to be sequenced). (UI) 値 ”This unique identification can be embedded in a file or program so that the file or program has a binary unique order. By using cryptographic hashing algorithm technology, each copy of the software thus has-a cryptographically unique hash (integrity check or ICV). A database containing such unique identifications and corresponding hashes may also be kept in a central premises. When a particular copy of the software is activated, the hash is recalculated in a specific way known to both the software and the central location. (The result of the received hash calculation / recalculation is telexed to The validity of this central location is confirmed by the ICV item in the database. If the validity is _____ 6 This paper size applies the Chinese National Standard (CNS) A4 specification (2 丨 OX297 male J§T) (Please read the back Note: Please fill in this page again.) I. ^ A7 _B7___ V. Invention Description (<) If the verification is successful, the program can continue to operate the way you want. Once a positive online validity verification result appears, according to the application Depending on your needs, you can also extend the program to embed a new or derived Unique Identifier (UI) »This may occur during initial distribution verification, or every time you" log in "to a central or Validation server (VS) occurs by updating the program. Subsequent verification will then result in a "progressive" ICV, in the event of a non-progressive and therefore incorrect ICV login, a Cheng Unauthorized copy of "can be identified" For example, if the software has been damaged or tampered with during or after its distribution, or during subsequent installation, the software will produce a result in the selected hash deduction method Within the limits, this result is different from the ICV known or expected for the central premises, and therefore the validity verification will not pass. In this case, the use of the software will be terminated or the copy will be terminated by an appropriate mechanism or Means' deleted or made unusable '' Generally, validity verification will occur during the initial installation of the software and / or during subsequent use of the software. This is to ensure that the software Is there a series of authorization verifications until each use of the program? "-Printed by the Shellfish Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs (please read the precautions on the back before filling this page). Typically, the calculated hash result is Will be included in every transaction, message, or communication period generated by a remote software program. It can be used to provide audit logins for software use and to enhance user activity. Audit logins are linked exclusively to both a specific copy of the software program and each transaction that is ultimately obtained. (The operation of the present invention involves one or two distinctly different stages. These stages are software The initial distribution of the program is complete, and the program is completed by the Central Consumer Bureau of the Ministry of Economic Affairs, the Consumer Cooperatives of the Central Government. A7 B7 V. Invention Description (t) Verification of the integrity of the integrity in use. The download integrity mechanism is described here. Four exemplary techniques to ensure the integrity of the soft hip during the download / installation phase. D1 distributes the software in a manner with a unique identifier embedded by the distributor β D2 distributes the software as a "genuine" The same copy is originally distributed, and is distributed by another channel. The unique identifiers will be embedded by the trusted distribution tools distributed with the software at the time of installation. D3 is the same as D1 listed above, plus a question / response step. D4 is the same as D2 listed above, plus a question / response step. D5 is the same as D3 or D4 listed above, plus an offset indicator for use in the ICV calculation program. The offset can be calculated in any determinable way, and the calculated 値 can be a function of UI 値 or can include UI 値. D6 is the same as D3 or D4 listed above, but includes a direction indicator to indicate the direction of the program data through the ICV calculation process, such as from the start slot to the end of the planting case, or from the end of the file to the beginning of the file. D7 is the same as D6 listed above, except that an offset indicator is included for use in the ICV calculation program. The offset can be calculated in any determinable manner, and its 値 can be a function of UI 値 or can include UI 値. Here, an example of a challenge / response can be a procedure whereby the program validity verification server (VS) (or something that makes a data pair (VS is a known VS proxy) issue something (for example, with a date / Time related, random, and recorded) data to the software for validity verification. The data can be contained after (please read the precautions on the back before filling this page)-binding

A 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 經濟部中央標準局員工消费合作社印製 A7 _____B7_ 五、發明説明(7 ) 栝於ICV (完整性核對値)計算和(VAL_REQ)訊息中, 供送到有效性驗證伺服器。此有效性驗證伺服器係可計算 經修改的要求ICV以及是否此經修改的要求1CV在有效的 時間幅內返回等。若是VS盤問經回應爲正確地落於所設定 的參數內的話,則可發出一 VAL_OK訊息β 一些操作完整性機制 例示性技術可爲(但非侷限於): VI ICV或有效性驗證値爲可執行檔之簡單散列算法》 V2 ICV爲可執行楢藉由使用檔案中一預先算出的偏移點 作爲是輸入到散列計算程序的開始之散列算法並續行直‘到 整個程式已被使用於計算ICV散列値的結果。此偏移指標 可爲基於唯獨的辨識値、一由程式設計者所選取的固定指 標、或是以某種其他方式所決定者。 V3 如同對於VI,加上一設始値。此設始値係在ICV計 算程序中被含於程式楢案。此設始値係源始自有效性驗證 伺服器或程式本身並通訊於兩個地點之間,以容許在兩地 點處使用於複本計算。 V4 如同對於上列V2,加上一源始自有效性驗證伺服器 或程式本身的設始値》此設始値係於散列計算程序中被含 於檔案》此設始値係源始自有效性驗證伺服器或程式本身 並通訊於兩個地點之間,以容許在兩地點處使用於複本計 算。 V5 V2和V4之組合。偏移指標係以涵括設始値的方式被 算出。設始値係被含於ICV計算程序中。此設始値係源始 本紙張尺度適用中國國家標準(CNS ) Α4規格(210 X 297公釐) ----f I 裝-- (請先閲讀背面之注意事項再填寫本頁)A This paper size applies to Chinese National Standards (CNS) A4 specifications (210X297 mm) Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs A7 _____B7_ V. Description of the invention (7) 栝 Calculated by ICV (Integrity Check) and (VAL_REQ) ) Message to the validity verification server. The validity verification server can calculate the modified request ICV and whether the modified request 1CV is returned within the valid time frame, etc. If the VS interrogation responds correctly that it falls within the set parameters, a VAL_OK message can be sent. Β Some operational integrity mechanisms. Exemplary techniques can be (but not limited to): VI ICV or validity verification is not possible. Simple Hash Algorithm for Executing Files "V2 ICV is executable. By using a pre-calculated offset point in the file as the hash algorithm that is input to the beginning of the hash calculation process and continuing until the entire program has been Used to calculate the ICV hash result. This offset indicator may be based on unique identification, a fixed indicator selected by a programmer, or determined in some other way. V3 is the same as for VI, plus a setting. This setting was originally included in the ICV calculation program. This setup originates from the validity verification server or program itself and communicates between the two locations to allow the use of duplicate calculations at both locations. V4 is the same as the above V2, plus a source from the validity verification server or the program itself. "This setting is included in the file in the hash calculation process." This setting is from the source. The validity verification server or program itself and communicates between the two locations to allow the use of duplicate calculations at both locations. V5 V2 and V4 combination. The offset index is calculated by including the starting point. It is assumed that the initial system is included in the ICV calculation program. This setting is from the beginning. The paper size is applicable to China National Standard (CNS) Α4 size (210 X 297 mm) ---- f I installed-(Please read the precautions on the back before filling this page)

"T" T

A A7 _B7 五、發明説明(3 ) 自有效性驗證伺服器或程式本身並通訊於兩個地點之間, 以容許在兩地點處使用於複本計算。 V6 如同對於V2,加上一方向指標。ICV係依據程式檔 案、一傭移指標以及一方向旗標。ICV係從程式楢案所被 處理的方向(例如朝向楢案結束(End Of File )或朝向楢 案開始(Start Of File))之散列結果。 V7 如同對於V6,含入一設始値。此設始値係源始自有 效性驗證伺服器或程式本身並通訊於兩個地點之間,以容 許在兩地點處使用於複本計算。 散列處理係爲此項技藝中人士所熟知者。所選取的散列 處理必須爲強韌穩當並適合目的。可採用散列處理的例子 有例如NIST:-安全保密散列標準(Secure Hash Standard), 或是MD系列演繹法。 _分布和起始有效性驗證程序的簡圖 本說明參照圆1並假設分布伺服器(Distribution Server)執行分布和有效性驗證兩項功能。情況並不一定 是要如此,因爲此兩功能可分開執行或由分開的系統所執-行。 經濟部中央標準局員工消費合作社印製 (請先閱讀背面之注意事項再填寫本頁) 所述分布伺服器擁有一非對稱編密(Asymmetric Encryption )演繹法的公用和私人關鍵碼(Public and Private Key)組成。除了非對稱編密演繹法外,亦可使用對稱編密 演繹法和處理,不論是倂用或是作爲其替 程式的正本(Master Copy)係隨唯獨辨識子(UI)和分 布伺服器的公用關鍵碼(PKDS)而分布。所述UI可以在 10 本紙張尺度適用中國國家標CNS ) A4規格(210X 297公釐1 經濟部中央標準局員工消费合作社印製 A7 B7五、發明説明(7 ) 分布的時候被嵌含或在稍後由一可信靠的程序來嵌含。 該分布伺服器從所分布正本的複本算出完整性核對値 (Integrity Check Value)並將UI和ICV二者儲存入有效 性驗證資料庫(Validation Database)» 當遠端地點接收到程式時,安裝程序便發生,其以所接 收到的程式被受到如同在分布伺服器所使用爲相同的計算 程序作爲結束,以獲得一重新計算的ICV。 經重新算得的ICV和UI係被送到分布伺服器,由PKDS 編密在一有效性驗證要求(VAL_REQ,Validation Request) 訊息中,參見圖3。 在分布伺服器處接收到時,一私人關鍵碼係被用來回復 ICV和UI » UI和所接收到的ICV組成然後係與在分布的時 候所算出的値相比較。有需要的話,ICV値係以編密形式 被傳送。編密程序係使用公用關鍵碼法,以保護UI和ICV 値防止偷竊者。在所有的情況下,不需要傳送公用關鍵碼, 因爲此在一封閉型網路中是已知的或是由其他的機制來分 布。然而,VAL_OK訊息可伴隨以一公用關鍵碼證明》最-適當的實施方式應由應用需求或是某些關聯的標準所決 定。 若是所儲存並重新計算的値相符的話,對於此程式之特 定複本的資料庫項目係被更新,以反應出成功的有效性驗 證。否則的話,該資料庫項目便被標示爲無效。藉由一有 效性驗證成功不可(VAL_OK)訊息,該程式亦被告知,參 見圖4。 (請先閱讀背面之注意事項再填寫本頁) -裝· 訂 4 本紙張尺度適用中國國家標準(CNS ) A4規格(210 X 29*7公釐) 經濟部中央標準局員工消費合作社印製 A7 B7__ 五、發明説明(νσ) 後續有效性驗證程序的簡圖 參見圖2,當遠端地點回應於某使用動作或自動反應而 致動程式時,程式可使用有效性驗證伺服器處所使用相同 的計算程序,以獲致一重新計算的ICV。 在分布的時候,經重新計算的ICV係在一 VAL_REQ訊 息中被送到有效性驗證伺服器,在此處其被與所計算和經 驗證爲有效的値相比較。再度地,UI和ICV値被以公用關 鍵碼法編密,以避免其他人士得出兩値的關聯性並造出蒙 騙爲有效軟體之軟體。 若是所儲存和重新計算的値相符的話,程式便藉由使用 一數位簽名的VAL_OK (等於是“真實性之票”)訊息而被 告知此項事實,所述VAL_OK訊息容許程式可依據程式作 者所含入的能力來繼續處理資訊。數位簽名的“真實性之 票”事實上可由任何擁有有效性驗證伺服器的公用關鍵碼 (PKVS)之實體(entity)來驗證爲有效。“真實性之票” 的數位簽名係藉由在伺服器處利用有效性驗證伺服器之受 保護並機密的關鍵碼(SKVS)而達成。此項利用非對稱密-碼學的技術係此項技藝中人士所熟知者。 該等有效性驗證和分布伺服器係顯示爲不同的系統,但 是在實務上,其可能爲相同系統的不同功能罷了》若是該 等有效性驗證和分布伺服器爲不同系統的話,則所有分布 的程式必須含有適當的公用關鍵碼(PK;s),以獲致軟體 有效性驗證所需要的必要安全保密通訊路徑》 程式一旦經驗證有效,便可以與時間相關聯的認證來和 本紙張尺度適用中國國家標準(CNS ) A4規格(210X 297公釐) (請先閱讀背面之注意事項再填寫本頁) -裝· 訂 經濟部中央標準局員工消费合作社印製 A7 B7 五、發明説明(丨1 ) 電子網路中的其他系統通訊,設若數位簽名的val_ok訊 息係隨同連線到遠端網路裝置的要求一起傳送的話。 參見圖3和4,程式序列辨識子(PSI, Program Sequence Identifier)係協助避免重演的有效性驗證要求訊息》 日期/時間印記(DT)使得任何收受者可決定程式上一 次作有效性驗證是何時。含有VAL_OK組成之訊息或交易 的收受者可就產生該訊息之軟體的有效性作一決定,並因 而可就該訊息內所指定交易性資料的可靠度作一決定》此 一訊息的收受者亦可參考VAL_OK上的數位簽名或是參考 有效性驗證伺服器,來核對VAL_OK組成的認證》 參見圖3和4,一設始向量係一共通於註冊軟體或裝置 和註冊實體(有效性驗證伺服器)二者的値。此値係用於 計算ICV的程序,並因而最好是僅出現一次。如此乃可確 '保每一有效性驗證在內容方面爲唯獨並且無法被重演。一 設始向童値可能是導源自例如裝置或軟體的序號、交易計 數器或日期/時間印記》總合結果即爲一値,其被用來導出 認證的一次代符供ICV計算之用。 參見圖5,其示出具現本發明的機構》在圖式中,參考 檩號代表如下: 1軟體模組:經由本發明筻而被確保的物品/服務或程式。 2 ICV計算程序:使用散列函數(Hash Function)和其他 額外的處理步驟,算出ICV値的程序,真可包括使用設始 値或其他代符、偏移指標和方向旗標。 3方向旗標或指示器:其可被利用來在計算ICV中指示出 本紙張尺度適用中國國家標準(CNS ) A4規格(2丨0X29*7公釐) (請先閲讀背面之注意事項再填寫本頁) 裝 訂 A7 _B7__ 五、發明説明(β ) 處理軟體模組的方向。此方向旗標·,或指示器,將指示出 處理爲從檔案的開始到楢案的結束,或者是從檔案的結束 朝向楢案的開始。典型地,此將由UI値和額'外地由諸如IV 的其他値所決定。 4設始値:可被利用於計算ICV之依實況或程式而爲特定 的値。 5偏移指標:當軟體模組被用於ICV計算時可被利用來指 示出處理軟體模組之偏移開始點的値。典型地,此將由UI 値和額外地由諸如IV的其他値所決定。 --------{装-------,訂------Ci (請先閲讀背面之注意事項再填寫本頁) 經濟部中央標準局員工消費合作社印袈 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐)A A7 _B7 V. Description of the invention (3) The self-validation verification server or program itself communicates between the two locations to allow the use of duplicate calculations at the two locations. V6 is the same as for V2, plus a direction indicator. ICV is based on a program file, a commission indicator, and a direction flag. ICV is a hash result from the direction in which the program file is processed (for example, towards the end of file or toward the start of file). V7 is the same as for V6, which includes a setting. This setup originates from the validation server or program itself and communicates between the two locations to allow the use of duplicate calculations at both locations. Hashing is well known to those skilled in the art. The hashing chosen must be robust, robust, and fit for purpose. Examples of hash processing that can be used are, for example, NIST: -Secure Hash Standard, or MD series deduction. _Simplified diagram of distribution and initial validity verification procedures This description refers to circle 1 and assumes that the distribution server (Distribution Server) performs two functions of distribution and validity verification. This is not necessarily the case, as the two functions can be performed separately or performed by separate systems. Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs (please read the notes on the back before filling this page) The distribution server has a public and private key (Asymmetric Encryption) deduction method (Public and Private Key). In addition to asymmetric coded deduction, symmetric coded deduction and processing can also be used, whether it is used or as an alternative to the master program (Master Copy) is based on the unique identifier (UI) and the distribution server Public Key (PKDS). The UI can be embedded in 10 paper sizes that are applicable to the Chinese national standard CNS) A4 specification (210X 297 mm 1) printed by the Consumers' Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs A7 B7 V. Description of the invention (7) Later embedded by a trusted program. The distribution server calculates the Integrity Check Value from the copy of the distributed original and stores both the UI and ICV into the Validation Database ) »When a program is received at a remote location, the installation process occurs, which ends with the received program being subjected to the same calculation procedure as used in the distribution server to obtain a recalculated ICV. The calculated ICV and UI are sent to the distribution server, which is encrypted by a PKDS in a VAL_REQ (Validation Request) message, see Figure 3. When received at the distribution server, a private key system It is used to reply ICV and UI »The UI and the received ICV composition are then compared with the calculated 値 at the time of distribution. If necessary, the ICV 値 is transmitted in a compiled form. The encryption program uses the public key method to protect the UI and ICV 値 from theft. In all cases, it is not necessary to transmit the public key because it is known or closed in a closed network. Other mechanisms are used to distribute. However, the VAL_OK message can be accompanied by a common key certificate. The most appropriate implementation should be determined by application requirements or some associated standards. If the stored and recalculated 値 matches, The database entry for a specific copy of this program is updated to reflect a successful validation. Otherwise, the database entry is marked as invalid. With a VAL_OK message, the validation The program has also been informed, see Figure 4. (Please read the precautions on the back before filling in this page)-Binding · Binding 4 This paper size applies to China National Standard (CNS) A4 (210 X 29 * 7 mm) Ministry of Economic Affairs Printed by the Central Bureau of Standards Consumer Cooperative A7 B7__ 5. Description of the Invention (νσ) For a simplified diagram of the subsequent validity verification procedure, see Figure 2. When the remote location responds to a use action or When the program is activated by dynamic response, the program can use the same calculation procedure used by the validity verification server to obtain a recalculated ICV. At the time of distribution, the recalculated ICV is sent to a VAL_REQ message Validation verification server, where it is compared with the calculated and verified valid 値. Again, UI and ICV 値 are encrypted with a common key method to prevent others from associating the two 値And create software deceived as valid software. If the stored and recalculated 符 matches, the program is informed of this fact by using a digitally signed VAL_OK (equivalent to "vote of authenticity") message, The VAL_OK message allows the program to continue processing information based on the capabilities contained by the program author. A digitally signed "vote of authenticity" can be verified as valid by any entity that has a public key (PKVS) of a validity verification server. The digital signature of the "voice of authenticity" is achieved by using the server's protected and confidential key (SKVS) to verify the validity of the server. This technique using asymmetric cryptography is well known in the art. The validity verification and distribution servers are shown as different systems, but in practice, they may be different functions of the same system. If the validity verification and distribution servers are different systems, all distributed The program must contain the appropriate public key code (PK; s) to obtain the necessary secure and confidential communication path required for software validity verification. "Once the program is verified to be valid, it can be time-dependent certified to fit this paper standard to China. National Standard (CNS) A4 Specification (210X 297 mm) (Please read the precautions on the back before filling out this page)-Binding and ordering A7 B7 printed by the Staff Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs 5. Description of the invention (丨 1) Other systems in the electronic network communicate if the digitally signed val_ok message is sent along with a request to connect to a remote network device. Referring to Figures 3 and 4, the Program Sequence Identifier (PSI) is a message to help avoid validity verification of replays. The date / time stamp (DT) allows any recipient to decide when the program was last validated. . The recipient of a message or transaction containing VAL_OK can make a decision on the validity of the software that generated the message, and therefore can make a decision on the reliability of the transactional data specified in the message. The recipient of this message also You can refer to the digital signature on VAL_OK or refer to the validity verification server to verify the authentication composed by VAL_OK. See Figures 3 and 4. A start vector is common to the registered software or device and the registered entity (validity verification server ) The encounter between the two. This is not a program for calculating ICV, and therefore it is best to appear only once. This ensures that 'each validation is unique in content and cannot be repeated. The initial result may be derived from, for example, the serial number of the device or software, the transaction counter, or the date / time stamp. The combined result is one, which is used to derive the certified primary token for ICV calculation. Refer to FIG. 5, which shows a mechanism embodying the present invention. In the drawings, reference numerals represent the following: 1 Software module: An article / service or program secured through the present invention. 2 ICV calculation program: A program that calculates ICV 値 using a hash function and other extra processing steps. It can really include the use of a set 始 or other symbols, offset indicators, and direction flags. 3-direction flag or indicator: It can be used to indicate in the calculation of ICV that this paper size is applicable to the Chinese National Standard (CNS) A4 specification (2 丨 0X29 * 7 mm) (Please read the precautions on the back before filling This page) Binding A7 _B7__ V. Direction of the invention (β) processing software module. This direction flag, or indicator, will indicate the process from the beginning of the file to the end of the case, or from the end of the file to the beginning of the case. Typically, this will be determined by the UI frame and the extra field by other frames such as the IV. 4 Setting start: It can be used to calculate ICV according to the actual situation or program. 5 Offset indicator: When the software module is used for ICV calculation, it can be used to indicate the offset starting point of the processing software module. Typically this will be determined by the UI 値 and additionally by other 値 such as an IV. -------- {Install -------, order ------ Ci (Please read the notes on the back before filling this page) Printed copy of the staff consumer cooperative of the Central Standards Bureau of the Ministry of Economic Affairs Paper size applies to China National Standard (CNS) A4 (210X297 mm)

Claims (1)

年Μ ίί曰修正 8890 ABCDYear M ί Revised 8890 ABCD 煩諳委员明示I #'i£--44-\JF 無變更實 X/1·:::-日所提之 給質内容是否准予修正。 經濟部中央標準局員工消费合作社印装 七、申請專利範圍 1 - 一種經由一至少部分地爲非安全保密的媒介、.來分 布物品及/或服務之系統,此系統包括; —機構,其用來建立一與特定之物虱或服務或裝置有 關之完整性核對値(ICV),以計算該分布至該物品及/或 服務之完整性核對値; 一與物品及/或服務之分布有關的儲」每屬·槔,該儲存機 構儲存ϋ分布物品及務甚凰之衷核I値—:其中,該 物品及〆—或服.務暴分鹿方_位置,'以及 —比較機構,其設置於中央位置,藉..虫表考.嚴儲存機 構,用來.求算„是否經分布後的物品及/或服_務與分布前的物 品及/或服務具有相同的完整性核對値。 2·如申請專利範圍第1項所述經由一至少部分地爲 龙安全保_.密.的媒介來分布物品及/或服務之系統,其中物品 及/或服務.係以軟體爲主。 3 ·如申請專利範圍第2項所j!L經„_由一至炎JIL分地里 非、安-全典媒弁來分布物品是域-服務之系統,_盖Φ.該 悴麝篠俗在接近軟體-宏I的時候求算該icν。 4 ·如申請專利範圍第2.項所述經由一至-少"部身地爲 非、安全保密典媒介.來分布物品成/或服務之系統,_甚_中該比 較屦構孤在屈_.近軟體使用的時候或使用冲求算該icv。 5 ·如电請專利範.圍第3項所述經由一至少_部分地爲 非安圣嚴密前媒介來分布物品及/或服務之系統,其中該比 較桟構係在接近軟體使用的時候或使用中又求算該1C V。 .... 、 6、如申請專利範圍第5項中所述經由一至炎部分地 ----------.^— . , (請先閱讀背面之注意事項及· ?本頁) 、π 本紙張尺度適用中國國家梯準(CNS ) Α4規格(210X297公釐) 年Μ ίί曰修正 8890 ABCDMembers of the annoyance committee expressly stated that I # 'i £ --44- \ JF No change, whether X / 1 · :::-Japan mentioned whether to allow amendments to the content. Printed by the Consumer Standards Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs VII. Patent Application Scope 1-A system for distributing goods and / or services via an at least partially non-secure and confidential medium. This system includes; To establish an integrity check (ICV) related to a particular lice or service or device to calculate the integrity check for the distribution to that item and / or service; "Storage" each belongs to "槔", the storage organization stores "distribution items" and "I'm very interested in the service": Among them, the item and the "or service." The service storm points deer square_location, 'and-the comparison organization, its It is set in the central location, and borrows the worm table test. The strict storage mechanism is used to calculate „whether the distributed items and / or services have the same integrity check as the distributed items and / or services 値2. As described in item 1 of the scope of the patent application, a system for distributing goods and / or services via a medium that is at least partially safe and secure, wherein the goods and / or services are mainly software. 3 · As in the second patent application scope j! L via „_Yiyan JIL divides land, Africa, security, and canonical media to distribute goods. It is a domain-service system. _ Cover Φ. This muscus is close to the software-macro I to calculate the icν . 4 · As described in item 2. of the scope of patent application, a system that distributes goods and / or services through one-to-less " partially non-safe and confidential media. _. Calculate the ICV when the software is used or when it is used. 5 · A system for distributing goods and / or services as described in item 3 of the patent via item 3, at least in part, as a non-secure, strict former medium, wherein the comparative structure is close to the use of software or In use, the 1C V is calculated. ...., 6, as described in item 5 of the scope of patent application via Yizhiyan partially ----------. ^-. (Please read the precautions on the back and this page first ), Π This paper size is applicable to China National Standard (CNS) Α4 specification (210X297 mm) Year Μ ί Yue amendment 8890 ABCD 煩諳委员明示I #'i£--44-\JF 無變更實 X/1·:::-日所提之 給質内容是否准予修正。 經濟部中央標準局員工消费合作社印装 七、申請專利範圍 1 - 一種經由一至少部分地爲非安全保密的媒介、.來分 布物品及/或服務之系統,此系統包括; —機構,其用來建立一與特定之物虱或服務或裝置有 關之完整性核對値(ICV),以計算該分布至該物品及/或 服務之完整性核對値; 一與物品及/或服務之分布有關的儲」每屬·槔,該儲存機 構儲存ϋ分布物品及務甚凰之衷核I値—:其中,該 物品及〆—或服.務暴分鹿方_位置,'以及 —比較機構,其設置於中央位置,藉..虫表考.嚴儲存機 構,用來.求算„是否經分布後的物品及/或服_務與分布前的物 品及/或服務具有相同的完整性核對値。 2·如申請專利範圍第1項所述經由一至少部分地爲 龙安全保_.密.的媒介來分布物品及/或服務之系統,其中物品 及/或服務.係以軟體爲主。 3 ·如申請專利範圍第2項所j!L經„_由一至炎JIL分地里 非、安-全典媒弁來分布物品是域-服務之系統,_盖Φ.該 悴麝篠俗在接近軟體-宏I的時候求算該icν。 4 ·如申請專利範圍第2.項所述經由一至-少"部身地爲 非、安全保密典媒介.來分布物品成/或服務之系統,_甚_中該比 較屦構孤在屈_.近軟體使用的時候或使用冲求算該icv。 5 ·如电請專利範.圍第3項所述經由一至少_部分地爲 非安圣嚴密前媒介來分布物品及/或服務之系統,其中該比 較桟構係在接近軟體使用的時候或使用中又求算該1C V。 .... 、 6、如申請專利範圍第5項中所述經由一至炎部分地 ----------.^— . , (請先閱讀背面之注意事項及· ?本頁) 、π 本紙張尺度適用中國國家梯準(CNS ) Α4規格(210X297公釐) 396327 ?I ________ D8六、申請專利範圍 爲非安全保密的媒介來分布物品及/或服務之系統,其中所 述ICV係依據對每一上述物品/服務所決定之—唯獨辨識 値(UI)和程式資料而建立。 7、一種分布軟體產品之一個或多個複本的方法,且 稍後驗證其完整性,此方法包括的步驟有: 在分布之前: (a )決定出所述產品之唯獨_辨屬値(UI); (b )依據產品和唯獨辨識値(UI.)來求算並編密該 ICV : (C )將該完整性核對値儲存在一第一地點; 且當需要驗證,在產品分布至一第二地點之後, (d )於該第二地點重新計算該完整性核對値; (e )將該完整性核對値及產品唯獨辨識値編密,且 將該編密値傳送至實施驗證的地點; C.-L.:L將該所分布產品的莫値H第一地點 所已知的完整性核對値相比較;以及 (g )決定是否重新計算之完1性核對値相對於該儲 ^ ..... ·- + 存之完整性核對値具有正確的値,,且因此驗證該產品爲有 效或無效。 8 *如申請專利範圍第7項所述之方法,其中該軟體 產品想達成處理一項交易,該重:親:計篡,之i氅篮霞塑値由 該第二地點,作爲一交易異名之一部份逸^且、該交 易只有在該產品係驗_證有嚴之下才授權。 9 ·如申請專利範圍第7項所述之方法,其中該產品 本紙浪尺度適用中國國家揉準(CNS ) A4規格(2丨OX297公釐) 39632? r、申請專利乾園 包含可變的資料,該可變的資料係以一遲對第—地點爲已 知之方式改變,且該可變的資料形成用於重新計算該完整 性核對値之資料集合的一部份’使得每一項交易之正確的 重新計算之完整性核對値與先前及後續之完整性核對値不 同。 1〇二一種裝置’其被適观成來執行姐申請專段轉圍 第7 .項所述的方·法。 1 1 . 一種如本案中所揭示的方法、裝置或系統。 <請先閲讀背面之注意事項^舄本頁) .裝. 訂 線 經濟部4-央標準扃負工消費合作社印装 3 本紙張尺度逋用中國國家標準(CNS ) A4規格(210 X 297公釐)Members of the troubles expressly stated that I # 'i £ --44- \ JF No change is true X / 1 · :::-Japan whether the content of the qualitative content is allowed to be amended. Printed by the Consumers' Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs. 7. Scope of Patent Application 1-A system for distributing goods and / or services via an at least partially non-secure and confidential medium. This system includes; To establish an integrity check (ICV) related to a particular lice or service or device to calculate the integrity check for the distribution to that item and / or service; "Storage" each belongs to "槔", the storage organization stores "distribution items" and "I'm very interested in the service": Among them, the item and the "or service." The service storm points deer square_location, 'and-the comparison organization, its It is set in the central location, and borrows the worm table test. The strict storage mechanism is used to calculate „whether the distributed items and / or services have the same integrity check as the distributed items and / or services 値2. As described in item 1 of the scope of the patent application, a system for distributing goods and / or services via a medium that is at least partially safe and secure, wherein the goods and / or services are mainly software. 3 · As in the second patent application scope j! L via „_Yiyan JIL divides land, Africa, security, and canonical media to distribute goods. It is a domain-service system. _ Cover Φ. This muscus is close to the software-macro I to calculate the icν . 4 · As described in item 2. of the scope of patent application, a system that distributes goods and / or services through one-to-less " partially non-safe and confidential media. _. Calculate the ICV when the software is used or when it is used. 5 · A system for distributing goods and / or services as described in item 3 of the patent via item 3, at least in part, as a non-secure, strict former medium, wherein the comparative structure is close to the use of software or In use, the 1C V is calculated. ...., 6, as described in item 5 of the scope of patent application via Yizhiyan partially ----------. ^-. (Please read the precautions on the back and this page first? ), Π This paper size applies to China National Standard (CNS) A4 specification (210X297 mm) 396327? I ________ D8 VI. Patent application system is a non-secure and confidential medium to distribute goods and / or services. The ICV is based on the unique identification card (UI) and program data determined for each of the above items / services. 7. A method of distributing one or more copies of a software product, and later verifying its integrity, the method includes the steps of: before distribution: (a) determine the uniqueness of the product _ identification belongs to ( UI); (b) Calculate and compile the ICV based on the product and the unique identification card (UI.): (C) Store the integrity check card at a first place; and when verification is needed, After arriving at a second location, (d) recalculate the integrity check at the second location; (e) compile the integrity check and product unique identification, and send the compile to implementation Verification location; C.-L .: L compares the integrity checkpoint known to the first location of the MoH of the distributed product; and (g) the completeness checkpoint to decide whether to recalculate or not The deposit ^ .....-+ + The integrity check of the deposit has the correct value and therefore verifies that the product is valid or invalid. 8 * The method as described in item 7 of the scope of patent application, in which the software product wants to reach a transaction, the weight is: pro: counterfeit, and the second place is used as a transaction synonym Part of the transaction is authorized, and the transaction is authorized only if the product is certified. 9 · The method as described in item 7 of the scope of patent application, in which the paper size of the product applies to the Chinese National Standard (CNS) A4 specification (2 丨 OX297 mm) 39632? R. The patent application park contains variable information , The variable data is changed in a way that the late-first-place is known, and the variable data forms part of the data set used to recalculate the integrity check 使得 so that each transaction A correct recalculation of the integrity check is different from previous and subsequent integrity checks. The 102-type device 'is adapted to perform the method and method described in item 7. 1 1. A method, device or system as disclosed in the present case. < Please read the precautions on the back ^ 舄 this page). Binding. 4-line standard of the Ministry of Economics, printed by the Consumer Cooperative, 3 paper sizes, using Chinese National Standard (CNS) A4 (210 X 297) Mm)
TW086119894A 1997-01-23 1997-12-29 Distribution system with authentication TW396327B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AUPO4749A AUPO474997A0 (en) 1997-01-23 1997-01-23 Distribution system with authentication

Publications (1)

Publication Number Publication Date
TW396327B true TW396327B (en) 2000-07-01

Family

ID=3799053

Family Applications (1)

Application Number Title Priority Date Filing Date
TW086119894A TW396327B (en) 1997-01-23 1997-12-29 Distribution system with authentication

Country Status (5)

Country Link
AR (1) AR015351A1 (en)
AU (1) AUPO474997A0 (en)
TW (1) TW396327B (en)
WO (1) WO1998033296A1 (en)
ZA (1) ZA98513B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6594761B1 (en) 1999-06-09 2003-07-15 Cloakware Corporation Tamper resistant software encoding
AU7714701A (en) * 2000-07-25 2002-02-05 Digimarc Corp Authentication watermarks for printed objects and related applications
US7162538B1 (en) * 2000-10-04 2007-01-09 Intel Corporation Peer to peer software distribution system
EP1211587A1 (en) * 2000-11-30 2002-06-05 Pentap Technologies AG Distributing programming language code
JP4281252B2 (en) 2001-01-16 2009-06-17 ソニー株式会社 Information recording apparatus, information reproducing apparatus, information recording method, information reproducing method, information recording medium, and program storage medium
US7451116B2 (en) * 2001-03-07 2008-11-11 Diebold, Incorporated Automated transaction machine digital signature system and method
US8261975B2 (en) 2001-03-07 2012-09-11 Diebold, Incorporated Automated banking machine that operates responsive to data bearing records
US20030167407A1 (en) * 2002-03-01 2003-09-04 Brett Howard Authenticated file loader
US7630989B2 (en) 2002-05-17 2009-12-08 Colonial First State Investments Ltd. Transaction management system
JP4744106B2 (en) * 2003-08-06 2011-08-10 パナソニック株式会社 Secure device, information processing terminal, communication system, and communication method
WO2007020574A2 (en) * 2005-08-12 2007-02-22 Nxp B.V. Software application security method and system
FR2945367B1 (en) * 2009-05-11 2012-06-22 Regie Autonome Transports METHOD FOR CONTROLLING THE ACTIVATION OF AN APPLICATION ON A SECURE PLATFORM BY AN ACTOR EXTERIOR TO THE LOADING CHAIN

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5222134A (en) * 1990-11-07 1993-06-22 Tau Systems Corporation Secure system for activating personal computer software at remote locations
WO1994016508A1 (en) * 1993-01-07 1994-07-21 Infonow Corporation Software evaulation and distribution apparatus, system, and method
US5724425A (en) * 1994-06-10 1998-03-03 Sun Microsystems, Inc. Method and apparatus for enhancing software security and distributing software

Also Published As

Publication number Publication date
ZA98513B (en) 1998-07-29
AR015351A1 (en) 2001-05-02
AUPO474997A0 (en) 1997-02-20
WO1998033296A1 (en) 1998-07-30

Similar Documents

Publication Publication Date Title
US11743054B2 (en) Method and system for creating and checking the validity of device certificates
US7178027B2 (en) System and method for securely copying a cryptographic key
AU2017222421B2 (en) Personal device security using elliptic curve cryptography for secret sharing
US6671804B1 (en) Method and apparatus for supporting authorities in a public key infrastructure
JP6332970B2 (en) System and method for secure software update
US5745574A (en) Security infrastructure for electronic transactions
EP1622301B1 (en) Methods and system for providing a public key fingerprint list in a PK system
CN107463806B (en) Signature and signature verification method for Android application program installation package
KR100912276B1 (en) Electronic Software Distribution Method and System Using a Digital Rights Management Method Based on Hardware Identification
US6189097B1 (en) Digital Certificate
EP1326368B1 (en) Device for revocation and updating of tokens in a public key infrastructure
US6367013B1 (en) System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
US9246889B2 (en) Layered protection and validation of identity data delivered online via multiple intermediate clients
CN104639506B (en) Method, system and the terminal for carrying out management and control are installed to application program
JPH09507729A (en) Cryptographic system and method with key escrow function
KR20070046982A (en) Digital rights management system based on hardware identification
US20040064695A1 (en) System and method for guaranteeing software integrity via combined hardware and software authentication
TW396327B (en) Distribution system with authentication
TWI390937B (en) Method, system, and storage medium for eliminating password exposure when requesting third party attribute certificates
CN116582266B (en) Electronic signature method, electronic signature system, and readable storage medium
US20030221109A1 (en) Method of and apparatus for digital signatures
US20080148401A1 (en) System for Reducing Fraud
US8683195B2 (en) System and method for reducing fraud
JPH1165443A (en) Management element system for individual authentication information
JP2002132145A (en) Authentication method, authentication system, recording medium and information processor