WO1998016033A1 - Systeme de fourniture d'informations electroniques proteges a gestion de donnees separee - Google Patents

Systeme de fourniture d'informations electroniques proteges a gestion de donnees separee Download PDF

Info

Publication number
WO1998016033A1
WO1998016033A1 PCT/US1997/018164 US9718164W WO9816033A1 WO 1998016033 A1 WO1998016033 A1 WO 1998016033A1 US 9718164 W US9718164 W US 9718164W WO 9816033 A1 WO9816033 A1 WO 9816033A1
Authority
WO
WIPO (PCT)
Prior art keywords
software product
decryption key
product
data
storage device
Prior art date
Application number
PCT/US1997/018164
Other languages
English (en)
Inventor
Michael S. Blumenthal
Daniel J. Barthel
Bruce Newman
Brenda S. Newman
Original Assignee
Protocall Technologies, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Protocall Technologies, Inc. filed Critical Protocall Technologies, Inc.
Priority to AU48119/97A priority Critical patent/AU4811997A/en
Publication of WO1998016033A1 publication Critical patent/WO1998016033A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy

Definitions

  • the invention relates generally to a system for retrieving secured data
  • Consignment inventory also bears a large up-front cost for suppliers.
  • the storage device may be located remotely from the retailer's user station over, e.g., a local area network (LAN) or a wide area network (WAN) or
  • LAN local area network
  • WAN wide area network
  • a CD-ROM located at the user station from, e.g., a CD-ROM.
  • decryption keys to unlock the desired secured data from a CD-ROM.
  • a SCSI (small computer system interface) device acting as an external hard drive and connected to the user station, includes the metering chip having the decryption keys.
  • the selected secured data is decrypted with a corresponding decryption key, while the user's order is simultaneously written
  • every user station must be polled on a regular bases, e.g., daily, to capture the data stored
  • the metering chip is not located in an external SCSI device but in
  • any PC or Macintosh based user station would require that the
  • motherboard be manufactured with the metering chip. This has the inherent
  • an application program including the product information corresponding to the encrypted software products and a decryption algorithm capable of taking partial
  • decryption keys supplied transparently from a remote server, to generate corresponding full decryption keys to decrypt the selected software products from the CD-ROM.
  • each storage device is at least partially encrypted and is coupled to a user station.
  • the user station may be used by a retailer, a consumer, and the like.
  • each user station is coupled to at least one storage device, such as a CD-ROM.
  • Each station has a processor responsive to a data
  • the data file system includes at least one database file, each comprising data corresponding to a respective software product.
  • the processor responsive to the Application program, receives the data from the database file that corresponds to a user selected software product, requests a decryption key from a remote network server based at least on the
  • an end-user station is coupled to at least one
  • each station has unique serial number and a processor that is responsive to an Application program stored
  • the user can select a software product to decrypt upon receipt of a
  • a remote vendor station having a unique password, is selectively coupled to the end-user station, via a network, to receive a request for the
  • the vendor station receives the serial number from the end-user station.
  • a remote server is connected to the vendor station, via a network, when the password transmitted from the vendor station is validated.
  • the server receives a request for the decryption key corresponding to the transmitted selected software product and the end-user serial number. The server then
  • the vendor station transmits the decryption key to the end-user station, so that the end-user Application program can decrypt the selected software product based on the received decryption key.
  • each user station (vendor or consumer) is coupled to at least one storage device, such as a CD-ROM, having at least one
  • At least one of the database files stores
  • a metering device is coupled to each user station.
  • each respective user station is able to retrieve
  • FIG 1 is a diagram schematically illustrating a three-tier network having a server connected to a first group of user stations, where a station in the first
  • FIG 2 shows an example of a user station of FIG 1 , in accordance with
  • FIGs 3A-3D is a flow chart showing the steps for decrypting selected
  • FIGs 4A-4D is a flow chart showing the steps for decrypting selected
  • FIGs 5A-5D is a flow chart showing the steps for decrypting selected
  • a retailer or a consumer may access software products from a storage device, such as a CD-ROM, that is coupled to the retailer or consumer user
  • Each software product on, e.g., a CD-ROM, has been secured by an encryption technique so that the retailer or consumer may access any encrypted software product upon receipt of a decryption key.
  • the retailer or consumer user station every time the retailer or consumer wants to decrypt a software product, the retailer or consumer user station must link up with a remote server.
  • the server will first ascertain that the station may
  • decryption keys through, e.g., passwords and external serial
  • the server may generate the
  • desired decryption key based on, e.g., the software product item number, an internal serial number (not known to the retailer or consumer) and a purchase
  • the decryption key generated by the server is
  • a partial key may simply be a
  • the retailer or consumer user station having an Application program, generates the full 56 bit decryption key. If the station is a retailer
  • the retailer typically will decrypt and write a product onto an end-user
  • the retailer or consumer user station has a metering device or "dongle" attached thereto for monitoring and selectively preventing access to decryption keys that are stored, not in a remote server, but in a known path to the Application in each station.
  • the dongle has a metering device or "dongle" attached thereto for monitoring and selectively preventing access to decryption keys that are stored, not in a remote server, but in a known path to the Application in each station.
  • the dongle attached thereto for monitoring and selectively preventing access to decryption keys that are stored, not in a remote server, but in a known path to the Application in each station.
  • the dongle is attached thereto for monitoring and selectively preventing access to decryption keys that are stored, not in a remote server, but in a known path to the Application in each station.
  • the dongle is a metering device or "dongle" attached thereto for monitoring and selectively preventing access to decryption keys that are stored, not in a remote server
  • a network 1 0 is illustrated having a server 1 5 that may
  • Server 1 5 may be a conventional computer having PC DOS
  • Server 1 5 may be
  • a station may also be a station in station group 1 2, and vice-versa, by, for example, a typical modem link or LAN/WAN connection.
  • a station may also be a station in station group 1 2, and vice-versa, by, for example, a typical modem link or LAN/WAN connection.
  • a station may also be a station in station group 1 2, and vice-versa, by, for example, a typical modem link or LAN/WAN connection.
  • a station may also be a station in station group 1 2, and vice-versa, by, for example, a typical modem link or LAN/WAN connection.
  • a station may also be a station in station group 1 2, and vice-versa, by, for example, a typical modem link or LAN/WAN connection.
  • a station may also be a station in station group 1 2, and vice-versa, by, for example, a typical modem link or LAN/WAN connection.
  • a station may also be a station in station group 1 2, and vice-versa, by
  • FIG 1 also shows a second station group 14 that includes stations 24,
  • station 1 7 may be connected to each station in group
  • Every station in first station group 1 2 may be connected to
  • stations in second station group 14 or other station groups may communicate with stations from the second station group, and vice versa, without being physically connected via a modem link or LAN, but by facsimile machines and the like, external to each station.
  • stations 1 6-20 and 24-28 are typical computer systems, preferably PC or Macintosh ® based.
  • FIG 2 illustrates a conventional computer
  • Housing 40 comprises a modem jack 36, a hard drive 34, a floppy disk
  • a station may include additional or less hardware as desired.
  • Connecting housing 40 with keyboard 46 is a
  • metering device or dongle 50 which, as will be described hereinlater, may prevent a station user from decrypting secured data from a storage device, such
  • a printer 48 may also be any external or internal station port (not shown), as well.
  • a printer 48 may also be any external or internal station port (not shown), as well.
  • each station Prior to decrypting any software products, each station preferably has
  • the directory includes separate database or
  • the database/resource files include
  • the database files include trademark information for each manufacturer, and the correct path for each software product, i.e. on which CD-ROM. Since the database files are preferably
  • Macintosh platform requires a specific utility to run the selected software
  • the Application program performs the majority of the functions for the
  • the software products, stored on the CD-ROMs, are preferably encrypted in the following manner. Each unsecured product is first encrypted by a
  • a phantom key is any random key so long as it is not the same as the unique encryption key.
  • Each phantom decrypted product is then written to a
  • FIGs 3A-D is a flow chart showing the steps for decrypting selected
  • the retailer or consumer user station is powered on and the
  • Application is launched, it checks that all of the necessary files from the directory are present. If not, an error message is flashed on the monitor and,
  • the Application will read the available database files and include the contents of these files in dynamically built menus.
  • An example of a dynamically built menu would be a list of manufacturer and corresponding product menus.
  • the station is idle while it waits for a user input.
  • the station is idle while it waits for a user input.
  • the Application searches in the
  • Step 74 indicates that the selected items were found. If not,
  • step 76 will alert the user and return to step 70.
  • Order Detail screen that includes other selected items, if any, at step 78.
  • the user can select some or all of the selected items for
  • Step 80 inquires if the user wants to select more
  • a registration data entry screen that includes a space to enter
  • step 86 the Application ensures that all fields in the registration data entry are populated. If not, the user optionally is returned to step 84.
  • the Application will request the station user's name and a pre-assigned password which will be subsequently transmitted to the server at step 90.
  • the Application will preferably automatically dial a predetermined phone number to connect to the remote server. To avoid anticipated traffic of several stations trying to connect to the server simultaneously, conventional network solutions can be implemented if a server
  • connection to the server is made.
  • server
  • Some of the criteria include the station name, a
  • step 98 if access to the server is denied, the modem connection is terminated by, e.g., an ATF command, at
  • step 100 If access is granted, step 102 transfers the Order Detail and registration data entry information to the server.
  • the server may store this
  • step the product item number, the external serial number, and a purchase
  • the purchase code is a code
  • the server Based upon the supplied information, the server generates partial decryption keys to be transmitted to the requesting station.
  • the partial decryption keys are transmitted transparently to
  • This partial decryption key is invisible to the user and is only used internally to generate the full decryption keys in step 106.
  • the Application generates the full decryption keys that will decrypt the selected software product. This is achieved, e.g., by using a private key
  • the full decryption keys are preferably 56 bit keys using the multi-level encryption scheme previously discussed.
  • the Application queries whether there are any items to print.
  • the Application will generate these documents locally at the station's printer.
  • the labels are for the
  • the labels and documentation may or may not
  • the printing routines are initialized at
  • step 1 10 Once the items are printed, the user will have the opportunity to check the documents for printing flaws, at step 1 1 2, and if necessary reprint
  • the encrypted CD-ROM volume is determined at step 1 14.
  • the path to the correct CD-ROM that contains the selected encrypted product is stored in the corresponding database file.
  • a dialog box will appear requesting that the user mounts the appropriate CD-ROM for the item or items that need processing.
  • the Application will process the first item, then request that a new CD-ROM be
  • step 1 1 8 the Application requests for the correct CD-ROM and at step 1 20, the user may change to the correct CD-ROM.
  • step 1 1 8 If it is still not correct, the process returns to step 1 1 8; however, if the CD- ROM is now correct the process proceeds to step 1 22 where it is determined
  • step 1 26 the full item
  • decryption keys are used to decrypt the selected items from the Order Detail. These keys are then immediately discarded by the Application and
  • the selected product item has been decrypted and is temporarily stored in the station memory. If the station user is a consumer, the station user is a consumer, the station user is a consumer, the station user is a consumer.
  • the product may be stored on the hard drive of the station. Alternatively or in addition to, the consumer may also write the decrypted product to a blank
  • the product may only be stored temporarily in the RAM as was the decryption key.
  • the Application will request a media type to be mounted.
  • the media is a floppy disk which is specially serialized. If the Application requires
  • the Application determines whether the media are the
  • step 1 38 the Application determines whether the media is filled to capacity or require decryption from multiple CD-ROMs. If the order is not complete, the process is returned to step 1 32. If the order is complete, the Application will return to the Order Detail screen at step 1 40. At step 144, the
  • step 146 the station is idle waiting for the
  • step 148 the process is ended.
  • FIGS 4A-D is a flow chart showing the steps for a consumer decrypting selected software products from a plurality of CD-ROMs from the consumer
  • the consumer preferably goes through the retailer
  • the retailer connects to the server for the partial decryption keys and once received, subsequently transmits on
  • Steps 300 to 320 are essentially identical to steps 60 to 80 of FIG 3A
  • step 322 the consumer user will
  • the user may contact the retailer by telephone or facsimile to request the partial decryption key for the selected software product, or may
  • supplied to the retailer include the product item number, the purchase number
  • the retailer initiates a request for the partial decryption keys from the remote server.
  • Steps 326 to 340 are substantially the same as steps 84 to 94 and 102 to 104 of Figs 3A-B, and therefore will not be redescribed.
  • step 342 the
  • a retailer transmits by modem, facsimile or telephone a partial decryption key, which is preferably 9 bits in length.
  • a partial decryption key which is preferably 9 bits in length.
  • Steps 346 to 368 are essentially the same as steps 108 to 1 30 of FIG 3C and therefore will not be redescribed.
  • step 370 the Application
  • step 374 the decrypted product items are copied to the directory on the consumer's hard
  • Steps 376 to 382 are essentially the same as steps 140 to 148 of FIG.
  • FIGS 5A-D is a flow chart showing the steps for decrypting selected
  • station in station group 1 2, where the partial decryption keys are generated
  • a dongle 50 is utilized to monitor
  • the partial decryption keys are located in a "resource" file which is one of the database files in the
  • Steps 200 to 206 are essentially the same as steps 60 to 66 of FIG 3A and therefore will not be redescribed.
  • step 208 the Application verifies that
  • the Application checks that there is an resource file. If the Application is not set to receive the dongle or
  • step 210 the process may proceed to step 68 of FIGS 3A-D, or else terminate.
  • the Application verifies that the bus, preferably a Processor Direct Bus, is connected to the dongle.
  • the bus preferably a Processor Direct Bus
  • a dialog box appears on the monitor informing the user that the dongle has an expiration date approaching in X number of days, in X
  • step 224 if either limits are expiring, the user
  • the dongle can initiate a revalidation process at step 226.
  • the dongle is
  • step 230 the user may determine that it is premature to initiate the revalidation process and instead
  • Steps 232 to 252 are essentially the same as steps 68 to 88 of FIGS 3A- B and therefore will not be redescribed. Additionally, steps 254-258 are
  • steps 96-100 of FIG 3B essentially the same as steps 96-100 of FIG 3B and will also not be redescribed.
  • step 260 in the event that access is granted, the order detail and the customer's registration information will be written to a preferably DES
  • the server will automatically retrieve the data from the DES resource file.
  • the dongle is updated indicating that an additional use has procured.
  • Steps 266 to the end at step 299 are essentially the same as steps 106

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

La présente invention concerne un système d'extraction d'informations électroniques protégées stockées dans une unité de stockage (44) au moins, telle qu'un CD-ROM, chaque unité de stockage étant au moins partiellement codée et couplée à une station utilisateur. Chaque station (40) utilisateur comporte un processeur réagissant à un système de fichiers de données et à un programme d'application séparé. Le système de fichiers de données inclus au moins des fichiers bases de données, chacun comprenant des données correspondant à un produit logiciel respectif. Le processeur réagissant au produit application reçoit les données du fichier base de données correspondant au produit logiciel sélectionné par un utilisateur, demande une clé (36) de décryptage à un serveur de réseau à distance sur la base d'un produit logiciel utilisateur sélectionné dans les fichiers bases de données et traite la clé de décryptage demandée reçue sélectivement du serveur de façon à décrypter le produit logiciel sélectionné dans l'unité de stockage.
PCT/US1997/018164 1996-10-10 1997-10-08 Systeme de fourniture d'informations electroniques proteges a gestion de donnees separee WO1998016033A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU48119/97A AU4811997A (en) 1996-10-10 1997-10-08 Secured electronic information delivery system having separate data management

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US73118696A 1996-10-10 1996-10-10
US08/731,186 1996-10-10

Publications (1)

Publication Number Publication Date
WO1998016033A1 true WO1998016033A1 (fr) 1998-04-16

Family

ID=24938443

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1997/018164 WO1998016033A1 (fr) 1996-10-10 1997-10-08 Systeme de fourniture d'informations electroniques proteges a gestion de donnees separee

Country Status (2)

Country Link
AU (1) AU4811997A (fr)
WO (1) WO1998016033A1 (fr)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000036536A2 (fr) * 1998-12-17 2000-06-22 Tribeka Limited Procede et dispositif de distribution a la demande d'informations numerisees
WO2000069112A1 (fr) * 1999-05-07 2000-11-16 Centura Software Calcul prealable de logiques de cle de cryptage « des » pour l'acces rapide a des bases de donnees cryptees
GB2390786A (en) * 2002-07-10 2004-01-14 Hewlett Packard Development Co Validating software code using a trusted third party
US7178038B2 (en) * 2001-07-19 2007-02-13 Koninklijke Philips Electronics N. V. Apparatus and method for reproducing user data
US7181016B2 (en) 2003-01-27 2007-02-20 Microsoft Corporation Deriving a symmetric key from an asymmetric key for file encryption or decryption

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5509070A (en) * 1992-12-15 1996-04-16 Softlock Services Inc. Method for encouraging purchase of executable and non-executable software
US5548645A (en) * 1993-12-22 1996-08-20 Ananda; Mohan Secure software rental system using distributed software

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5509070A (en) * 1992-12-15 1996-04-16 Softlock Services Inc. Method for encouraging purchase of executable and non-executable software
US5548645A (en) * 1993-12-22 1996-08-20 Ananda; Mohan Secure software rental system using distributed software

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000036536A2 (fr) * 1998-12-17 2000-06-22 Tribeka Limited Procede et dispositif de distribution a la demande d'informations numerisees
WO2000036536A3 (fr) * 1998-12-17 2001-10-04 Tribeka Ltd Procede et dispositif de distribution a la demande d'informations numerisees
US7487129B2 (en) 1998-12-17 2009-02-03 Daniel Doll-Steinberg Method and apparatus for the distribution of digitised information on demand
WO2000069112A1 (fr) * 1999-05-07 2000-11-16 Centura Software Calcul prealable de logiques de cle de cryptage « des » pour l'acces rapide a des bases de donnees cryptees
US7178038B2 (en) * 2001-07-19 2007-02-13 Koninklijke Philips Electronics N. V. Apparatus and method for reproducing user data
GB2390786A (en) * 2002-07-10 2004-01-14 Hewlett Packard Development Co Validating software code using a trusted third party
GB2390786B (en) * 2002-07-10 2006-02-15 Hewlett Packard Development Co Method and system for validating software code
US7246379B2 (en) 2002-07-10 2007-07-17 Hewlett-Packard Development Company, L.P. Method and system for validating software code
US7181016B2 (en) 2003-01-27 2007-02-20 Microsoft Corporation Deriving a symmetric key from an asymmetric key for file encryption or decryption

Also Published As

Publication number Publication date
AU4811997A (en) 1998-05-05

Similar Documents

Publication Publication Date Title
US5784460A (en) Secured electronic information delivery system having a three-tier structure
US20020007347A1 (en) Secured electronic information delivery system having a metering device
EP0719485B1 (fr) Commande d'acces destinee a des supports portables de stockage de donnees
US5394469A (en) Method and apparatus for retrieving secure information from mass storage media
US5677953A (en) System and method for access control for portable data storage media
CA2145926C (fr) Methode et appareil pour valider l'utilisation en periode d'essai de produits logiciels : methode et appareil de generation d'identificateurs subordonnes a une machine
US6954753B1 (en) Transparent electronic safety deposit box
US6067582A (en) System for installing information related to a software application to a remote computer over a network
US7143067B1 (en) System and method for installing personal computer software
EP0681233B1 (fr) Méthode et appareil permettant de prendre des logiciels à l'essai utilisant un en-tête de chiffrement
EP0679979B1 (fr) Méthode et appareil permettant de prendre les logiciels à l'essai avec interaction de l'utilisateur du type essai et achat
US6092105A (en) System and method for vending retail software and other sets of information to end users
JP3503774B2 (ja) ファイルへのアクセスを保護するための方法および装置
EP0679977A1 (fr) Méthode et appareil permettant de prendre des logiciels à l'essai et permettant la distribution des objets de logiciels
JP4304300B2 (ja) ユーザ装置、サーバ、アップグレードサービスシステム、その方法およびプログラム
WO1998016033A1 (fr) Systeme de fourniture d'informations electroniques proteges a gestion de donnees separee
WO2001071638A1 (fr) Service, systeme et procede de stockage internet
AU715638C (en) System and method for access control for data storage media
AU694742C (en) Access control for portable data storage media
AU715638B2 (en) System and method for access control for data storage media

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AU BB CN CU JP KR NZ UA AM AZ BY KG KZ MD RU TJ TM

NENP Non-entry into the national phase

Ref country code: JP

Ref document number: 1998517719

Format of ref document f/p: F