WO1999026123A1 - Perfectionnements apportes a des systemes de protection de logiciel - Google Patents

Perfectionnements apportes a des systemes de protection de logiciel Download PDF

Info

Publication number
WO1999026123A1
WO1999026123A1 PCT/GB1998/003470 GB9803470W WO9926123A1 WO 1999026123 A1 WO1999026123 A1 WO 1999026123A1 GB 9803470 W GB9803470 W GB 9803470W WO 9926123 A1 WO9926123 A1 WO 9926123A1
Authority
WO
WIPO (PCT)
Prior art keywords
computer
program
identifier code
identifier
installation
Prior art date
Application number
PCT/GB1998/003470
Other languages
English (en)
Inventor
Christopher Benjamin Wakely
Original Assignee
Christopher Benjamin Wakely
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GBGB9724411.5A external-priority patent/GB9724411D0/en
Application filed by Christopher Benjamin Wakely filed Critical Christopher Benjamin Wakely
Publication of WO1999026123A1 publication Critical patent/WO1999026123A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • G06F2211/008Public Key, Asymmetric Key, Asymmetric Encryption

Definitions

  • the present invention concerns improvements relating to software
  • the "disenabling code” is obtained from identification information unique to the computer on which the software program is first run, this identification
  • PROM programmable logic array
  • a CD key or serial number is provided on the back of the CD
  • CD writers the copying of CD-ROMs is likely to increase.
  • serial number is hard coded into the software on the CD-
  • This registration number is then input by the user and the
  • the software can also be easily copied illegally onto many
  • the identifier is used to generate a key which is transferred
  • a remote location eg a central processing section.
  • the present invention aims to provide an improved software protection
  • the hard disk serial (or volume) number is readily readable by a security installation program running either from a CD-
  • the identifier code may also be, for
  • a writeable medium, copied may, for example, be performed by a routine written
  • a writeable storage medium e.g. a V/y
  • the encryption/decryption is performed by use of private
  • codes can be transmitted to the software manufacturer or supplier or other remote
  • supplier may be by voice or by electronic means using, for example, the signals
  • a modem link is established between the
  • a telephone network preferably via the internet so that the encryption and tagging
  • the decryption key will operate to verify that the
  • the user will be presented with a warning message regarding
  • the method of the present invention will provide a much higher level of
  • the supplier or manufacturer then combines and encrypts both the
  • CD-ROM blanks could be modified to include a small writeable section in which
  • the identifier code of the computer could be performed by the program itself. According to another aspect of the present invention there is provided a
  • the installer will need to register the software
  • the invention also extends to a combination of a system as described
  • Figure 1 is a schematic block diagram showing a system embodying the
  • FIG. 2 is a flow diagram showing the steps involved in the preferred embodiment
  • FIG. 3 is a flow diagram showing several alternative steps involved in
  • Figure 4 is a flow diagram showing the sequence of events when running
  • FIG. 1 there is shown a system 1 embodying the
  • the system 1 is that of a personal computer (PC).
  • the system 1 comprises a CD-ROM
  • optical reader device 3 for reading both the application program 2 and an
  • program 2 is supplied on the CD-ROM in compressed format, it is uncompressed
  • up program 4 includes a decryption key 5 which is described in detail hereinafter.
  • the serial number 7 acts as the identifier code for the system 1. Typically, such
  • serial numbers 7 are 32 bit numbers which can readily be accessed through the
  • DOS command 'VOL' which displays the number 7 in Hexadecimal format as an
  • a microprocessor 8 connected to both the CD-reader 3 and the data store
  • a display 9 for presenting messages to the user and a modem 10 for
  • the system 1 is connected via the telecommunications network 11 to the software program manufacturer's or supplier's encryption device 12.
  • the device is connected via the telecommunications network 11 to the software program manufacturer's or supplier's encryption device 12.
  • the hard disk drive 15 includes an authorisation
  • the first stage in the operation of the system 1 is to seek authorisation
  • the authorisation/set up program 4 is run at 20 and its first step is to read
  • the encrypted data (combined encrypted serial numbers) is
  • encryption device 12 is then broken at 26.
  • the encrypted data is decrypted at 27 using the decryption key 5.
  • program 2 is allowed to proceed at 30. Installation usually involves expansion
  • the present embodiment as described above uses a public/private
  • the public key is the decryption key 5 which is included in each copy of
  • the private key is the encryption key 17 which is
  • the comparison step 28, 29, as described above, requires the decryption
  • the hard disk serial number may be exclusively read with a
  • WANs such as ISDN or dedicated internet connections which do not
  • the hard disk serial number 7 is presented at 33 to the user on the display 9.
  • CD-ROM serial number is presented at 33 A to the user on the display 9 and the
  • the manufacturer then communicates the encrypted combined code to the user at 36.
  • Figure 4 is a flow diagram illustrating the sequence of events which occur
  • loaded application may then be run by the operator. If, on the other hand, the two
  • Public and private keys should be changed regularly, if possible for each new batch of CD-ROMs. Public and
  • private keys can be different for each geographical region that the program 2 is
  • CD-ROM CD-ROM.
  • the invention is applicable to software provided on conventional

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention concerne un procédé et un système visant à éviter l'installation ou l'exécution pirate d'un programme sur un ordinateur. Ledit procédé consiste à lire (21) d'une part un code d'identification associé à l'ordinateur, à savoir, de préférence, le numéro de série (7) du disque dur, et d'autre part un code d'identification associé au programme. Ce numéro (7) est envoyé (23, 34) à un tiers (par exemple, le fabricant de logiciels), chez qui les codes d'identification sont combinés et cryptés (25, 35) au moyen d'une clef de cryptage (17) privée. Les données cryptées relatives aux codes d'identification combinés sont reçues par l'ordinateur, et sont décryptées (27) au moyen d'une clef de décryptage (5) publique enregistrée. L'installation du programme est rendue impossible (31) si le code d'identification (7) de l'ordinateur ne présente aucune équivalence directe ou indirecte avec les données décryptées.
PCT/GB1998/003470 1997-11-18 1998-11-18 Perfectionnements apportes a des systemes de protection de logiciel WO1999026123A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
GBGB9724411.5A GB9724411D0 (en) 1997-11-18 1997-11-18 Improvements relating to software protection systems
GB9724411.5 1997-11-18
GBGB9804503.2A GB9804503D0 (en) 1997-11-18 1998-03-03 Improvements relating to software protection systems
GB9804503.2 1998-03-03

Publications (1)

Publication Number Publication Date
WO1999026123A1 true WO1999026123A1 (fr) 1999-05-27

Family

ID=26312622

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1998/003470 WO1999026123A1 (fr) 1997-11-18 1998-11-18 Perfectionnements apportes a des systemes de protection de logiciel

Country Status (1)

Country Link
WO (1) WO1999026123A1 (fr)

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6169976B1 (en) * 1998-07-02 2001-01-02 Encommerce, Inc. Method and apparatus for regulating the use of licensed products
WO2001004730A1 (fr) * 1999-07-13 2001-01-18 Infinia Ip Ltd Identification d'ordinateurs
WO2002001333A2 (fr) * 2000-06-27 2002-01-03 Microsoft Corporation Organe d'archivage sur personnalise, et systeme et procede de mise en oeuvre dudit organe d'archivage
WO2002003176A2 (fr) * 2000-06-30 2002-01-10 The Virtual Orchestra Company Limited Utilisation de donnees de licence
WO2003021401A2 (fr) * 2001-09-04 2003-03-13 Imagination Technologies Limited Systeme de texturation
US6681212B1 (en) 1999-04-23 2004-01-20 Nianning Zeng Internet-based automated system and a method for software copyright protection and sales
WO2004027678A2 (fr) * 2002-09-21 2004-04-01 Bitarts Limited Protection de logiciel
US6725205B1 (en) * 1999-12-02 2004-04-20 Ulysses Esd, Inc. System and method for secure software installation
WO2004057448A1 (fr) * 2002-12-19 2004-07-08 Allegroassai S.P.A. Procede d'authentification d'un code de programme
EP1466230A1 (fr) * 2001-12-11 2004-10-13 Telia AB (publ) Protection contre la copie en fonction de la localisation
EP1471406A1 (fr) * 2003-04-25 2004-10-27 Culture.com Technology (Macau) Ltd Procédé de vérification d'autorisation d'utilisation d'un livre électronique sur une plateforme d'information
EP1560098A3 (fr) * 2003-12-16 2005-08-10 Microsoft Corporation Méthode et système assurant l'installation ou l'exécution de mises à jour d'un logiciel seulement sur un appareil spécifique ou sur une catégorie d' appareils
US6970849B1 (en) 1999-12-17 2005-11-29 Microsoft Corporation Inter-server communication using request with encrypted parameter
US6981262B1 (en) 2000-06-27 2005-12-27 Microsoft Corporation System and method for client interaction in a multi-level rights-management architecture
US6996720B1 (en) 1999-12-17 2006-02-07 Microsoft Corporation System and method for accessing protected content in a rights-management architecture
US7017189B1 (en) 2000-06-27 2006-03-21 Microsoft Corporation System and method for activating a rendering device in a multi-level rights-management architecture
US7032113B2 (en) * 2000-04-28 2006-04-18 Moldflow Ireland, Ltd. Network enabled application software system and method
US7047411B1 (en) 1999-12-17 2006-05-16 Microsoft Corporation Server for an electronic distribution system and method of operating same
US7051200B1 (en) 2000-06-27 2006-05-23 Microsoft Corporation System and method for interfacing a software process to secure repositories
EP1729250A1 (fr) * 2004-02-27 2006-12-06 Bitwallet Inc. Dispositif de terminal, dispositif de serveur, méthode de contrôle de terminal, programme de terminal et support d'enregistrement
US7171692B1 (en) 2000-06-27 2007-01-30 Microsoft Corporation Asynchronous communication within a server arrangement
US7188342B2 (en) 2001-04-20 2007-03-06 Microsoft Corporation Server controlled branding of client software deployed over computer networks
US7225159B2 (en) 2000-06-30 2007-05-29 Microsoft Corporation Method for authenticating and securing integrated bookstore entries
US7356698B2 (en) 2000-01-28 2008-04-08 Advantest Corporation Device authentication apparatus and method, and recorded medium on which device authentication program is recorded
CN100405321C (zh) * 2005-01-20 2008-07-23 英业达股份有限公司 防止软件写入错误的方法
CN100410831C (zh) * 2005-04-22 2008-08-13 联想(北京)有限公司 随机捆绑软件安装方法
CN100447773C (zh) * 2000-07-20 2008-12-31 国际商业机器公司 在计算机销售端为购买的计算机安装程序的方法及系统
US7539875B1 (en) 2000-06-27 2009-05-26 Microsoft Corporation Secure repository with layers of tamper resistance and system and method for providing same
US7549042B2 (en) 2003-12-16 2009-06-16 Microsoft Corporation Applying custom software image updates to non-volatile storage in a failsafe manner
US7549148B2 (en) 2003-12-16 2009-06-16 Microsoft Corporation Self-describing software image update components
US7568195B2 (en) 2003-12-16 2009-07-28 Microsoft Corporation Determining a maximal set of dependent software updates valid for installation
US7614051B2 (en) 2003-12-16 2009-11-03 Microsoft Corporation Creating file systems within a file in a storage technology-abstracted manner
US7823208B2 (en) 2000-06-27 2010-10-26 Microsoft Corporation Method and system for binding enhanced software features to a persona
US7861306B2 (en) 2000-06-27 2010-12-28 Microsoft Corporation Method and system for limiting the use of user-specific software features
EP2369518A1 (fr) * 2010-03-08 2011-09-28 Siemens Aktiengesellschaft Système et procédé de protection de copie d'un bloc de logiciel
EP2405377A1 (fr) * 2010-07-09 2012-01-11 Research In Motion Limited Sécurisation d'un composant avant de fabriquer un dispositif
US9032186B2 (en) 2010-07-09 2015-05-12 Blackberry Limited Utilization of a microcode interpreter built in to a processor
US9361107B2 (en) 2010-07-09 2016-06-07 Blackberry Limited Microcode-based challenge/response process
CN110443030A (zh) * 2019-06-24 2019-11-12 维沃移动通信有限公司 一种权限处理方法及终端设备

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5113518A (en) * 1988-06-03 1992-05-12 Durst Jr Robert T Method and system for preventing unauthorized use of software
WO1995035533A1 (fr) * 1994-06-17 1995-12-28 Megalode Corporation Procede pour empecher l'utilisation d'un logiciel sur un ordinateur non autorise

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5113518A (en) * 1988-06-03 1992-05-12 Durst Jr Robert T Method and system for preventing unauthorized use of software
WO1995035533A1 (fr) * 1994-06-17 1995-12-28 Megalode Corporation Procede pour empecher l'utilisation d'un logiciel sur un ordinateur non autorise

Cited By (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6169976B1 (en) * 1998-07-02 2001-01-02 Encommerce, Inc. Method and apparatus for regulating the use of licensed products
US6681212B1 (en) 1999-04-23 2004-01-20 Nianning Zeng Internet-based automated system and a method for software copyright protection and sales
WO2001004730A1 (fr) * 1999-07-13 2001-01-18 Infinia Ip Ltd Identification d'ordinateurs
AU777631B2 (en) * 1999-07-13 2004-10-21 Fusion Holdings Limited Identification of computers
US6725205B1 (en) * 1999-12-02 2004-04-20 Ulysses Esd, Inc. System and method for secure software installation
US6970849B1 (en) 1999-12-17 2005-11-29 Microsoft Corporation Inter-server communication using request with encrypted parameter
US6996720B1 (en) 1999-12-17 2006-02-07 Microsoft Corporation System and method for accessing protected content in a rights-management architecture
US7047411B1 (en) 1999-12-17 2006-05-16 Microsoft Corporation Server for an electronic distribution system and method of operating same
US7562395B2 (en) 1999-12-17 2009-07-14 Microsoft Corporation System and method for accessing protected content in a rights-management architecture
US8032943B2 (en) 1999-12-17 2011-10-04 Microsoft Corporation Accessing protected content in a rights-management architecture
US7707643B2 (en) 1999-12-17 2010-04-27 Microsoft Corporation System and method for accessing protected content in a rights-management architecture
US7356698B2 (en) 2000-01-28 2008-04-08 Advantest Corporation Device authentication apparatus and method, and recorded medium on which device authentication program is recorded
US7032113B2 (en) * 2000-04-28 2006-04-18 Moldflow Ireland, Ltd. Network enabled application software system and method
US7823208B2 (en) 2000-06-27 2010-10-26 Microsoft Corporation Method and system for binding enhanced software features to a persona
US7171692B1 (en) 2000-06-27 2007-01-30 Microsoft Corporation Asynchronous communication within a server arrangement
US7861306B2 (en) 2000-06-27 2010-12-28 Microsoft Corporation Method and system for limiting the use of user-specific software features
US7430542B2 (en) 2000-06-27 2008-09-30 Microsoft Corporation System and method for activating a rendering device in a multi-level rights-management architecture
US7958373B2 (en) 2000-06-27 2011-06-07 Microsoft Corporation Secure repository with layers of tamper resistance and system and method for providing same
US8417968B2 (en) 2000-06-27 2013-04-09 Microsoft Corporation Secure repository with layers of tamper resistance and system and method for providing same
US6981262B1 (en) 2000-06-27 2005-12-27 Microsoft Corporation System and method for client interaction in a multi-level rights-management architecture
WO2002001333A3 (fr) * 2000-06-27 2003-09-25 Microsoft Corp Organe d'archivage sur personnalise, et systeme et procede de mise en oeuvre dudit organe d'archivage
US7017189B1 (en) 2000-06-27 2006-03-21 Microsoft Corporation System and method for activating a rendering device in a multi-level rights-management architecture
US7539875B1 (en) 2000-06-27 2009-05-26 Microsoft Corporation Secure repository with layers of tamper resistance and system and method for providing same
WO2002001333A2 (fr) * 2000-06-27 2002-01-03 Microsoft Corporation Organe d'archivage sur personnalise, et systeme et procede de mise en oeuvre dudit organe d'archivage
US7051200B1 (en) 2000-06-27 2006-05-23 Microsoft Corporation System and method for interfacing a software process to secure repositories
WO2002003176A2 (fr) * 2000-06-30 2002-01-10 The Virtual Orchestra Company Limited Utilisation de donnees de licence
US7225159B2 (en) 2000-06-30 2007-05-29 Microsoft Corporation Method for authenticating and securing integrated bookstore entries
WO2002003176A3 (fr) * 2000-06-30 2003-05-30 Virtual Orchestra Company Ltd Utilisation de donnees de licence
CN100447773C (zh) * 2000-07-20 2008-12-31 国际商业机器公司 在计算机销售端为购买的计算机安装程序的方法及系统
US7188342B2 (en) 2001-04-20 2007-03-06 Microsoft Corporation Server controlled branding of client software deployed over computer networks
WO2003021401A2 (fr) * 2001-09-04 2003-03-13 Imagination Technologies Limited Systeme de texturation
WO2003021401A3 (fr) * 2001-09-04 2003-08-28 Imagination Tech Ltd Systeme de texturation
EP1466230A1 (fr) * 2001-12-11 2004-10-13 Telia AB (publ) Protection contre la copie en fonction de la localisation
GB2409077B (en) * 2002-09-21 2006-05-31 Bitarts Ltd Software protection
GB2409077A (en) * 2002-09-21 2005-06-15 Bitarts Ltd Software protection
WO2004027678A2 (fr) * 2002-09-21 2004-04-01 Bitarts Limited Protection de logiciel
WO2004027678A3 (fr) * 2002-09-21 2004-07-01 Bitarts Ltd Protection de logiciel
WO2004057448A1 (fr) * 2002-12-19 2004-07-08 Allegroassai S.P.A. Procede d'authentification d'un code de programme
EP1471406A1 (fr) * 2003-04-25 2004-10-27 Culture.com Technology (Macau) Ltd Procédé de vérification d'autorisation d'utilisation d'un livre électronique sur une plateforme d'information
EP1560098A3 (fr) * 2003-12-16 2005-08-10 Microsoft Corporation Méthode et système assurant l'installation ou l'exécution de mises à jour d'un logiciel seulement sur un appareil spécifique ou sur une catégorie d' appareils
US7614051B2 (en) 2003-12-16 2009-11-03 Microsoft Corporation Creating file systems within a file in a storage technology-abstracted manner
US7568195B2 (en) 2003-12-16 2009-07-28 Microsoft Corporation Determining a maximal set of dependent software updates valid for installation
US7549148B2 (en) 2003-12-16 2009-06-16 Microsoft Corporation Self-describing software image update components
US7549042B2 (en) 2003-12-16 2009-06-16 Microsoft Corporation Applying custom software image updates to non-volatile storage in a failsafe manner
EP1729250A4 (fr) * 2004-02-27 2008-07-23 Bitwallet Inc Dispositif de terminal, dispositif de serveur, méthode de contrôle de terminal, programme de terminal et support d'enregistrement
EP1729250A1 (fr) * 2004-02-27 2006-12-06 Bitwallet Inc. Dispositif de terminal, dispositif de serveur, méthode de contrôle de terminal, programme de terminal et support d'enregistrement
CN100405321C (zh) * 2005-01-20 2008-07-23 英业达股份有限公司 防止软件写入错误的方法
CN100410831C (zh) * 2005-04-22 2008-08-13 联想(北京)有限公司 随机捆绑软件安装方法
EP2369518A1 (fr) * 2010-03-08 2011-09-28 Siemens Aktiengesellschaft Système et procédé de protection de copie d'un bloc de logiciel
EP2405377A1 (fr) * 2010-07-09 2012-01-11 Research In Motion Limited Sécurisation d'un composant avant de fabriquer un dispositif
US9032186B2 (en) 2010-07-09 2015-05-12 Blackberry Limited Utilization of a microcode interpreter built in to a processor
US9361107B2 (en) 2010-07-09 2016-06-07 Blackberry Limited Microcode-based challenge/response process
CN110443030A (zh) * 2019-06-24 2019-11-12 维沃移动通信有限公司 一种权限处理方法及终端设备

Similar Documents

Publication Publication Date Title
WO1999026123A1 (fr) Perfectionnements apportes a des systemes de protection de logiciel
KR100240324B1 (ko) 실시권자 통지 시스템
US7270193B2 (en) Method and system for distributing programs using tamper resistant processor
US4864494A (en) Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software
US10992480B2 (en) Method and system for performing a transaction and for performing a verification of legitimate access to, or use of digital data
US6684198B1 (en) Program data distribution via open network
US20110113235A1 (en) PC Security Lock Device Using Permanent ID and Hidden Keys
US20030182584A1 (en) Systems and methods for setting and resetting a password
US20040030911A1 (en) Contents distribution scheme using tamper-resistant processor
US20050160049A1 (en) Method and arrangement for protecting software
US20060106729A1 (en) Method and apparatus for restricting use of a computer program
CA2285392A1 (fr) Procede et systeme destines a une installation par le biais d'un reseau d'applications logicielles personnalisees, authentifiables et identifiables de maniere unique
JPH08335182A (ja) ファイル保護システム及びそのファイル保護システムを用いたソフトウエア利用システム及びそのソフトウエア利用システムに用いられる記録媒体
JP2001175468A (ja) ソフトウエア使用制御方法とその装置
JPH09282155A (ja) 暗号認証機能の装備方法
US11063766B2 (en) Method and system for performing a transaction and for performing a verification of legitimate access to, or use of digital data
KR100361869B1 (ko) 암호화키를 이용한 소프트웨어 설치 및 실행방법
US20040255136A1 (en) Method and device for protecting information against unauthorised use
JP2000330783A (ja) ソフトウェア不正コピー防止システムおよびソフト不正コピー防止プログラムを記録した記録媒体
US20090031430A1 (en) Software activation control method
CN100410831C (zh) 随机捆绑软件安装方法
JPH1124916A (ja) ソフトウェアライセンス管理装置および方法
EP1436998B1 (fr) Appareil et procede pour l'acces a un materiel a l'aide d'un registre securise verrouille par entite
KR100310445B1 (ko) Pc 기반의 암호칩을 사용한 유.에스.비 보안모듈 제어방법
KR20020051612A (ko) 설치키 관리 서버를 이용한 소프트웨어 불법 사용 방지 방법

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): CN JP US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase