WO1999026123A1 - Perfectionnements apportes a des systemes de protection de logiciel - Google Patents
Perfectionnements apportes a des systemes de protection de logiciel Download PDFInfo
- Publication number
- WO1999026123A1 WO1999026123A1 PCT/GB1998/003470 GB9803470W WO9926123A1 WO 1999026123 A1 WO1999026123 A1 WO 1999026123A1 GB 9803470 W GB9803470 W GB 9803470W WO 9926123 A1 WO9926123 A1 WO 9926123A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- computer
- program
- identifier code
- identifier
- installation
- Prior art date
Links
- 238000000034 method Methods 0.000 claims abstract description 51
- 238000009434 installation Methods 0.000 claims abstract description 48
- 238000004590 computer program Methods 0.000 claims description 7
- 238000013475 authorization Methods 0.000 description 22
- 230000008569 process Effects 0.000 description 8
- 238000004891 communication Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 230000008901 benefit Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000011900 installation process Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000037361 pathway Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
- G06F2211/008—Public Key, Asymmetric Key, Asymmetric Encryption
Definitions
- the present invention concerns improvements relating to software
- the "disenabling code” is obtained from identification information unique to the computer on which the software program is first run, this identification
- PROM programmable logic array
- a CD key or serial number is provided on the back of the CD
- CD writers the copying of CD-ROMs is likely to increase.
- serial number is hard coded into the software on the CD-
- This registration number is then input by the user and the
- the software can also be easily copied illegally onto many
- the identifier is used to generate a key which is transferred
- a remote location eg a central processing section.
- the present invention aims to provide an improved software protection
- the hard disk serial (or volume) number is readily readable by a security installation program running either from a CD-
- the identifier code may also be, for
- a writeable medium, copied may, for example, be performed by a routine written
- a writeable storage medium e.g. a V/y
- the encryption/decryption is performed by use of private
- codes can be transmitted to the software manufacturer or supplier or other remote
- supplier may be by voice or by electronic means using, for example, the signals
- a modem link is established between the
- a telephone network preferably via the internet so that the encryption and tagging
- the decryption key will operate to verify that the
- the user will be presented with a warning message regarding
- the method of the present invention will provide a much higher level of
- the supplier or manufacturer then combines and encrypts both the
- CD-ROM blanks could be modified to include a small writeable section in which
- the identifier code of the computer could be performed by the program itself. According to another aspect of the present invention there is provided a
- the installer will need to register the software
- the invention also extends to a combination of a system as described
- Figure 1 is a schematic block diagram showing a system embodying the
- FIG. 2 is a flow diagram showing the steps involved in the preferred embodiment
- FIG. 3 is a flow diagram showing several alternative steps involved in
- Figure 4 is a flow diagram showing the sequence of events when running
- FIG. 1 there is shown a system 1 embodying the
- the system 1 is that of a personal computer (PC).
- the system 1 comprises a CD-ROM
- optical reader device 3 for reading both the application program 2 and an
- program 2 is supplied on the CD-ROM in compressed format, it is uncompressed
- up program 4 includes a decryption key 5 which is described in detail hereinafter.
- the serial number 7 acts as the identifier code for the system 1. Typically, such
- serial numbers 7 are 32 bit numbers which can readily be accessed through the
- DOS command 'VOL' which displays the number 7 in Hexadecimal format as an
- a microprocessor 8 connected to both the CD-reader 3 and the data store
- a display 9 for presenting messages to the user and a modem 10 for
- the system 1 is connected via the telecommunications network 11 to the software program manufacturer's or supplier's encryption device 12.
- the device is connected via the telecommunications network 11 to the software program manufacturer's or supplier's encryption device 12.
- the hard disk drive 15 includes an authorisation
- the first stage in the operation of the system 1 is to seek authorisation
- the authorisation/set up program 4 is run at 20 and its first step is to read
- the encrypted data (combined encrypted serial numbers) is
- encryption device 12 is then broken at 26.
- the encrypted data is decrypted at 27 using the decryption key 5.
- program 2 is allowed to proceed at 30. Installation usually involves expansion
- the present embodiment as described above uses a public/private
- the public key is the decryption key 5 which is included in each copy of
- the private key is the encryption key 17 which is
- the comparison step 28, 29, as described above, requires the decryption
- the hard disk serial number may be exclusively read with a
- WANs such as ISDN or dedicated internet connections which do not
- the hard disk serial number 7 is presented at 33 to the user on the display 9.
- CD-ROM serial number is presented at 33 A to the user on the display 9 and the
- the manufacturer then communicates the encrypted combined code to the user at 36.
- Figure 4 is a flow diagram illustrating the sequence of events which occur
- loaded application may then be run by the operator. If, on the other hand, the two
- Public and private keys should be changed regularly, if possible for each new batch of CD-ROMs. Public and
- private keys can be different for each geographical region that the program 2 is
- CD-ROM CD-ROM.
- the invention is applicable to software provided on conventional
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
L'invention concerne un procédé et un système visant à éviter l'installation ou l'exécution pirate d'un programme sur un ordinateur. Ledit procédé consiste à lire (21) d'une part un code d'identification associé à l'ordinateur, à savoir, de préférence, le numéro de série (7) du disque dur, et d'autre part un code d'identification associé au programme. Ce numéro (7) est envoyé (23, 34) à un tiers (par exemple, le fabricant de logiciels), chez qui les codes d'identification sont combinés et cryptés (25, 35) au moyen d'une clef de cryptage (17) privée. Les données cryptées relatives aux codes d'identification combinés sont reçues par l'ordinateur, et sont décryptées (27) au moyen d'une clef de décryptage (5) publique enregistrée. L'installation du programme est rendue impossible (31) si le code d'identification (7) de l'ordinateur ne présente aucune équivalence directe ou indirecte avec les données décryptées.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB9724411.5A GB9724411D0 (en) | 1997-11-18 | 1997-11-18 | Improvements relating to software protection systems |
GB9724411.5 | 1997-11-18 | ||
GBGB9804503.2A GB9804503D0 (en) | 1997-11-18 | 1998-03-03 | Improvements relating to software protection systems |
GB9804503.2 | 1998-03-03 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1999026123A1 true WO1999026123A1 (fr) | 1999-05-27 |
Family
ID=26312622
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB1998/003470 WO1999026123A1 (fr) | 1997-11-18 | 1998-11-18 | Perfectionnements apportes a des systemes de protection de logiciel |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO1999026123A1 (fr) |
Cited By (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6169976B1 (en) * | 1998-07-02 | 2001-01-02 | Encommerce, Inc. | Method and apparatus for regulating the use of licensed products |
WO2001004730A1 (fr) * | 1999-07-13 | 2001-01-18 | Infinia Ip Ltd | Identification d'ordinateurs |
WO2002001333A2 (fr) * | 2000-06-27 | 2002-01-03 | Microsoft Corporation | Organe d'archivage sur personnalise, et systeme et procede de mise en oeuvre dudit organe d'archivage |
WO2002003176A2 (fr) * | 2000-06-30 | 2002-01-10 | The Virtual Orchestra Company Limited | Utilisation de donnees de licence |
WO2003021401A2 (fr) * | 2001-09-04 | 2003-03-13 | Imagination Technologies Limited | Systeme de texturation |
US6681212B1 (en) | 1999-04-23 | 2004-01-20 | Nianning Zeng | Internet-based automated system and a method for software copyright protection and sales |
WO2004027678A2 (fr) * | 2002-09-21 | 2004-04-01 | Bitarts Limited | Protection de logiciel |
US6725205B1 (en) * | 1999-12-02 | 2004-04-20 | Ulysses Esd, Inc. | System and method for secure software installation |
WO2004057448A1 (fr) * | 2002-12-19 | 2004-07-08 | Allegroassai S.P.A. | Procede d'authentification d'un code de programme |
EP1466230A1 (fr) * | 2001-12-11 | 2004-10-13 | Telia AB (publ) | Protection contre la copie en fonction de la localisation |
EP1471406A1 (fr) * | 2003-04-25 | 2004-10-27 | Culture.com Technology (Macau) Ltd | Procédé de vérification d'autorisation d'utilisation d'un livre électronique sur une plateforme d'information |
EP1560098A3 (fr) * | 2003-12-16 | 2005-08-10 | Microsoft Corporation | Méthode et système assurant l'installation ou l'exécution de mises à jour d'un logiciel seulement sur un appareil spécifique ou sur une catégorie d' appareils |
US6970849B1 (en) | 1999-12-17 | 2005-11-29 | Microsoft Corporation | Inter-server communication using request with encrypted parameter |
US6981262B1 (en) | 2000-06-27 | 2005-12-27 | Microsoft Corporation | System and method for client interaction in a multi-level rights-management architecture |
US6996720B1 (en) | 1999-12-17 | 2006-02-07 | Microsoft Corporation | System and method for accessing protected content in a rights-management architecture |
US7017189B1 (en) | 2000-06-27 | 2006-03-21 | Microsoft Corporation | System and method for activating a rendering device in a multi-level rights-management architecture |
US7032113B2 (en) * | 2000-04-28 | 2006-04-18 | Moldflow Ireland, Ltd. | Network enabled application software system and method |
US7047411B1 (en) | 1999-12-17 | 2006-05-16 | Microsoft Corporation | Server for an electronic distribution system and method of operating same |
US7051200B1 (en) | 2000-06-27 | 2006-05-23 | Microsoft Corporation | System and method for interfacing a software process to secure repositories |
EP1729250A1 (fr) * | 2004-02-27 | 2006-12-06 | Bitwallet Inc. | Dispositif de terminal, dispositif de serveur, méthode de contrôle de terminal, programme de terminal et support d'enregistrement |
US7171692B1 (en) | 2000-06-27 | 2007-01-30 | Microsoft Corporation | Asynchronous communication within a server arrangement |
US7188342B2 (en) | 2001-04-20 | 2007-03-06 | Microsoft Corporation | Server controlled branding of client software deployed over computer networks |
US7225159B2 (en) | 2000-06-30 | 2007-05-29 | Microsoft Corporation | Method for authenticating and securing integrated bookstore entries |
US7356698B2 (en) | 2000-01-28 | 2008-04-08 | Advantest Corporation | Device authentication apparatus and method, and recorded medium on which device authentication program is recorded |
CN100405321C (zh) * | 2005-01-20 | 2008-07-23 | 英业达股份有限公司 | 防止软件写入错误的方法 |
CN100410831C (zh) * | 2005-04-22 | 2008-08-13 | 联想(北京)有限公司 | 随机捆绑软件安装方法 |
CN100447773C (zh) * | 2000-07-20 | 2008-12-31 | 国际商业机器公司 | 在计算机销售端为购买的计算机安装程序的方法及系统 |
US7539875B1 (en) | 2000-06-27 | 2009-05-26 | Microsoft Corporation | Secure repository with layers of tamper resistance and system and method for providing same |
US7549042B2 (en) | 2003-12-16 | 2009-06-16 | Microsoft Corporation | Applying custom software image updates to non-volatile storage in a failsafe manner |
US7549148B2 (en) | 2003-12-16 | 2009-06-16 | Microsoft Corporation | Self-describing software image update components |
US7568195B2 (en) | 2003-12-16 | 2009-07-28 | Microsoft Corporation | Determining a maximal set of dependent software updates valid for installation |
US7614051B2 (en) | 2003-12-16 | 2009-11-03 | Microsoft Corporation | Creating file systems within a file in a storage technology-abstracted manner |
US7823208B2 (en) | 2000-06-27 | 2010-10-26 | Microsoft Corporation | Method and system for binding enhanced software features to a persona |
US7861306B2 (en) | 2000-06-27 | 2010-12-28 | Microsoft Corporation | Method and system for limiting the use of user-specific software features |
EP2369518A1 (fr) * | 2010-03-08 | 2011-09-28 | Siemens Aktiengesellschaft | Système et procédé de protection de copie d'un bloc de logiciel |
EP2405377A1 (fr) * | 2010-07-09 | 2012-01-11 | Research In Motion Limited | Sécurisation d'un composant avant de fabriquer un dispositif |
US9032186B2 (en) | 2010-07-09 | 2015-05-12 | Blackberry Limited | Utilization of a microcode interpreter built in to a processor |
US9361107B2 (en) | 2010-07-09 | 2016-06-07 | Blackberry Limited | Microcode-based challenge/response process |
CN110443030A (zh) * | 2019-06-24 | 2019-11-12 | 维沃移动通信有限公司 | 一种权限处理方法及终端设备 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5113518A (en) * | 1988-06-03 | 1992-05-12 | Durst Jr Robert T | Method and system for preventing unauthorized use of software |
WO1995035533A1 (fr) * | 1994-06-17 | 1995-12-28 | Megalode Corporation | Procede pour empecher l'utilisation d'un logiciel sur un ordinateur non autorise |
-
1998
- 1998-11-18 WO PCT/GB1998/003470 patent/WO1999026123A1/fr active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5113518A (en) * | 1988-06-03 | 1992-05-12 | Durst Jr Robert T | Method and system for preventing unauthorized use of software |
WO1995035533A1 (fr) * | 1994-06-17 | 1995-12-28 | Megalode Corporation | Procede pour empecher l'utilisation d'un logiciel sur un ordinateur non autorise |
Cited By (53)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6169976B1 (en) * | 1998-07-02 | 2001-01-02 | Encommerce, Inc. | Method and apparatus for regulating the use of licensed products |
US6681212B1 (en) | 1999-04-23 | 2004-01-20 | Nianning Zeng | Internet-based automated system and a method for software copyright protection and sales |
WO2001004730A1 (fr) * | 1999-07-13 | 2001-01-18 | Infinia Ip Ltd | Identification d'ordinateurs |
AU777631B2 (en) * | 1999-07-13 | 2004-10-21 | Fusion Holdings Limited | Identification of computers |
US6725205B1 (en) * | 1999-12-02 | 2004-04-20 | Ulysses Esd, Inc. | System and method for secure software installation |
US6970849B1 (en) | 1999-12-17 | 2005-11-29 | Microsoft Corporation | Inter-server communication using request with encrypted parameter |
US6996720B1 (en) | 1999-12-17 | 2006-02-07 | Microsoft Corporation | System and method for accessing protected content in a rights-management architecture |
US7047411B1 (en) | 1999-12-17 | 2006-05-16 | Microsoft Corporation | Server for an electronic distribution system and method of operating same |
US7562395B2 (en) | 1999-12-17 | 2009-07-14 | Microsoft Corporation | System and method for accessing protected content in a rights-management architecture |
US8032943B2 (en) | 1999-12-17 | 2011-10-04 | Microsoft Corporation | Accessing protected content in a rights-management architecture |
US7707643B2 (en) | 1999-12-17 | 2010-04-27 | Microsoft Corporation | System and method for accessing protected content in a rights-management architecture |
US7356698B2 (en) | 2000-01-28 | 2008-04-08 | Advantest Corporation | Device authentication apparatus and method, and recorded medium on which device authentication program is recorded |
US7032113B2 (en) * | 2000-04-28 | 2006-04-18 | Moldflow Ireland, Ltd. | Network enabled application software system and method |
US7823208B2 (en) | 2000-06-27 | 2010-10-26 | Microsoft Corporation | Method and system for binding enhanced software features to a persona |
US7171692B1 (en) | 2000-06-27 | 2007-01-30 | Microsoft Corporation | Asynchronous communication within a server arrangement |
US7861306B2 (en) | 2000-06-27 | 2010-12-28 | Microsoft Corporation | Method and system for limiting the use of user-specific software features |
US7430542B2 (en) | 2000-06-27 | 2008-09-30 | Microsoft Corporation | System and method for activating a rendering device in a multi-level rights-management architecture |
US7958373B2 (en) | 2000-06-27 | 2011-06-07 | Microsoft Corporation | Secure repository with layers of tamper resistance and system and method for providing same |
US8417968B2 (en) | 2000-06-27 | 2013-04-09 | Microsoft Corporation | Secure repository with layers of tamper resistance and system and method for providing same |
US6981262B1 (en) | 2000-06-27 | 2005-12-27 | Microsoft Corporation | System and method for client interaction in a multi-level rights-management architecture |
WO2002001333A3 (fr) * | 2000-06-27 | 2003-09-25 | Microsoft Corp | Organe d'archivage sur personnalise, et systeme et procede de mise en oeuvre dudit organe d'archivage |
US7017189B1 (en) | 2000-06-27 | 2006-03-21 | Microsoft Corporation | System and method for activating a rendering device in a multi-level rights-management architecture |
US7539875B1 (en) | 2000-06-27 | 2009-05-26 | Microsoft Corporation | Secure repository with layers of tamper resistance and system and method for providing same |
WO2002001333A2 (fr) * | 2000-06-27 | 2002-01-03 | Microsoft Corporation | Organe d'archivage sur personnalise, et systeme et procede de mise en oeuvre dudit organe d'archivage |
US7051200B1 (en) | 2000-06-27 | 2006-05-23 | Microsoft Corporation | System and method for interfacing a software process to secure repositories |
WO2002003176A2 (fr) * | 2000-06-30 | 2002-01-10 | The Virtual Orchestra Company Limited | Utilisation de donnees de licence |
US7225159B2 (en) | 2000-06-30 | 2007-05-29 | Microsoft Corporation | Method for authenticating and securing integrated bookstore entries |
WO2002003176A3 (fr) * | 2000-06-30 | 2003-05-30 | Virtual Orchestra Company Ltd | Utilisation de donnees de licence |
CN100447773C (zh) * | 2000-07-20 | 2008-12-31 | 国际商业机器公司 | 在计算机销售端为购买的计算机安装程序的方法及系统 |
US7188342B2 (en) | 2001-04-20 | 2007-03-06 | Microsoft Corporation | Server controlled branding of client software deployed over computer networks |
WO2003021401A2 (fr) * | 2001-09-04 | 2003-03-13 | Imagination Technologies Limited | Systeme de texturation |
WO2003021401A3 (fr) * | 2001-09-04 | 2003-08-28 | Imagination Tech Ltd | Systeme de texturation |
EP1466230A1 (fr) * | 2001-12-11 | 2004-10-13 | Telia AB (publ) | Protection contre la copie en fonction de la localisation |
GB2409077B (en) * | 2002-09-21 | 2006-05-31 | Bitarts Ltd | Software protection |
GB2409077A (en) * | 2002-09-21 | 2005-06-15 | Bitarts Ltd | Software protection |
WO2004027678A2 (fr) * | 2002-09-21 | 2004-04-01 | Bitarts Limited | Protection de logiciel |
WO2004027678A3 (fr) * | 2002-09-21 | 2004-07-01 | Bitarts Ltd | Protection de logiciel |
WO2004057448A1 (fr) * | 2002-12-19 | 2004-07-08 | Allegroassai S.P.A. | Procede d'authentification d'un code de programme |
EP1471406A1 (fr) * | 2003-04-25 | 2004-10-27 | Culture.com Technology (Macau) Ltd | Procédé de vérification d'autorisation d'utilisation d'un livre électronique sur une plateforme d'information |
EP1560098A3 (fr) * | 2003-12-16 | 2005-08-10 | Microsoft Corporation | Méthode et système assurant l'installation ou l'exécution de mises à jour d'un logiciel seulement sur un appareil spécifique ou sur une catégorie d' appareils |
US7614051B2 (en) | 2003-12-16 | 2009-11-03 | Microsoft Corporation | Creating file systems within a file in a storage technology-abstracted manner |
US7568195B2 (en) | 2003-12-16 | 2009-07-28 | Microsoft Corporation | Determining a maximal set of dependent software updates valid for installation |
US7549148B2 (en) | 2003-12-16 | 2009-06-16 | Microsoft Corporation | Self-describing software image update components |
US7549042B2 (en) | 2003-12-16 | 2009-06-16 | Microsoft Corporation | Applying custom software image updates to non-volatile storage in a failsafe manner |
EP1729250A4 (fr) * | 2004-02-27 | 2008-07-23 | Bitwallet Inc | Dispositif de terminal, dispositif de serveur, méthode de contrôle de terminal, programme de terminal et support d'enregistrement |
EP1729250A1 (fr) * | 2004-02-27 | 2006-12-06 | Bitwallet Inc. | Dispositif de terminal, dispositif de serveur, méthode de contrôle de terminal, programme de terminal et support d'enregistrement |
CN100405321C (zh) * | 2005-01-20 | 2008-07-23 | 英业达股份有限公司 | 防止软件写入错误的方法 |
CN100410831C (zh) * | 2005-04-22 | 2008-08-13 | 联想(北京)有限公司 | 随机捆绑软件安装方法 |
EP2369518A1 (fr) * | 2010-03-08 | 2011-09-28 | Siemens Aktiengesellschaft | Système et procédé de protection de copie d'un bloc de logiciel |
EP2405377A1 (fr) * | 2010-07-09 | 2012-01-11 | Research In Motion Limited | Sécurisation d'un composant avant de fabriquer un dispositif |
US9032186B2 (en) | 2010-07-09 | 2015-05-12 | Blackberry Limited | Utilization of a microcode interpreter built in to a processor |
US9361107B2 (en) | 2010-07-09 | 2016-06-07 | Blackberry Limited | Microcode-based challenge/response process |
CN110443030A (zh) * | 2019-06-24 | 2019-11-12 | 维沃移动通信有限公司 | 一种权限处理方法及终端设备 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO1999026123A1 (fr) | Perfectionnements apportes a des systemes de protection de logiciel | |
KR100240324B1 (ko) | 실시권자 통지 시스템 | |
US7270193B2 (en) | Method and system for distributing programs using tamper resistant processor | |
US4864494A (en) | Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software | |
US10992480B2 (en) | Method and system for performing a transaction and for performing a verification of legitimate access to, or use of digital data | |
US6684198B1 (en) | Program data distribution via open network | |
US20110113235A1 (en) | PC Security Lock Device Using Permanent ID and Hidden Keys | |
US20030182584A1 (en) | Systems and methods for setting and resetting a password | |
US20040030911A1 (en) | Contents distribution scheme using tamper-resistant processor | |
US20050160049A1 (en) | Method and arrangement for protecting software | |
US20060106729A1 (en) | Method and apparatus for restricting use of a computer program | |
CA2285392A1 (fr) | Procede et systeme destines a une installation par le biais d'un reseau d'applications logicielles personnalisees, authentifiables et identifiables de maniere unique | |
JPH08335182A (ja) | ファイル保護システム及びそのファイル保護システムを用いたソフトウエア利用システム及びそのソフトウエア利用システムに用いられる記録媒体 | |
JP2001175468A (ja) | ソフトウエア使用制御方法とその装置 | |
JPH09282155A (ja) | 暗号認証機能の装備方法 | |
US11063766B2 (en) | Method and system for performing a transaction and for performing a verification of legitimate access to, or use of digital data | |
KR100361869B1 (ko) | 암호화키를 이용한 소프트웨어 설치 및 실행방법 | |
US20040255136A1 (en) | Method and device for protecting information against unauthorised use | |
JP2000330783A (ja) | ソフトウェア不正コピー防止システムおよびソフト不正コピー防止プログラムを記録した記録媒体 | |
US20090031430A1 (en) | Software activation control method | |
CN100410831C (zh) | 随机捆绑软件安装方法 | |
JPH1124916A (ja) | ソフトウェアライセンス管理装置および方法 | |
EP1436998B1 (fr) | Appareil et procede pour l'acces a un materiel a l'aide d'un registre securise verrouille par entite | |
KR100310445B1 (ko) | Pc 기반의 암호칩을 사용한 유.에스.비 보안모듈 제어방법 | |
KR20020051612A (ko) | 설치키 관리 서버를 이용한 소프트웨어 불법 사용 방지 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CN JP US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
122 | Ep: pct application non-entry in european phase |