WO2000043867A1 - Procede permettant d'empecher l'utilisation illicite d'un logiciel informatique et des supports d'enregistrement d'un logiciel informatique - Google Patents
Procede permettant d'empecher l'utilisation illicite d'un logiciel informatique et des supports d'enregistrement d'un logiciel informatique Download PDFInfo
- Publication number
- WO2000043867A1 WO2000043867A1 PCT/JP1999/000218 JP9900218W WO0043867A1 WO 2000043867 A1 WO2000043867 A1 WO 2000043867A1 JP 9900218 W JP9900218 W JP 9900218W WO 0043867 A1 WO0043867 A1 WO 0043867A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- serial number
- password
- computer software
- user
- hardware
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 48
- 238000009434 installation Methods 0.000 claims abstract description 36
- 102100040678 Programmed cell death protein 1 Human genes 0.000 description 9
- 238000010586 diagram Methods 0.000 description 3
- 101710089372 Programmed cell death protein 1 Proteins 0.000 description 2
- 230000004913 activation Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 101150065817 ROM2 gene Proteins 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000002950 deficient Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
Definitions
- the computer software is installed in a plurality of different consoles (hardware), or the recording medium is duplicated.
- This is a method for preventing the so-called illegal use of computer software, such as using it on multiple different pieces of hardware.
- a magnetic recording medium such as a floppy disk 1 or a magneto-optical disk as shown in FIG. 7 (a), or a read-only CD as shown in FIG. 7 (b).
- optical recording media such as ROM 2 and writable CDR.
- an installer or the like recorded on a recording medium is used to copy (install) the recording medium to hardware such as a hard disk of a computer. Start from duer.
- the installation software has a large capacity and it is difficult to install the software on the hardware
- the computer software is directly read from the recording medium and started without installing the computer software on the hardware.
- the above-mentioned computer software is sold on the condition that one product is used in one convenience store (hardware).
- installation in a plurality of different convenience stores (hardware) is required. Since it is possible, one product is used in several places and one door.
- a combi-software that reads and starts directly from a recording medium without installing it on a hard disk, by duplicating this recording medium, it can be used with multiple different hardware. It is.
- the installation software recorded on an authorized recording medium is installed on a plurality of different hardware, or the recording medium is duplicated, and a plurality of different recording media are used depending on the duplicated recording medium. It is an object of the present invention to provide an illegal use prevention method and a recording medium on which the combination software is recorded, which can forcibly prevent the activation of the combination software in the hardware.
- the installation of the computer software recorded on the recording medium is started, first, in the hardware on which the combination software is installed, a product serial number assigned to the recording medium and the hardware The product serial number and the volume serial number are read to the user, and the user is notified of the product serial number and the volume serial number. A knowledge pass code is generated.
- volume serial number is assigned automatically by the formatting software at the time of formatting the hardware.
- an encrypted anonymous password is formed from the volume serial number and the product serial number, the anonymous password will be transmitted between the recording medium used for installation and the single hardware at the installation destination. , And will be generated uniquely for the identified relationship.
- the user notifies the volume serial number and the product serial number notified by the hardware to, for example, a management center provided at the product distributor.
- the management center uses the product serial number and the volume serial number sent from the user to generate an encrypted return password based on the same method as the method of generating an anonymous password in the hardware. Generate and return this return password to the user.
- the unrecognized passcode is generated in the hardware as described above, and a return passcode is required to be input.
- the return password is compared with the unannounced password generated in the hardware, and only when the two match, the installation of the compilation software is permitted.
- an unannounced password encrypted based on the unique volume serial number of the installation destination is generated, and a return password corresponding to the unannounced password is transmitted from the user at the management center. Since it is generated based on the volume serial number and product serial number received and sent back to the user, the recording medium and the hardware at the installation destination are obtained from these volume serial number and product serial number. Will be identified and these combinations will be recorded in the management center.
- the present invention when the computer software is started directly from the recording medium, after the notification password is generated from the volume serial number and the product serial number, the return password acquired by the user from the management center is used. Input is required.
- the activation of the computer software is permitted only when the input return password matches the unannounced password generated in the hardware.
- one Another feature is that multiple different return passwords can be generated for a product serial number by setting an upper limit.
- various communication means such as telephone, fax, mail, in-net, wireless, and e-mail can be used. is there.
- a volume serial number of a hard disk mounted on a computer is typified. However, instead of this, manufacturing of a CPU, a network board, or a base board is performed.
- the hardware may be specified using a number.
- the above-mentioned computer includes a game machine and the like.
- the computer may be any device that can use the software.
- FIG. 1 is a schematic diagram showing a system configuration for implementing the present invention.
- FIG. 2 is a schematic diagram showing a system configuration for implementing the present invention.
- FIG. 3 is a processing flowchart in the first embodiment of the present invention.
- FIG. 4 is an information processing flow chart between the user and the management center in the first embodiment of the present invention.
- FIG. 5 is a processing flowchart in the second embodiment of the present invention.
- FIG. 6 is a processing flowchart in the third embodiment of the present invention.
- FIG. 7 is a schematic diagram showing a general recording medium.
- the recording medium used in the present invention is a floppy disk as shown in FIG. Disk 1 and CD-ROM2 are used.
- a system for implementing the first embodiment of the present invention is roughly divided into a user 3 and a management center 4 provided at a product distributor or the like.
- the recording medium in the following description, it is described as CD-R ⁇ M2
- the hardware computer
- the hard disk 5 includes a hard disk 6 as a built-in writable recording medium, a display 7 for displaying an execution state of computer software, and a CD-ROM drive 8 for reading the CD-ROM 2.
- a floppy disk drive 9 for reading and writing the floppy disk 1 is provided.
- the CD-ROM 2 is provided with a product serial number assigned at the time of product shipment; The information of the serial number ABC is recorded together with the installation software installer, and the hard disk 6 is provided with a volume serial number, VSN, which is randomly and automatically assigned at the time of formatting. ing.
- VSN volume serial number
- the installer reads the product serial number; ABC, and reads the volume serial number of the hard disk 6; VSN, and reads these product serial numbers; ABC and volume serial numbers; VSN Is displayed on the display 7 to notify the user 3, and the product serial number; ABC and volume serial number; After storing and displaying the product serial number; ABC and volume serial number; VSN, it is required to input a return path PD2 described later.
- the return password PD 2 is used by the user 3 to display the product serial number; ABC and volume serial number; VSN displayed on the display 7. As shown in Fig. 1, they are obtained by sending them to the management center 4 by telephone 10 or the like and returning them from the management center 14 as shown in Fig. 1.
- the same return path path PD2 as the anonymous path path PD1 is generated by a method similar to the encryption method recorded on the CD-ROM 2, and then returned to the user 3.
- step S1 it is determined whether or not the product serial number; ABC recorded on CD-ROM 2 has been read. Then, the process proceeds to the next step S2.
- step S2 a determination is made as to whether or not the volume serial number assigned to the hard disk 6; VSN has been read. On condition that the VSN has been read, the process proceeds to the next step S3, where the product The serial number; ABC and volume serial number; VSN are displayed on the display 7, whereby the product serial number; ABC and volume serial number; VSN are notified to the user 3, and the next step S In 4, an encryption program generates a specific unannounced password PD1 from the product serial number; ABC, volume serial number, and VSN.
- the notification to the user 3 can be made not only by the display on the display 7 but also by printing or by voice.
- the notification password PD 1 generated as described above is stored as installation information, for example, in the installer, and the notification to the user 3 is not performed.
- step S4 an encrypted return password PD2 corresponding to the product serial number; ABC and volume serial number; VSN is generated by a program similar to the encryption program used in step S4.
- the PD 2 is returned to User 3.
- the unannounced password PD1 generated in the hardware 5 and the return password PD2 generated in the management center 4 are the product serial number from which they are based; ABC and the volume serial number; VSN Are the same, the paths are completely the same.
- step S4 when the unannounced password PD1 is generated in step S4, the process proceeds to the next step S5, where the presence or absence of the input of the return path guide PD2 is confirmed. The process proceeds to the next step S6 on condition that the input has been made.
- step S6 it is determined whether or not the notification path PD1 generated in the hardware 5 matches the input return path PD2. Goes to step S7 to perform the installation, and if the two are different, stop the installation.
- step SI1 it is determined whether or not the product serial number; ABC and volume serial number; VSN transmitted from the user 3 on the display 7 have been transmitted. Go to step S12 of the product serial number; Is determined.
- step S12 If it is determined in step S12 that this is the first request for the return password PD2 to the product serial number; ABC, the process proceeds to step S13, where the product serial number is entered. After an encrypted return path PD2 corresponding to ABC and volume serial number; VSN is generated, the process proceeds to the next step S14.
- step S14 after the product serial number; ABC, volume serial number; VSN, and return password PD2 are recorded and saved in the management center 4, the process proceeds to the next step S15.
- the return password PD2 is returned to the user 3, and the process is terminated.
- step S12 determines whether the request is for the second or more return path PD2 for the product serial number ABC. If it is determined in step S12 that the request is for the second or more return path PD2 for the product serial number ABC, the process proceeds to step S16, where the request is transmitted.
- Volume serial number; VSN is the product serial number sent at the same time; ABC is first combined with the volume serial number that generated the first return password PD2; If they match, it is determined that the installation is legitimate installation on the same hardware 5, and the process proceeds to step S13 and subsequent steps.If they do not match, it is determined that the installation is illegal. If determined, the process proceeds to the next step S17, in which information indicating that a return password cannot be generated is returned to the user 3, and the process is terminated.
- the volume serial number of the different hardware 5 is different, so that the CD- Product serial number of ROM2; ABC is common, but volume serial number of hardware 5 to be installed; VSN 2SNVolume serial number of first hardware 5; VSN, which is generated in hardware 5
- the unannounced password PD1 differs from the return password PD2 initially obtained from the management center 14, and as a result, installation on other hardware 5 is prevented.
- the official product serial number; ABC and the volume serial number of the different hardware 5; VSN are transmitted to the management center 4, and In order to obtain a new return password PD2, in the management center 4, the hardware 5.
- the hardware 5 first installed from the CD-ROM 2 with the product serial number; Volume serial number; recorded by VSN, volume serial number recorded in this management center 4; VSN ⁇ volume serial number transmitted; VSN, indicating that the installation was incorrect. Judgment is made, and the creation and return of a new return password PD1 is rejected.
- the CD-ROM 2 is duplicated and installed in a plurality of different hardware 5.
- steps S 21 to S 26 are the same as steps S 1 to S 8 shown in FIG. 3, respectively.
- Step S 7 is replaced with step S 27, and step S 8 is performed.
- steps S31 to S36 are the same processing as steps S11 to S16 of FIG. 4, and the volume serial number transmitted in step S36 VSN is the serial number of the product; the volume serial number that was first combined with ABC to generate the first return pass PD2; with changes to the processing if it did not match the VSN .
- step S37 If it is determined in step S37 that the number of generations of the return path guide PD2 is equal to or less than the predetermined number N, the process proceeds to the next step S38, where the transmitted product serial number; After a return path PDn different from the previous one encrypted from the VSN is generated from the volume serial number, the process proceeds to the next step S39, where the return path PDn is returned to the user 3. To end the process.
- step S40 If it is determined that the number of generations of the different return path code PD2 for one specific product serial number; ABC has exceeded the predetermined number N, the process proceeds to step S40, and information indicating that the return path code cannot be generated. Is returned to user 3 and the process ends.
- the present invention when a recording medium on which computer software is recorded is sold, installation on a plurality of different hardware using this recording medium and different hardware based on the copied recording medium are performed. Installation of the software on the storage medium, or running the computer software recorded on the storage medium directly from the storage medium, or using the combination software used in a form that captures the data This prevents booting with different hardware and ensures that illegal use of computer software is prevented.
Abstract
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP1999/000218 WO2000043867A1 (fr) | 1999-01-21 | 1999-01-21 | Procede permettant d'empecher l'utilisation illicite d'un logiciel informatique et des supports d'enregistrement d'un logiciel informatique |
AU19832/99A AU1983299A (en) | 1999-01-21 | 1999-01-21 | Method of preventing illegal use of computer software, and recording media of computer software |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP1999/000218 WO2000043867A1 (fr) | 1999-01-21 | 1999-01-21 | Procede permettant d'empecher l'utilisation illicite d'un logiciel informatique et des supports d'enregistrement d'un logiciel informatique |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000043867A1 true WO2000043867A1 (fr) | 2000-07-27 |
Family
ID=14234770
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP1999/000218 WO2000043867A1 (fr) | 1999-01-21 | 1999-01-21 | Procede permettant d'empecher l'utilisation illicite d'un logiciel informatique et des supports d'enregistrement d'un logiciel informatique |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU1983299A (fr) |
WO (1) | WO2000043867A1 (fr) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002099343A (ja) * | 2000-09-25 | 2002-04-05 | Metemu:Kk | コンピュータソフトウエア不正使用防止方法及びシステム並びにプログラムを記録した記録媒体 |
JP2003085143A (ja) * | 2001-09-11 | 2003-03-20 | Sony Corp | パスワード管理システム、パスワード管理方法、および情報処理装置、並びにコンピュータ・プログラム |
WO2005085973A1 (fr) * | 2004-03-04 | 2005-09-15 | Nec Corporation | Systeme de mise a jour de donnees, procede de mise a jour de donnees, programme de mise a jour de donnees et systeme robot |
JP6032772B1 (ja) * | 2015-09-11 | 2016-11-30 | ニチユ三菱フォークリフト株式会社 | 動作制限装置、車両、パスワード生成装置、管理システム、動作制限方法及び動作制限プログラム |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07200492A (ja) * | 1993-12-29 | 1995-08-04 | Csk Corp | ネットワーク上のソフトウェア使用権管理システム |
JPH08278879A (ja) * | 1995-04-06 | 1996-10-22 | Hitachi Ltd | ソフトウェア・インストールシステム |
JPH0926875A (ja) * | 1995-07-11 | 1997-01-28 | Fujitsu Ltd | ソフトウェア不正使用防止機能を備えた記憶媒体、コンピュータ及びコンピュータシステム |
JPH0969045A (ja) * | 1995-08-31 | 1997-03-11 | Canon Inc | 情報処理装置及び方法 |
JPH0981382A (ja) * | 1995-09-19 | 1997-03-28 | Gajietsuto:Kk | コンピュータソフトウエア不正コピー使用防止方法及び同防止システム |
JPH0991132A (ja) * | 1995-09-20 | 1997-04-04 | Fujitsu Ltd | エラー情報通知システム |
-
1999
- 1999-01-21 AU AU19832/99A patent/AU1983299A/en not_active Abandoned
- 1999-01-21 WO PCT/JP1999/000218 patent/WO2000043867A1/fr active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07200492A (ja) * | 1993-12-29 | 1995-08-04 | Csk Corp | ネットワーク上のソフトウェア使用権管理システム |
JPH08278879A (ja) * | 1995-04-06 | 1996-10-22 | Hitachi Ltd | ソフトウェア・インストールシステム |
JPH0926875A (ja) * | 1995-07-11 | 1997-01-28 | Fujitsu Ltd | ソフトウェア不正使用防止機能を備えた記憶媒体、コンピュータ及びコンピュータシステム |
JPH0969045A (ja) * | 1995-08-31 | 1997-03-11 | Canon Inc | 情報処理装置及び方法 |
JPH0981382A (ja) * | 1995-09-19 | 1997-03-28 | Gajietsuto:Kk | コンピュータソフトウエア不正コピー使用防止方法及び同防止システム |
JPH0991132A (ja) * | 1995-09-20 | 1997-04-04 | Fujitsu Ltd | エラー情報通知システム |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002099343A (ja) * | 2000-09-25 | 2002-04-05 | Metemu:Kk | コンピュータソフトウエア不正使用防止方法及びシステム並びにプログラムを記録した記録媒体 |
JP2003085143A (ja) * | 2001-09-11 | 2003-03-20 | Sony Corp | パスワード管理システム、パスワード管理方法、および情報処理装置、並びにコンピュータ・プログラム |
WO2005085973A1 (fr) * | 2004-03-04 | 2005-09-15 | Nec Corporation | Systeme de mise a jour de donnees, procede de mise a jour de donnees, programme de mise a jour de donnees et systeme robot |
KR100914568B1 (ko) * | 2004-03-04 | 2009-08-31 | 닛본 덴끼 가부시끼가이샤 | 데이터 갱신 시스템, 데이터 갱신 방법, 및 데이터 갱신 프로그램을 기록한 기록 매체, 데이터 제공 장치, 로봇 장치 및 로봇 시스템 |
US7600119B2 (en) | 2004-03-04 | 2009-10-06 | Nec Corporation | Data update system, data update method, data update program, and robot system |
JP6032772B1 (ja) * | 2015-09-11 | 2016-11-30 | ニチユ三菱フォークリフト株式会社 | 動作制限装置、車両、パスワード生成装置、管理システム、動作制限方法及び動作制限プログラム |
Also Published As
Publication number | Publication date |
---|---|
AU1983299A (en) | 2000-08-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8443455B2 (en) | Apparatus, method, and computer program for controlling use of a content | |
US5935246A (en) | Electronic copy protection mechanism using challenge and response to prevent unauthorized execution of software | |
AU767286B2 (en) | Methods and apparatus for protecting information | |
KR100240324B1 (ko) | 실시권자 통지 시스템 | |
US7962417B2 (en) | System and method for distributing protected information | |
US7209901B2 (en) | Method for selling, protecting, and redistributing digital goods | |
JP4610557B2 (ja) | データ管理方法、そのプログラム及びプログラムの記録媒体 | |
JP2002373029A (ja) | Icタグによるソフトウェアの不正コピーの防止方法 | |
US10586221B1 (en) | Regulating access to content using a multitiered rule base | |
US20100229000A1 (en) | Software copyright protection and licensing system using rfid | |
WO2002059894A1 (fr) | Support d'enregistrement, dispositif de traitement d'informations, serveur de distribution de contenu, procede, programme et son support d'enregistrement | |
JP2001216357A (ja) | ソフトウェアのライセンス管理方法および電子機器並びに記録媒体 | |
JP5484168B2 (ja) | 電子コンテント処理システム、電子コンテント処理方法、電子コンテントのパッケージおよび利用許諾装置 | |
JPH10207779A (ja) | デジタル情報管理システム、端末装置、情報管理センタ及びデジタル情報管理方法 | |
JP2002351569A (ja) | ソフトウェアのライセンス管理方法、ソフトウェアのライセンス管理システムおよび記憶媒体 | |
JPH11194937A (ja) | 電子計算機用プログラムの貸出制御システム | |
US20070143212A1 (en) | Online product distribution using fingerprint and encryption | |
JP3976638B2 (ja) | 電子機器及びその不正使用防止方法並びにその不正使用防止プログラム | |
JP3950095B2 (ja) | 認証サーバ、認証方法、認証依頼端末及び認証依頼プログラム | |
JP2003288128A (ja) | 外部接続デバイスにおけるアプリケーションの適正使用方法及び外部接続デバイス | |
WO2000043867A1 (fr) | Procede permettant d'empecher l'utilisation illicite d'un logiciel informatique et des supports d'enregistrement d'un logiciel informatique | |
JPH1166008A (ja) | Icカードを利用したゲーム装置 | |
JP2007140961A (ja) | 不正にコピーされたファイルの使用防止装置およびプログラム | |
JPH11110209A (ja) | ソフトウェアの複写防止方法 | |
KR20050088463A (ko) | 디스크 인증방법 및 시스템 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 09269776 Country of ref document: US |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM HR HU ID IL IS JP KE KG KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase |