WO2000043867A1 - Procede permettant d'empecher l'utilisation illicite d'un logiciel informatique et des supports d'enregistrement d'un logiciel informatique - Google Patents

Procede permettant d'empecher l'utilisation illicite d'un logiciel informatique et des supports d'enregistrement d'un logiciel informatique Download PDF

Info

Publication number
WO2000043867A1
WO2000043867A1 PCT/JP1999/000218 JP9900218W WO0043867A1 WO 2000043867 A1 WO2000043867 A1 WO 2000043867A1 JP 9900218 W JP9900218 W JP 9900218W WO 0043867 A1 WO0043867 A1 WO 0043867A1
Authority
WO
WIPO (PCT)
Prior art keywords
serial number
password
computer software
user
hardware
Prior art date
Application number
PCT/JP1999/000218
Other languages
English (en)
Japanese (ja)
Inventor
Kenzi Kumasaka
Original Assignee
Kenzi Kumasaka
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kenzi Kumasaka filed Critical Kenzi Kumasaka
Priority to PCT/JP1999/000218 priority Critical patent/WO2000043867A1/fr
Priority to AU19832/99A priority patent/AU1983299A/en
Publication of WO2000043867A1 publication Critical patent/WO2000043867A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Definitions

  • the computer software is installed in a plurality of different consoles (hardware), or the recording medium is duplicated.
  • This is a method for preventing the so-called illegal use of computer software, such as using it on multiple different pieces of hardware.
  • a magnetic recording medium such as a floppy disk 1 or a magneto-optical disk as shown in FIG. 7 (a), or a read-only CD as shown in FIG. 7 (b).
  • optical recording media such as ROM 2 and writable CDR.
  • an installer or the like recorded on a recording medium is used to copy (install) the recording medium to hardware such as a hard disk of a computer. Start from duer.
  • the installation software has a large capacity and it is difficult to install the software on the hardware
  • the computer software is directly read from the recording medium and started without installing the computer software on the hardware.
  • the above-mentioned computer software is sold on the condition that one product is used in one convenience store (hardware).
  • installation in a plurality of different convenience stores (hardware) is required. Since it is possible, one product is used in several places and one door.
  • a combi-software that reads and starts directly from a recording medium without installing it on a hard disk, by duplicating this recording medium, it can be used with multiple different hardware. It is.
  • the installation software recorded on an authorized recording medium is installed on a plurality of different hardware, or the recording medium is duplicated, and a plurality of different recording media are used depending on the duplicated recording medium. It is an object of the present invention to provide an illegal use prevention method and a recording medium on which the combination software is recorded, which can forcibly prevent the activation of the combination software in the hardware.
  • the installation of the computer software recorded on the recording medium is started, first, in the hardware on which the combination software is installed, a product serial number assigned to the recording medium and the hardware The product serial number and the volume serial number are read to the user, and the user is notified of the product serial number and the volume serial number. A knowledge pass code is generated.
  • volume serial number is assigned automatically by the formatting software at the time of formatting the hardware.
  • an encrypted anonymous password is formed from the volume serial number and the product serial number, the anonymous password will be transmitted between the recording medium used for installation and the single hardware at the installation destination. , And will be generated uniquely for the identified relationship.
  • the user notifies the volume serial number and the product serial number notified by the hardware to, for example, a management center provided at the product distributor.
  • the management center uses the product serial number and the volume serial number sent from the user to generate an encrypted return password based on the same method as the method of generating an anonymous password in the hardware. Generate and return this return password to the user.
  • the unrecognized passcode is generated in the hardware as described above, and a return passcode is required to be input.
  • the return password is compared with the unannounced password generated in the hardware, and only when the two match, the installation of the compilation software is permitted.
  • an unannounced password encrypted based on the unique volume serial number of the installation destination is generated, and a return password corresponding to the unannounced password is transmitted from the user at the management center. Since it is generated based on the volume serial number and product serial number received and sent back to the user, the recording medium and the hardware at the installation destination are obtained from these volume serial number and product serial number. Will be identified and these combinations will be recorded in the management center.
  • the present invention when the computer software is started directly from the recording medium, after the notification password is generated from the volume serial number and the product serial number, the return password acquired by the user from the management center is used. Input is required.
  • the activation of the computer software is permitted only when the input return password matches the unannounced password generated in the hardware.
  • one Another feature is that multiple different return passwords can be generated for a product serial number by setting an upper limit.
  • various communication means such as telephone, fax, mail, in-net, wireless, and e-mail can be used. is there.
  • a volume serial number of a hard disk mounted on a computer is typified. However, instead of this, manufacturing of a CPU, a network board, or a base board is performed.
  • the hardware may be specified using a number.
  • the above-mentioned computer includes a game machine and the like.
  • the computer may be any device that can use the software.
  • FIG. 1 is a schematic diagram showing a system configuration for implementing the present invention.
  • FIG. 2 is a schematic diagram showing a system configuration for implementing the present invention.
  • FIG. 3 is a processing flowchart in the first embodiment of the present invention.
  • FIG. 4 is an information processing flow chart between the user and the management center in the first embodiment of the present invention.
  • FIG. 5 is a processing flowchart in the second embodiment of the present invention.
  • FIG. 6 is a processing flowchart in the third embodiment of the present invention.
  • FIG. 7 is a schematic diagram showing a general recording medium.
  • the recording medium used in the present invention is a floppy disk as shown in FIG. Disk 1 and CD-ROM2 are used.
  • a system for implementing the first embodiment of the present invention is roughly divided into a user 3 and a management center 4 provided at a product distributor or the like.
  • the recording medium in the following description, it is described as CD-R ⁇ M2
  • the hardware computer
  • the hard disk 5 includes a hard disk 6 as a built-in writable recording medium, a display 7 for displaying an execution state of computer software, and a CD-ROM drive 8 for reading the CD-ROM 2.
  • a floppy disk drive 9 for reading and writing the floppy disk 1 is provided.
  • the CD-ROM 2 is provided with a product serial number assigned at the time of product shipment; The information of the serial number ABC is recorded together with the installation software installer, and the hard disk 6 is provided with a volume serial number, VSN, which is randomly and automatically assigned at the time of formatting. ing.
  • VSN volume serial number
  • the installer reads the product serial number; ABC, and reads the volume serial number of the hard disk 6; VSN, and reads these product serial numbers; ABC and volume serial numbers; VSN Is displayed on the display 7 to notify the user 3, and the product serial number; ABC and volume serial number; After storing and displaying the product serial number; ABC and volume serial number; VSN, it is required to input a return path PD2 described later.
  • the return password PD 2 is used by the user 3 to display the product serial number; ABC and volume serial number; VSN displayed on the display 7. As shown in Fig. 1, they are obtained by sending them to the management center 4 by telephone 10 or the like and returning them from the management center 14 as shown in Fig. 1.
  • the same return path path PD2 as the anonymous path path PD1 is generated by a method similar to the encryption method recorded on the CD-ROM 2, and then returned to the user 3.
  • step S1 it is determined whether or not the product serial number; ABC recorded on CD-ROM 2 has been read. Then, the process proceeds to the next step S2.
  • step S2 a determination is made as to whether or not the volume serial number assigned to the hard disk 6; VSN has been read. On condition that the VSN has been read, the process proceeds to the next step S3, where the product The serial number; ABC and volume serial number; VSN are displayed on the display 7, whereby the product serial number; ABC and volume serial number; VSN are notified to the user 3, and the next step S In 4, an encryption program generates a specific unannounced password PD1 from the product serial number; ABC, volume serial number, and VSN.
  • the notification to the user 3 can be made not only by the display on the display 7 but also by printing or by voice.
  • the notification password PD 1 generated as described above is stored as installation information, for example, in the installer, and the notification to the user 3 is not performed.
  • step S4 an encrypted return password PD2 corresponding to the product serial number; ABC and volume serial number; VSN is generated by a program similar to the encryption program used in step S4.
  • the PD 2 is returned to User 3.
  • the unannounced password PD1 generated in the hardware 5 and the return password PD2 generated in the management center 4 are the product serial number from which they are based; ABC and the volume serial number; VSN Are the same, the paths are completely the same.
  • step S4 when the unannounced password PD1 is generated in step S4, the process proceeds to the next step S5, where the presence or absence of the input of the return path guide PD2 is confirmed. The process proceeds to the next step S6 on condition that the input has been made.
  • step S6 it is determined whether or not the notification path PD1 generated in the hardware 5 matches the input return path PD2. Goes to step S7 to perform the installation, and if the two are different, stop the installation.
  • step SI1 it is determined whether or not the product serial number; ABC and volume serial number; VSN transmitted from the user 3 on the display 7 have been transmitted. Go to step S12 of the product serial number; Is determined.
  • step S12 If it is determined in step S12 that this is the first request for the return password PD2 to the product serial number; ABC, the process proceeds to step S13, where the product serial number is entered. After an encrypted return path PD2 corresponding to ABC and volume serial number; VSN is generated, the process proceeds to the next step S14.
  • step S14 after the product serial number; ABC, volume serial number; VSN, and return password PD2 are recorded and saved in the management center 4, the process proceeds to the next step S15.
  • the return password PD2 is returned to the user 3, and the process is terminated.
  • step S12 determines whether the request is for the second or more return path PD2 for the product serial number ABC. If it is determined in step S12 that the request is for the second or more return path PD2 for the product serial number ABC, the process proceeds to step S16, where the request is transmitted.
  • Volume serial number; VSN is the product serial number sent at the same time; ABC is first combined with the volume serial number that generated the first return password PD2; If they match, it is determined that the installation is legitimate installation on the same hardware 5, and the process proceeds to step S13 and subsequent steps.If they do not match, it is determined that the installation is illegal. If determined, the process proceeds to the next step S17, in which information indicating that a return password cannot be generated is returned to the user 3, and the process is terminated.
  • the volume serial number of the different hardware 5 is different, so that the CD- Product serial number of ROM2; ABC is common, but volume serial number of hardware 5 to be installed; VSN 2SNVolume serial number of first hardware 5; VSN, which is generated in hardware 5
  • the unannounced password PD1 differs from the return password PD2 initially obtained from the management center 14, and as a result, installation on other hardware 5 is prevented.
  • the official product serial number; ABC and the volume serial number of the different hardware 5; VSN are transmitted to the management center 4, and In order to obtain a new return password PD2, in the management center 4, the hardware 5.
  • the hardware 5 first installed from the CD-ROM 2 with the product serial number; Volume serial number; recorded by VSN, volume serial number recorded in this management center 4; VSN ⁇ volume serial number transmitted; VSN, indicating that the installation was incorrect. Judgment is made, and the creation and return of a new return password PD1 is rejected.
  • the CD-ROM 2 is duplicated and installed in a plurality of different hardware 5.
  • steps S 21 to S 26 are the same as steps S 1 to S 8 shown in FIG. 3, respectively.
  • Step S 7 is replaced with step S 27, and step S 8 is performed.
  • steps S31 to S36 are the same processing as steps S11 to S16 of FIG. 4, and the volume serial number transmitted in step S36 VSN is the serial number of the product; the volume serial number that was first combined with ABC to generate the first return pass PD2; with changes to the processing if it did not match the VSN .
  • step S37 If it is determined in step S37 that the number of generations of the return path guide PD2 is equal to or less than the predetermined number N, the process proceeds to the next step S38, where the transmitted product serial number; After a return path PDn different from the previous one encrypted from the VSN is generated from the volume serial number, the process proceeds to the next step S39, where the return path PDn is returned to the user 3. To end the process.
  • step S40 If it is determined that the number of generations of the different return path code PD2 for one specific product serial number; ABC has exceeded the predetermined number N, the process proceeds to step S40, and information indicating that the return path code cannot be generated. Is returned to user 3 and the process ends.
  • the present invention when a recording medium on which computer software is recorded is sold, installation on a plurality of different hardware using this recording medium and different hardware based on the copied recording medium are performed. Installation of the software on the storage medium, or running the computer software recorded on the storage medium directly from the storage medium, or using the combination software used in a form that captures the data This prevents booting with different hardware and ensures that illegal use of computer software is prevented.

Abstract

Dans la présente invention, lorsque démarre la procédure d'installation d'un logiciel informatique, le numéro de série des supports d'enregistrement du produit et le numéro de série de volume propre du matériel sont lus. Ces numéros de série sont présentés à l'utilisateur et simultanément, ils sont utilisés pour créer un mot de passe chiffré qui n'est pas porté à la connaissance de l'utilisateur. Lorsque le centre de gestion reçoit le numéro de série de volume propre (VSN) et le numéro de série du produit, il délivre à l'utilisateur un mot de passe chiffré en fonction de ces informations. Si le mot de passe délivré coïncide avec le mot de passe chiffré généré par le matériel, l'installation du logiciel est autorisée.
PCT/JP1999/000218 1999-01-21 1999-01-21 Procede permettant d'empecher l'utilisation illicite d'un logiciel informatique et des supports d'enregistrement d'un logiciel informatique WO2000043867A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/JP1999/000218 WO2000043867A1 (fr) 1999-01-21 1999-01-21 Procede permettant d'empecher l'utilisation illicite d'un logiciel informatique et des supports d'enregistrement d'un logiciel informatique
AU19832/99A AU1983299A (en) 1999-01-21 1999-01-21 Method of preventing illegal use of computer software, and recording media of computer software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP1999/000218 WO2000043867A1 (fr) 1999-01-21 1999-01-21 Procede permettant d'empecher l'utilisation illicite d'un logiciel informatique et des supports d'enregistrement d'un logiciel informatique

Publications (1)

Publication Number Publication Date
WO2000043867A1 true WO2000043867A1 (fr) 2000-07-27

Family

ID=14234770

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP1999/000218 WO2000043867A1 (fr) 1999-01-21 1999-01-21 Procede permettant d'empecher l'utilisation illicite d'un logiciel informatique et des supports d'enregistrement d'un logiciel informatique

Country Status (2)

Country Link
AU (1) AU1983299A (fr)
WO (1) WO2000043867A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002099343A (ja) * 2000-09-25 2002-04-05 Metemu:Kk コンピュータソフトウエア不正使用防止方法及びシステム並びにプログラムを記録した記録媒体
JP2003085143A (ja) * 2001-09-11 2003-03-20 Sony Corp パスワード管理システム、パスワード管理方法、および情報処理装置、並びにコンピュータ・プログラム
WO2005085973A1 (fr) * 2004-03-04 2005-09-15 Nec Corporation Systeme de mise a jour de donnees, procede de mise a jour de donnees, programme de mise a jour de donnees et systeme robot
JP6032772B1 (ja) * 2015-09-11 2016-11-30 ニチユ三菱フォークリフト株式会社 動作制限装置、車両、パスワード生成装置、管理システム、動作制限方法及び動作制限プログラム

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07200492A (ja) * 1993-12-29 1995-08-04 Csk Corp ネットワーク上のソフトウェア使用権管理システム
JPH08278879A (ja) * 1995-04-06 1996-10-22 Hitachi Ltd ソフトウェア・インストールシステム
JPH0926875A (ja) * 1995-07-11 1997-01-28 Fujitsu Ltd ソフトウェア不正使用防止機能を備えた記憶媒体、コンピュータ及びコンピュータシステム
JPH0969045A (ja) * 1995-08-31 1997-03-11 Canon Inc 情報処理装置及び方法
JPH0981382A (ja) * 1995-09-19 1997-03-28 Gajietsuto:Kk コンピュータソフトウエア不正コピー使用防止方法及び同防止システム
JPH0991132A (ja) * 1995-09-20 1997-04-04 Fujitsu Ltd エラー情報通知システム

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07200492A (ja) * 1993-12-29 1995-08-04 Csk Corp ネットワーク上のソフトウェア使用権管理システム
JPH08278879A (ja) * 1995-04-06 1996-10-22 Hitachi Ltd ソフトウェア・インストールシステム
JPH0926875A (ja) * 1995-07-11 1997-01-28 Fujitsu Ltd ソフトウェア不正使用防止機能を備えた記憶媒体、コンピュータ及びコンピュータシステム
JPH0969045A (ja) * 1995-08-31 1997-03-11 Canon Inc 情報処理装置及び方法
JPH0981382A (ja) * 1995-09-19 1997-03-28 Gajietsuto:Kk コンピュータソフトウエア不正コピー使用防止方法及び同防止システム
JPH0991132A (ja) * 1995-09-20 1997-04-04 Fujitsu Ltd エラー情報通知システム

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002099343A (ja) * 2000-09-25 2002-04-05 Metemu:Kk コンピュータソフトウエア不正使用防止方法及びシステム並びにプログラムを記録した記録媒体
JP2003085143A (ja) * 2001-09-11 2003-03-20 Sony Corp パスワード管理システム、パスワード管理方法、および情報処理装置、並びにコンピュータ・プログラム
WO2005085973A1 (fr) * 2004-03-04 2005-09-15 Nec Corporation Systeme de mise a jour de donnees, procede de mise a jour de donnees, programme de mise a jour de donnees et systeme robot
KR100914568B1 (ko) * 2004-03-04 2009-08-31 닛본 덴끼 가부시끼가이샤 데이터 갱신 시스템, 데이터 갱신 방법, 및 데이터 갱신 프로그램을 기록한 기록 매체, 데이터 제공 장치, 로봇 장치 및 로봇 시스템
US7600119B2 (en) 2004-03-04 2009-10-06 Nec Corporation Data update system, data update method, data update program, and robot system
JP6032772B1 (ja) * 2015-09-11 2016-11-30 ニチユ三菱フォークリフト株式会社 動作制限装置、車両、パスワード生成装置、管理システム、動作制限方法及び動作制限プログラム

Also Published As

Publication number Publication date
AU1983299A (en) 2000-08-07

Similar Documents

Publication Publication Date Title
US8443455B2 (en) Apparatus, method, and computer program for controlling use of a content
US5935246A (en) Electronic copy protection mechanism using challenge and response to prevent unauthorized execution of software
AU767286B2 (en) Methods and apparatus for protecting information
KR100240324B1 (ko) 실시권자 통지 시스템
US7962417B2 (en) System and method for distributing protected information
US7209901B2 (en) Method for selling, protecting, and redistributing digital goods
JP4610557B2 (ja) データ管理方法、そのプログラム及びプログラムの記録媒体
JP2002373029A (ja) Icタグによるソフトウェアの不正コピーの防止方法
US10586221B1 (en) Regulating access to content using a multitiered rule base
US20100229000A1 (en) Software copyright protection and licensing system using rfid
WO2002059894A1 (fr) Support d'enregistrement, dispositif de traitement d'informations, serveur de distribution de contenu, procede, programme et son support d'enregistrement
JP2001216357A (ja) ソフトウェアのライセンス管理方法および電子機器並びに記録媒体
JP5484168B2 (ja) 電子コンテント処理システム、電子コンテント処理方法、電子コンテントのパッケージおよび利用許諾装置
JPH10207779A (ja) デジタル情報管理システム、端末装置、情報管理センタ及びデジタル情報管理方法
JP2002351569A (ja) ソフトウェアのライセンス管理方法、ソフトウェアのライセンス管理システムおよび記憶媒体
JPH11194937A (ja) 電子計算機用プログラムの貸出制御システム
US20070143212A1 (en) Online product distribution using fingerprint and encryption
JP3976638B2 (ja) 電子機器及びその不正使用防止方法並びにその不正使用防止プログラム
JP3950095B2 (ja) 認証サーバ、認証方法、認証依頼端末及び認証依頼プログラム
JP2003288128A (ja) 外部接続デバイスにおけるアプリケーションの適正使用方法及び外部接続デバイス
WO2000043867A1 (fr) Procede permettant d'empecher l'utilisation illicite d'un logiciel informatique et des supports d'enregistrement d'un logiciel informatique
JPH1166008A (ja) Icカードを利用したゲーム装置
JP2007140961A (ja) 不正にコピーされたファイルの使用防止装置およびプログラム
JPH11110209A (ja) ソフトウェアの複写防止方法
KR20050088463A (ko) 디스크 인증방법 및 시스템

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 09269776

Country of ref document: US

AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM HR HU ID IL IS JP KE KG KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase