WO1998034173A1 - A method of preventing unauthorized use of a computer program - Google Patents

A method of preventing unauthorized use of a computer program Download PDF

Info

Publication number
WO1998034173A1
WO1998034173A1 PCT/DK1998/000009 DK9800009W WO9834173A1 WO 1998034173 A1 WO1998034173 A1 WO 1998034173A1 DK 9800009 W DK9800009 W DK 9800009W WO 9834173 A1 WO9834173 A1 WO 9834173A1
Authority
WO
WIPO (PCT)
Prior art keywords
signature structure
software
computer system
signature
computer program
Prior art date
Application number
PCT/DK1998/000009
Other languages
French (fr)
Inventor
Hans Jessen
Original Assignee
Hans Jessen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hans Jessen filed Critical Hans Jessen
Priority to AU53126/98A priority Critical patent/AU5312698A/en
Publication of WO1998034173A1 publication Critical patent/WO1998034173A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress

Definitions

  • the invention relates to a method of preventing unauthorized use of a computer program.
  • US Patent No. 4 748 561 discloses defining the signature structure from the configuration of a computer and pe- ripheral units on the basis of the individual signatures in the hardware .
  • US Patent No. 5 113 518 generalizes signatures in hardware, and column 3, lines 57 - 68 exclusively mention signatures from hardware characteristics and not from e.g. file catalogues.
  • the existing techniques depend on hardware and/or operating system, which means that resetting of hardware/system, exchange of parts of hardware or removal of a computer program on hardware and reinstallation on new hardware, involve considerable problems in practice which significantly restrict the use of the existing techniques .
  • the invention uses techniques in which the signature structure is based on creation time(s) for Cyberfile(s) identifier (s) .
  • a Cyberfile is defined here as an element in the complement for ordinary files (i.e. for files placed under a file catalogue: text files, data files, executable files) on a storage medium, having an identi- fier and an associated creation time, and, if the identi ⁇ bomb is generated as a function of the creation time, this functional mapping must be unambiguous.
  • a file catalogue is an example of a Cyberfile. This signature struc- ture is unique for each individual computer system and cannot . be copied by the commercially available copying programs. When programming e.g.
  • the invention thus relates to a method of preventing unauthorized use of a computer program as defined in the introductory portion of claim 1, which is characterized by the features defined in the characterizing portion of claim 1.
  • the invention makes it possible to be independent of the hardware of the computer system by solely using the individual "historical temporal course" of the start and current operation, etc. of the computer system, which is unique to any computer system.
  • the creation time for Cyberfiles e.g. file catalogues, are available only with very special programming tools and not necessary for the skilled person's programming of software.
  • the programmer as a skilled person need not consider and normally has no knowledge of how the creation times are processed according to the invention in connection with copying.
  • a signature structure is associated with the software in which it is desired to use the invention.
  • the signature generator is executed in the computer system the first time the software is to be used.
  • the signature structure is handed over to the authorizer for reading of the authorization request, including the sig- nature structure.
  • the signature structure is converted by the authorizer to a form readable by a signature detector associated with the software and is subsequently stored in the software or in a file in the computer system. Subsequently, the software detects by means of a signature detector whether it can identify the stored signature structure with the detected signature structure.
  • the signature generator can e.g. operate in the following manner. At least one identifier is created for a file catalogue for the software to be protected against copy ⁇ ing, followed by the determination of a desired signature structure (SR) consisting of creation times for selected file catalogues, including newly created ones.
  • SR desired signature structure
  • the small ⁇ est signature structure may consist of one creation time, and in that case it may be most expedient to select the creation time for the file catalogue, created in connec ⁇ tion with the installation of the software.
  • the signature detector reads the stored signature struc- ture (SR) and compares it with the signature structure (SA) of the computer system in question. If this comparison exceeds certain predetermined tolerances, the execution of the software is interrupted or changed. When comparing the authorized signature structure (SR) with the current signature structure (SA) , deviations may be allowed to control the access to the entire software or specific parts of the software, including to database (s).
  • the signature structure may contain one or more creation times for identifiers from widely different areas of the computer system than are actually subjected to recognition. This may be expedient e.g. if some identifiers are damaged, for which reason the recog- nition may be performed on a selected minimum amount of the undamaged identifiers.
  • one or more components may be added to the signature structure according to claim 9.
  • Such components may be check/control data, e.g. version no., licence no., software code(s) for extended access.
  • This may be useful in connection with e.g. the distribution of large computer program systems on CD ROM, where the user can e.g. merely receive a new installation disk from the supplier, which e.g. overwrites existing file(s) or writes new file(s) according to claims 4-6, and then the extended authorization may be applied for the use of the CD ROM.
  • the invention also allows multiple installation of computer programs, as de ⁇ sired.
  • the computer program can also compare the access code in the current signature structure with the one of the computer program, including e.g. the access code em- bedded in the database. This also makes it possible to prevent unauthorized use of database (s) which are attached to the computer program, also in encrypted form. This may be used to advantage e.g. on a single or specially selected user terminal (s) attached to a larger computer system.
  • Creation time here means the creation time in time or an unambiguous functional mapping of time in another data value, including in another data type.
  • Addition of one or more components in the signature structure according to claim 10, which describes future times, time intervals or accumulated execution time (real time, machine time, see the above definition of time in general) may be useful in the control of the access to the computer program or to parts of the computer program over time. It is hereby possible to incorporate a temporal functionality in the comparison. Thus, it may e.g. be ensured that the use of the computer program or part(s) thereof is prevented after 6 months.
  • the use of time in- tervals e.g. allows access to the computer program for specific periods of time.
  • the execution of the computer program may e.g. be stopped when the use of the computer program exceeds the value of accumulated executed time determined in the signature structure.
  • component (s) of the signature structure may also be (sub) -signature structure (s) which describes/describe specific part(s) of the computer system. This may also be a useful application in computer networks.
  • a computer system here means any combination of hardware, operating system(s) and storage medium (media) , which may also be coupled together in networks, as well as computer programs, including the installed computer program.
  • This computer program or these computer programs are to be authorized for use by applying the principles of the invention.
  • fig. 1 shows a block diagram of an ordinary computer sys ⁇ tem illustrated with the files incorporated in the implementation of the invention
  • fig. 2 shows a flow chart to illustrate the principles of the invention.
  • the reference numeral 1 designates a computer system with associated storage medium 2.
  • the software 3 is installed on the storage medium, consisting of a signature generator 4, a signature detector 5 and a stored signature structure 6.
  • Fig. 2 shows an example of the invention when the user is to use the software the first time.
  • the software is installed 2.
  • data 3 on the user's desired application of the software may be entered, which may be expedient in case of voluminous software with several fields of application.
  • the signature generator 4 is executed, generating a predetermined amount of file catalogues in the software, reading the associated crea- tion times and placing all data from 3 and 4 in a signature structure.
  • the signature structure is transferred 5, e.g. by facsimile, letter, file via E-mail or simple file trans- fer, to the authorizer.
  • the authorizer reads 6 the signature structure to record and settle the allocated authorization, following which the signature structure is encrypted and stored in a file SR and is transferred 7, e.g. by facsimile, letter, file via E-mail or simple file transfer, to the authorizee (user) .
  • the file SR is placed 8 in the software, e.g. the file catalogue of the software.
  • the authorization procedure is hereby completed

Abstract

The present invention relates to a method of preventing unauthorized use of a computer program installed on a computer system. The method comprises determining a signature structure on the basis of creation times for identifiers of Cyberfiles, e.g. file catalogues. This signature structure is associated with the computer program which is able to recognize the current signature structure within certain predetermined tolerances during the execution, otherwise the execution is interrupted or changed. The invention finds use preferably for protecting computer programs and database information, including multimedia, against copying.

Description

A method of preventing unauthorized use of a computer program
The invention relates to a method of preventing unauthorized use of a computer program.
Existing methods are based on obtaining signatures from hardware and/or operating system(s). US Patent No. 4 688 169 discloses a method based on signatures incorporated in the operating system.
US Patent No. 4 748 561 discloses defining the signature structure from the configuration of a computer and pe- ripheral units on the basis of the individual signatures in the hardware .
US Patent No. 5 113 518 generalizes signatures in hardware, and column 3, lines 57 - 68 exclusively mention signatures from hardware characteristics and not from e.g. file catalogues.
Generally, the existing techniques depend on hardware and/or operating system, which means that resetting of hardware/system, exchange of parts of hardware or removal of a computer program on hardware and reinstallation on new hardware, involve considerable problems in practice which significantly restrict the use of the existing techniques .
The invention uses techniques in which the signature structure is based on creation time(s) for Cyberfile(s) identifier (s) . A Cyberfile is defined here as an element in the complement for ordinary files (i.e. for files placed under a file catalogue: text files, data files, executable files) on a storage medium, having an identi- fier and an associated creation time, and, if the identi¬ fier is generated as a function of the creation time, this functional mapping must be unambiguous. A file catalogue is an example of a Cyberfile. This signature struc- ture is unique for each individual computer system and cannot . be copied by the commercially available copying programs. When programming e.g. in ANSI C: "structure" translated into 'structure' as an arranged set of components whose names in ANSI C: "identifier" translated into ' identifikator' are a user-defined data type which is to be declared so that it can observe the creation time.
The invention thus relates to a method of preventing unauthorized use of a computer program as defined in the introductory portion of claim 1, which is characterized by the features defined in the characterizing portion of claim 1.
Thus, the invention makes it possible to be independent of the hardware of the computer system by solely using the individual "historical temporal course" of the start and current operation, etc. of the computer system, which is unique to any computer system. The creation time for Cyberfiles, e.g. file catalogues, are available only with very special programming tools and not necessary for the skilled person's programming of software. Thus, the programmer as a skilled person need not consider and normally has no knowledge of how the creation times are processed according to the invention in connection with copying.
An embodiment of the method according to the invention will be described below.
A signature structure is associated with the software in which it is desired to use the invention. The signature generator is executed in the computer system the first time the software is to be used. In this connection, the signature structure is handed over to the authorizer for reading of the authorization request, including the sig- nature structure. The signature structure is converted by the authorizer to a form readable by a signature detector associated with the software and is subsequently stored in the software or in a file in the computer system. Subsequently, the software detects by means of a signature detector whether it can identify the stored signature structure with the detected signature structure.
The signature generator can e.g. operate in the following manner. At least one identifier is created for a file catalogue for the software to be protected against copy¬ ing, followed by the determination of a desired signature structure (SR) consisting of creation times for selected file catalogues, including newly created ones. The small¬ est signature structure may consist of one creation time, and in that case it may be most expedient to select the creation time for the file catalogue, created in connec¬ tion with the installation of the software.
The signature detector reads the stored signature struc- ture (SR) and compares it with the signature structure (SA) of the computer system in question. If this comparison exceeds certain predetermined tolerances, the execution of the software is interrupted or changed. When comparing the authorized signature structure (SR) with the current signature structure (SA) , deviations may be allowed to control the access to the entire software or specific parts of the software, including to database (s).
In order to improve the operational reliability of the copy protection technique according to the invention, the signature structure, as stated in claim 8, may contain one or more creation times for identifiers from widely different areas of the computer system than are actually subjected to recognition. This may be expedient e.g. if some identifiers are damaged, for which reason the recog- nition may be performed on a selected minimum amount of the undamaged identifiers.
With a view to being able to install new versions of the computer program or e.g. extending the access to a greater part of a computer program system, including as¬ sociated databases, one or more components may be added to the signature structure according to claim 9. Such components may be check/control data, e.g. version no., licence no., software code(s) for extended access. This may be useful in connection with e.g. the distribution of large computer program systems on CD ROM, where the user can e.g. merely receive a new installation disk from the supplier, which e.g. overwrites existing file(s) or writes new file(s) according to claims 4-6, and then the extended authorization may be applied for the use of the CD ROM. With reference to the latter, the invention also allows multiple installation of computer programs, as de¬ sired.
If the computer program has one or more databases attached to it, then, according to claim 9, during execution, the computer program can also compare the access code in the current signature structure with the one of the computer program, including e.g. the access code em- bedded in the database. This also makes it possible to prevent unauthorized use of database (s) which are attached to the computer program, also in encrypted form. This may be used to advantage e.g. on a single or specially selected user terminal (s) attached to a larger computer system. Creation time here means the creation time in time or an unambiguous functional mapping of time in another data value, including in another data type.
Addition of one or more components in the signature structure according to claim 10, which describes future times, time intervals or accumulated execution time (real time, machine time, see the above definition of time in general) , may be useful in the control of the access to the computer program or to parts of the computer program over time. It is hereby possible to incorporate a temporal functionality in the comparison. Thus, it may e.g. be ensured that the use of the computer program or part(s) thereof is prevented after 6 months. The use of time in- tervals e.g. allows access to the computer program for specific periods of time. When using accumulated executed time as a component, the execution of the computer program may e.g. be stopped when the use of the computer program exceeds the value of accumulated executed time determined in the signature structure.
It should be noted that, according to claim 11, component (s) of the signature structure may also be (sub) -signature structure (s) which describes/describe specific part(s) of the computer system. This may also be a useful application in computer networks.
A computer system here means any combination of hardware, operating system(s) and storage medium (media) , which may also be coupled together in networks, as well as computer programs, including the installed computer program. This computer program or these computer programs are to be authorized for use by applying the principles of the invention. The invention will now be explained more fully with ref¬ erence to the embodiment shown in the drawing, in which
fig. 1 shows a block diagram of an ordinary computer sys¬ tem illustrated with the files incorporated in the implementation of the invention, and
fig. 2 shows a flow chart to illustrate the principles of the invention.
In fig. 1, the reference numeral 1 designates a computer system with associated storage medium 2. The software 3 is installed on the storage medium, consisting of a signature generator 4, a signature detector 5 and a stored signature structure 6.
Fig. 2 shows an example of the invention when the user is to use the software the first time. Starting from start 1 the software is installed 2. Then data 3 on the user's desired application of the software may be entered, which may be expedient in case of voluminous software with several fields of application. Then the signature generator 4 is executed, generating a predetermined amount of file catalogues in the software, reading the associated crea- tion times and placing all data from 3 and 4 in a signature structure.
Then the signature structure is transferred 5, e.g. by facsimile, letter, file via E-mail or simple file trans- fer, to the authorizer. The authorizer reads 6 the signature structure to record and settle the allocated authorization, following which the signature structure is encrypted and stored in a file SR and is transferred 7, e.g. by facsimile, letter, file via E-mail or simple file transfer, to the authorizee (user) . After the user's reception of the file SR, the file SR is placed 8 in the software, e.g. the file catalogue of the software. The authorization procedure is hereby completed

Claims

P a t e n t C l a i m s
1. A method of preventing unauthorized use of software on a computer system, said software having already been installed on a first computer system, wherein the soft¬ ware, after the installation on the first computer sys¬ tem, has generated and, together with an authorizer, has caused storage of a signature structure for the signature of the first computer system, wherein the software, each time it is started/executed in an arbitrary computer sys¬ tem, checks whether the signature structure for the first computer system can be identified, and if the signature structure is not found, then the computer program repre- sented by the software is interrupted/changed, c h a r a c t e r i z e d in that the software itself generates a signature structure in the form of an identification which is input in a storage in the computer system.
2. A method according to claim 1, c h a r a c t e r i z e d in that it is checked during the execution of the computer program whether the signature structure is within predetermined limits.
3. A method according to claim 1, c h a r a c t e r i z e d in that the signature structure is derived from one or more creation times for Cyberfiles in the computer system.
4. A method according to claim 1, c h a r a c t e r i z e d in that the storage used is located in a file in the computer system.
5. A method according to claim 1, c h a r a c t e r - i z e d in that the storage used is embedded in the software.
6. A method according to claim 1, c h a r a c t e r ¬ i z e d in that the storage used is compiled into the software .
7. A method according to claims 1-6, c h a r a c t e r ¬ i z e d in that the signature structure is encrypted.
8. A method according to claims 1-7, c h a r a c t e r - i z e d in that the signature structure contains a plu¬ rality of creation times for identifiers, said plurality being larger than the plurality currently required for comparison.
9. A method according to claims 1-8, c h a r a c t e r i z e d by adding to the signature structure component (s) which is/are check/control data providing infor¬ mation on version no., licence no., access code(s) to subsystem(s) of the computer program, etc.
10. A method according to claims 1-9, c h a r a c t e r i z e d by adding to the signature structure com¬ ponent (s) whose value (s) determines/determine the time (s) /time interval (s) /accumulated execution time(s) for use as check/control data.
11. A method according to claims 1-10, c h a r a c t e r i z e d by adding to the signature structure component (s) which is/are signature structure (s) for subsys- tem(s) of the computer system.
PCT/DK1998/000009 1997-01-09 1998-01-08 A method of preventing unauthorized use of a computer program WO1998034173A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU53126/98A AU5312698A (en) 1997-01-09 1998-01-08 A method of preventing unauthorized use of a computer program

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DK0029/97 1997-01-09
DK2997A DK2997A (en) 1997-01-09 1997-01-09 Procedure for preventing unauthorized use of computer program

Publications (1)

Publication Number Publication Date
WO1998034173A1 true WO1998034173A1 (en) 1998-08-06

Family

ID=8088946

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/DK1998/000009 WO1998034173A1 (en) 1997-01-09 1998-01-08 A method of preventing unauthorized use of a computer program

Country Status (3)

Country Link
AU (1) AU5312698A (en)
DK (1) DK2997A (en)
WO (1) WO1998034173A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7134145B1 (en) 1999-04-30 2006-11-07 Koninklijke Philips Electronics N.V. Registering copy protected material in a check-out, check-in system
US8984636B2 (en) 2005-07-29 2015-03-17 Bit9, Inc. Content extractor and analysis system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5113518A (en) * 1988-06-03 1992-05-12 Durst Jr Robert T Method and system for preventing unauthorized use of software
WO1993021582A1 (en) * 1992-04-20 1993-10-28 Mark Lieberman System for protection of software
US5291598A (en) * 1992-04-07 1994-03-01 Gregory Grundy Method and system for decentralized manufacture of copy-controlled software
EP0644474A1 (en) * 1993-09-13 1995-03-22 National University Of Singapore A method for utilising medium nonuniformities to minimize unauthorized duplication of digital information
EP0766165A2 (en) * 1995-08-31 1997-04-02 Fujitsu Limited Licensee notification system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5113518A (en) * 1988-06-03 1992-05-12 Durst Jr Robert T Method and system for preventing unauthorized use of software
US5291598A (en) * 1992-04-07 1994-03-01 Gregory Grundy Method and system for decentralized manufacture of copy-controlled software
WO1993021582A1 (en) * 1992-04-20 1993-10-28 Mark Lieberman System for protection of software
EP0644474A1 (en) * 1993-09-13 1995-03-22 National University Of Singapore A method for utilising medium nonuniformities to minimize unauthorized duplication of digital information
EP0766165A2 (en) * 1995-08-31 1997-04-02 Fujitsu Limited Licensee notification system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7134145B1 (en) 1999-04-30 2006-11-07 Koninklijke Philips Electronics N.V. Registering copy protected material in a check-out, check-in system
US8984636B2 (en) 2005-07-29 2015-03-17 Bit9, Inc. Content extractor and analysis system

Also Published As

Publication number Publication date
AU5312698A (en) 1998-08-25
DK2997A (en) 1997-01-14

Similar Documents

Publication Publication Date Title
US6226747B1 (en) Method for preventing software piracy during installation from a read only storage medium
US6735768B1 (en) Method and system for installing a software product to a computer with authorization
US6148407A (en) Method and apparatus for producing computer platform fingerprints
US7503072B2 (en) Hardware ID to prevent software piracy
US6023763A (en) Method of and apparatus for protecting and upgrading software using a removable hardlock
US6067640A (en) System for management of software employing memory for processing unit with regulatory information, for limiting amount of use and number of backup copies of software
US7308450B2 (en) Data protection method, authentication method, and program therefor
WO1990013084A1 (en) Computer file protection system
HU220825B1 (en) Method of operating a computer system and the computer system operated by the method, as well as method and apparatus for limiting the number of the copies of a file used by a computer system
US7363507B2 (en) Device and method of preventing pirated copies of computer programs
GB2304212A (en) Safeguarding hard drive data
CN101558386A (en) Confirmation method of API by the information at call-stack
KR100269104B1 (en) Personal computer with security apparatus and security method thereof
KR980010772A (en) How to prevent copying of computer software
CA2322113A1 (en) System and method for managing user permissions for accessing functionality of multiple software applications
JPS63213027A (en) Software copy protection system
US7006997B2 (en) Method and program for preventing unfair use of software
US20020129270A1 (en) Electronic device for providing software protection
CN100555232C (en) A kind of data backup and restore of hard disk linux document system and authority control method
CN101615237A (en) Can verify embedded system and verification method thereof
WO1998034173A1 (en) A method of preventing unauthorized use of a computer program
US6898555B2 (en) Method for indicating the integrity of use-information of a computer program
US20050131960A1 (en) Method and system of accessing at least one target file in a computer system with an operating system with file locking implemented at file-open time
CN102117394A (en) Method and device for detecting whether a computer file has been copied and method and device for enabling such detection
WO1998053384A1 (en) Method and apparatus for activating programs/features in a computer

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM GW HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

NENP Non-entry into the national phase

Ref country code: JP

Ref document number: 1998531317

Format of ref document f/p: F

122 Ep: pct application non-entry in european phase