WO2008056373A1 - Intelligent system to protect softwares from unauthorized duplication - Google Patents

Intelligent system to protect softwares from unauthorized duplication Download PDF

Info

Publication number
WO2008056373A1
WO2008056373A1 PCT/IN2007/000458 IN2007000458W WO2008056373A1 WO 2008056373 A1 WO2008056373 A1 WO 2008056373A1 IN 2007000458 W IN2007000458 W IN 2007000458W WO 2008056373 A1 WO2008056373 A1 WO 2008056373A1
Authority
WO
WIPO (PCT)
Prior art keywords
software
security
unit
computer
data
Prior art date
Application number
PCT/IN2007/000458
Other languages
French (fr)
Inventor
George John Thekkethil
Original Assignee
M/S Trinity Future-In Pvt Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by M/S Trinity Future-In Pvt Ltd filed Critical M/S Trinity Future-In Pvt Ltd
Publication of WO2008056373A1 publication Critical patent/WO2008056373A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Definitions

  • the present invention provides a new unique means which uses an efficient software encryption and memory mapping mechanism to protect softwares from unauthorized duplication.
  • a software encryption mechanism and memory mapping mechanism by way of a software encryption mechanism and memory mapping mechanism, computer programs (softwares) and or data files are delivered to a computer system in a secured manner, so that the computer softwares are not allowed for unauthorized usage and duplication.
  • the present invention provides an intelligent system for delivering computer softwares from the software manufacturer to the end user in a much-secured way without allowing unauthorized multiple duplications in between and thereafter.
  • the present invention provides an intelligent system, which uses biometrics techniques such as fingerprint, retinal pattern, DNA sequence, voice recognition, and other techniques for user authentication.
  • biometrics techniques such as fingerprint, retinal pattern, DNA sequence, voice recognition, and other techniques for user authentication.
  • the present invention provides an intelligent system, which uses license management mechanism to monitor utilization of software licenses.
  • Still more particularly another object of the present invention is to provide a software encryption and memory mapping mechanism to allow the usage of the computer softwares effectively and securely, wherein copying techniques such as copying of distribution media, keys and passwords, hard drives, system fingerprinting, and other common privacy concerns are prohibited.
  • an Intelligent Control Element is installed between a computer system and a mass storage device.
  • ICE could be attached along with Hard Drive, CD, DVD, Flash Drive Etc.
  • the Main drawback of this invention is, it allows read or write file creation, data coding, copying, deleting and encryption of files from IMSS like any other conventional storage media. Also it has no role in license management.
  • a mass storage apparatus having features of the present invention provides multiple levels of protection for the software or other digital content recorded on the apparatus.
  • a first level of protection is physical and prevents access to the physical media on which the software or other digital content is recorded.
  • a second level of protection is effected by software, which prevents unauthorized electronic access to the mass storage apparatus while the apparatus is in electronic communication with the host computer.
  • a third level of protection is effected by the encryption of the software of other digital content that is stored within the apparatus.
  • Present invention uses a separate application to write data into the mass storage device and to read data from it securely without allowing unauthorized duplication.
  • Hardware security as mentioned in the above prior art is not required in the present invention, because user has to use the specific application to read data from the mass storage unit even if he removes the memory chip.
  • the main object of the present invention is to provide security system by way of an encryption and memory mapping mechanism to protect softwares from unauthorized duplication.
  • the present invention provides a software encryption and memory mapping mechanism for avoiding softwares from being getting duplicated by computing systems like computers, Laptops, other digital systems.
  • the present invention provides a software encryption method, which delivers computer programs (softwares) from the software manufacturer to the end user in a secured manner, so that the computer softwares are not allowed for unauthorized usage and duplication.
  • the present invention also provides software encryption mechanism to allow the usage of the computer softwares effectively and securely, wherein copying techniques such as copying of distribution media, keys and passwords, hard drives, system fingerprinting, and other common privacy concerns are prohibited.
  • Still another object of the present invention is to provide a software encryption mechanism and memory mapping mechanism for Non- Duplication of Softwares useful for preventing in the unauthorized installation of licensed software to a computer.
  • Still another object of the present invention provides an electronic system, which executes the softwares in the well-protected environment within the computer without allowing user to do unauthorized activities on the software files.
  • Still another object of the present invention is to use license management mechanism to monitor the licenses of the software within the device.
  • This device provides both active and passive protection for the licensed software files.
  • Fig (1) represents the Intelligent System to Protect Softwares from unauthorized duplication wherein (9) our device section, (10) is the Computer section.
  • An Intelligent System to Protect Softwares from unauthorized duplication comprising: an intelligent device 9, disposed in electronic communication with an associated computer system 10.
  • This Intelligent device 9 contains storage device i, this may be hard drive, CD-ROM, DVD-ROM, PCMCIA Flash Cards, Flash IC Chips, etc. In this storage device all the softwares files that are to be protected from unauthorized usage are stored. All the data within this will be in the mapped format.
  • This storage device 1 is interfaced with Security Unit 3, via one of the following mentioned communications: ATA, IDE, SATA, SCSI, SAS, USB, MCMCIA, FLASH, Internet, NV-RAM, Network, etc.
  • This Security Unit (3) takes care of all the required security issues. It does all the required encryption and memory mapping to the data. All the softwares required for the functionality of the device and for security are stored within this unit. They receive commands from Computer System and act accordingly.
  • This Security Unit (3) is interfaced with Computer System through ISA, PCI/PCI-X, PCI-E, VME, USB, Network, etc. If this security unit permits only the software files will come out of the Storage Unit (1) to Computer Section (10).
  • User Authentication Unit (3A) is responsible for authenticating the authorized user of the device. It stores all the user authentication details such as fingerprint, retinal pattern, DNA sequence, voice recognition, and other techniques.
  • Security Unit (3) stores all the license details of the softwares stored within the device. It allows using softwares for only mentioned number of licenses. It doesn't allow user to use software exceeding the number of licenses provided to him.
  • Security Unit (3) connects Storage Device to an appropriate IDE, ATA,
  • Computer Section (10) contains application software, which is already installed to access this Intelligent System. This application software is made in such a way that, no other software can access this Intelligent
  • this data will be processed in the Mapping Engine (6), to recover data from the original mapped format.
  • the electro-mechanical system functions as per the following steps: a) All the softwares files that are to be protected from unauthorized duplication are stored in the Storage Unit (1) of Intelligent Device in the mapped format after encryption. b) Whenever the user plugs this Intelligent Device into end Computer Unit, he has to use the application software provided to access this Intelligent Device. c) User has to authenticate himself to use the device confirming his biometrics informations preconfigured earlier. d) Now, user has to perform only authorized operations on the Intelligent Device to use the device and the device will not be accessible to any unauthorized operations such as copy, cut, print screen etc. e) If the Intelligent device finds authorized commands from the user, it sends the software file from the Storage Unit to Computer Section.
  • Decrypt Engine prepares data for further execution by decrypting the software received from the Intelligent Device.
  • Mapping Engine processes the decrypted data, to recover data from the original mapped format. i) Now the software will be installed in the computer safely, without giving any view of software setup files and other files to the user. j) Now the software is ready for the user to use.
  • the major advantages of the present invention are as follows:
  • the present invention Intelligent System to Protect Softwares from Unauthorized Duplication is effective in protecting software files from the unauthorized duplication.
  • the present invention prevents unauthorized duplication of licensed software.
  • the system can be miniaturized to a chip configuration.
  • the electromechanical system integrated into a chip can be operated easily on any desktop, laptop, notebook and the like.
  • the electromechanical system can replace the CDs for installation/reinstallation of software.
  • the system can be miniaturized to a MEMS configuration.
  • the present invention automatically restricts usage of software to the number of licenses allowed in the storage device.

Abstract

The present invention concerns an intelligent system to protect software from unauthorized duplication comprising a device section (9) and a computer section (10).The device section comprises a storage unit (1 ), a security unit (3) and a user authentication unit (3A) which authenticates the user by using biometric techniques. The storage unit (1 ) stores licensed software files and interfaces (2) with the security unit (3), which takes care of the requires security issues of the intelligent system. The security unit (3) is further interfaced via a computer system interface (4) with the computer section (10), which contains a decrypt (5) and a mapping engine (6). The device sends software to the computer in a uniquely secured way so that user is not allowed to use licensed software for unauthorized purposes.

Description

"Intelligent System to Protect Softwares from Unauthorized Duplication "
FIELD OF THE INVENTION:
The present invention provides a new unique means which uses an efficient software encryption and memory mapping mechanism to protect softwares from unauthorized duplication.
More particularly the present invention, by way of a software encryption mechanism and memory mapping mechanism, computer programs (softwares) and or data files are delivered to a computer system in a secured manner, so that the computer softwares are not allowed for unauthorized usage and duplication.
Still more particularly the present invention provides an intelligent system for delivering computer softwares from the software manufacturer to the end user in a much-secured way without allowing unauthorized multiple duplications in between and thereafter.
Still more particularly, the present invention provides an intelligent system, which uses biometrics techniques such as fingerprint, retinal pattern, DNA sequence, voice recognition, and other techniques for user authentication.
Still more particularly, the present invention provides an intelligent system, which uses license management mechanism to monitor utilization of software licenses.
Still more particularly another object of the present invention is to provide a software encryption and memory mapping mechanism to allow the usage of the computer softwares effectively and securely, wherein copying techniques such as copying of distribution media, keys and passwords, hard drives, system fingerprinting, and other common privacy concerns are prohibited.
BACKGROUND ART:
The biggest legal problem affecting the software industry today is the unauthorized duplication, which is the illegal copying or use of software files. Unauthorized duplication is a huge problem mainly because it is so easy to do.
Software duplication is a ubiquitous issue in the computer industry.
When a consumer purchase a single copy of a given software package, he can duplicate the software into unlimited amount of copies and distribute them all over the world for a significant reduction in sale price.
Governments all over the world recognized the impact of software duplication on the computer industry and try to protect software owner's intellectual property with international treaties, laws and more severe penalties for infringement of the copyright and the intellectual property rights of software owners.
This unauthorized duplication problem has created a role for a new industry of license and software protection devices to emerge and to be successfully fight the piracy problem.
Unauthorized software duplication is thriving because of the amount of avenues it opens in business for pirates.
One of the most important aspects of software duplication is the media used. All the present software distribution medias failed to protect the softwares from being getting duplicated. Reference may be made to the US Publication No. 2005 0216685 Al Heden, Donald Gene; et al, wherein it has been disclosed that: - The Intelligent Media Storage System disclosed herein protects computer programs and/or data files from being copied and used in an unauthorized manner. According to an example embodiment of the invention, an Intelligent Control Element (ICE) is installed between a computer system and a mass storage device.
In this prior art we can see that the data file access in IMSS is allowed through authentication code system operating through ICE. ICE could be attached along with Hard Drive, CD, DVD, Flash Drive Etc. The Main drawback of this invention is, it allows read or write file creation, data coding, copying, deleting and encryption of files from IMSS like any other conventional storage media. Also it has no role in license management.
Reference may also be made to the US Publication No. 20050210278, Al, Conklin, Bruce; (San Antonio, TX); Conklin, Suzan; (San Antonio, TX); et al, wherein it has been disclosed that: - A mass storage apparatus, and method for using same, for securely delivering digital content to a host computer that satisfies the need for reliable, secure, and safe distribute distribution that is easy for end-users to use and for manufacturers to implement yet provides surpassing protection of Manufacturers1 intellectual property. The apparatus provides both passive and active protection for the digital content to be distributed. Passive protection is designed to prevent physical access to the media within the apparatus. Active protection will render the media unreadable should the passive protection fail.
In this prior art, we can see that a mass storage apparatus having features of the present invention provides multiple levels of protection for the software or other digital content recorded on the apparatus. In one embodiment, a first level of protection is physical and prevents access to the physical media on which the software or other digital content is recorded. A second level of protection is effected by software, which prevents unauthorized electronic access to the mass storage apparatus while the apparatus is in electronic communication with the host computer. A third level of protection is effected by the encryption of the software of other digital content that is stored within the apparatus.
In this prior art, it is mentioned that a program is operative to disable Internet or network connectivity to or from said user's computer while said digital content is being accessed. It doesn't mention about license management of software.
But in the present invention no need to disable Internet or network connectivity to or from said user's computer. Present invention uses a separate application to write data into the mass storage device and to read data from it securely without allowing unauthorized duplication. Hardware security as mentioned in the above prior art is not required in the present invention, because user has to use the specific application to read data from the mass storage unit even if he removes the memory chip.
OBJECTS OF THE INVENTION:
The main object of the present invention is to provide security system by way of an encryption and memory mapping mechanism to protect softwares from unauthorized duplication.
The present invention provides a software encryption and memory mapping mechanism for avoiding softwares from being getting duplicated by computing systems like computers, Laptops, other digital systems.
Also, the present invention provides a software encryption method, which delivers computer programs (softwares) from the software manufacturer to the end user in a secured manner, so that the computer softwares are not allowed for unauthorized usage and duplication.
The present invention also provides software encryption mechanism to allow the usage of the computer softwares effectively and securely, wherein copying techniques such as copying of distribution media, keys and passwords, hard drives, system fingerprinting, and other common privacy concerns are prohibited.
Still another object of the present invention is to provide a software encryption mechanism and memory mapping mechanism for Non- Duplication of Softwares useful for preventing in the unauthorized installation of licensed software to a computer.
Still another object of the present invention provides an electronic system, which executes the softwares in the well-protected environment within the computer without allowing user to do unauthorized activities on the software files.
Still another object of the present invention is to use license management mechanism to monitor the licenses of the software within the device.
This device provides both active and passive protection for the licensed software files.
BRIEF DESCRIPTION OF THE DRAWINGS: In the drawing accompanying this specification, Fig (1) represents the Intelligent System to Protect Softwares from unauthorized duplication wherein (9) our device section, (10) is the Computer section. An Intelligent System to Protect Softwares from unauthorized duplication, according to the invention is provided comprising: an intelligent device 9, disposed in electronic communication with an associated computer system 10.
This Intelligent device 9 contains storage device i, this may be hard drive, CD-ROM, DVD-ROM, PCMCIA Flash Cards, Flash IC Chips, etc. In this storage device all the softwares files that are to be protected from unauthorized usage are stored. All the data within this will be in the mapped format.
This storage device 1 is interfaced with Security Unit 3, via one of the following mentioned communications: ATA, IDE, SATA, SCSI, SAS, USB, MCMCIA, FLASH, Internet, NV-RAM, Network, etc. This Security Unit (3) takes care of all the required security issues. It does all the required encryption and memory mapping to the data. All the softwares required for the functionality of the device and for security are stored within this unit. They receive commands from Computer System and act accordingly. This Security Unit (3) is interfaced with Computer System through ISA, PCI/PCI-X, PCI-E, VME, USB, Network, etc. If this security unit permits only the software files will come out of the Storage Unit (1) to Computer Section (10).
User Authentication Unit (3A) is responsible for authenticating the authorized user of the device. It stores all the user authentication details such as fingerprint, retinal pattern, DNA sequence, voice recognition, and other techniques.
Separate application software is provided to write software data into the Storage Unit (1). This application software will interact with Security Unit and hence write software data accordingly into the
Storage Unit (1). Before writing the software data into the Storage
Unit (1), software data gets encrypted by the security software stored in the Security Unit (3) using the unique encryption algorithm provided. Writing and reading of Software data from the Storage Unit will be strictly under the control of Security unit (3). After encryption, software data will be stored in the Storage Unit (1) in the mapped format.
Security Unit (3) stores all the license details of the softwares stored within the device. It allows using softwares for only mentioned number of licenses. It doesn't allow user to use software exceeding the number of licenses provided to him.
Security Unit (3) connects Storage Device to an appropriate IDE, ATA,
SATA, SCSI, SAS, USB, PC-MCIA, FLASH, Battery-backup-RAM,
NVRAM, Ethernet, Internet, network, etc.
Computer Section (10) contains application software, which is already installed to access this Intelligent System. This application software is made in such a way that, no other software can access this Intelligent
System.
Now in Computer Section, data received from the Device will be decrypted by the Decrypt Engine (5), which prepares data for further execution.
Then this data will be processed in the Mapping Engine (6), to recover data from the original mapped format.
Now the software from the Intelligent System will be installed in the computer safely, without giving any view of software setup files and other supporting files to the user.
Now the software is ready for use. It ensures total protection of data regardless of its access mode and file types.
FUNCTIONAL FEATURES OF THE INVENTION:
According to the invention, the electro-mechanical system functions as per the following steps: a) All the softwares files that are to be protected from unauthorized duplication are stored in the Storage Unit (1) of Intelligent Device in the mapped format after encryption. b) Whenever the user plugs this Intelligent Device into end Computer Unit, he has to use the application software provided to access this Intelligent Device. c) User has to authenticate himself to use the device confirming his biometrics informations preconfigured earlier. d) Now, user has to perform only authorized operations on the Intelligent Device to use the device and the device will not be accessible to any unauthorized operations such as copy, cut, print screen etc. e) If the Intelligent device finds authorized commands from the user, it sends the software file from the Storage Unit to Computer Section. f) User is allowed to use softwares within the device for only number of licenses provided to him, whose license details will be stored in the Security Unit (3). g) In Computer Section, Decrypt Engine prepares data for further execution by decrypting the software received from the Intelligent Device. h) Mapping Engine processes the decrypted data, to recover data from the original mapped format. i) Now the software will be installed in the computer safely, without giving any view of software setup files and other files to the user. j) Now the software is ready for the user to use.
Example
Consider MEMSPRO software file to be distributed to the end user securely without allowing him to duplicate by any means. If this software is distributed through the mentioned present invention, it assures a complete non-duplicatable security guarantee. This Intelligent System comes with a media, which will give application software, which needs to be installed to use the intelligent system. When the Intelligent System is connected to the computer section, user has to access the device through the application software installed. User finds no other way to access the device. He can install the software into his system, but prevented from other unauthorized activities. User can use the MEMSPro software for only number of licenses he is provided with.
ADVANTAGES OF THE INVENTION:
The major advantages of the present invention are as follows: The present invention Intelligent System to Protect Softwares from Unauthorized Duplication is effective in protecting software files from the unauthorized duplication.
1. The present invention prevents unauthorized duplication of licensed software.
2. The system can be miniaturized to a chip configuration. 3. The electromechanical system integrated into a chip can be operated easily on any desktop, laptop, notebook and the like.
4. The electromechanical system can replace the CDs for installation/reinstallation of software. The system can be miniaturized to a MEMS configuration.
5. The present invention automatically restricts usage of software to the number of licenses allowed in the storage device.

Claims

CLAIMS:
1. An Intelligent System to Protect Softwares from Unauthorized Duplication comprises a) Device section (9), b) Computer section (10). Storage unit of the Device section (9) stores all the software files to be secured in the Storage Unit (1), Security Unit (3) takes care of all the required security issues, User Authentication Unit (3A) which authenticate the user by using biometrics techniques, decrypt engine (5) of the Computer section (10) decrypt the software file received from the Device section (9) and prepares data for further executions, Mapping Engine (6) processes the decrypted data, to recover data from the original mapped format.
2. Storage Unit (1) claimed in claim 1, stores all the encrypted softwares to be secured in the mapped format after encryption, this storage Unit may be a memory flash, a memory card, a hard disk, a EPROM, a EEPROM, a RAM, a disc on chip.
3. Storage Unit (1) claimed in claim 1 to 2 will be interfaced with the Security Unit (3) through ATA, IDE, SATA, SCSI, SAS, USB, PCMCIA, FLASH, Internet, Network, NV-RAM, etc.
4. Security Unit (3) claimed in claim 1 and claim 3 takes care of all the required security issues of the Intelligent System. All the softwares required for the functionality of the intelligent system and for security, are stored within this unit.. They receive commands from Computer System and act according to the predefined security instructions.
5. Security Unit (3) claimed in claim 1, claim 3 and claim 4 encrypt the software data before writing it into the Storage Unit (1). It also employs mapping logic mechanism, indirect authentication mechanism, crypt key logic mechanism to ensure a complete security to the digital data.
6. Security Unit (3) claimed in claim 1, claim 3, claim 4 and claim 5 is provided with a User Authentication Unit (3A), which stores all the authentication details of the user, such as biometrics techniques, example fingerprint, retinal pattern, DNA sequence, voice recognition, and other techniques.
7. Security Unit (3) claimed in claim 1, claim 3, claim 4, claim 5 and claim 6 stores all the license details of the software file stored within the device and restricts the user to use the software for only number of licenses provided to him.
8. Security Unit (3) claimed in claim 1, claim 3, claim 4, claim 5, claim 6 and claim 7 will be a FPGA, ASIC, CPU.
9. Security Unit (3) claimed in claim 1, claim 3, claim 4, claim 5 claim 6, claim 7 and claim 8, will be interfaced with the Computer Section (10) through ISA, USB, PCI-E, VME, DDR/DDR-II, Network, SDRAM, RAMBUS, IEEE, Dual Port RAM, etc.
10. Software Data received from the intelligent system will be decrypted by the Decrypt Engine (5), which prepares data for further execution.
11. Decrypt engine claimed in claim 1 and claim 10 will be a separate application software stored in the computer section.
12. This decrypted data will be processed in the Mapping Engine (6), to recover data from the original mapped format.
13. Mapping Engine (6) claimed in claim 1 and claim 12 will be separate application software stored in the computer section.
14. Intelligent System claimed in claim 1 to claim 13 creates a protective environment in the Computer section which will prevent all the unauthorized activities predefined in the Security Unit (3).
15. Intelligent System claimed in claim 1 to claim 14 ensures total protection of software files regardless of its access mode and file types.
PCT/IN2007/000458 2006-11-10 2007-10-04 Intelligent system to protect softwares from unauthorized duplication WO2008056373A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN2084/CHE/2006 2006-11-10
IN2084CH2006 2006-11-10

Publications (1)

Publication Number Publication Date
WO2008056373A1 true WO2008056373A1 (en) 2008-05-15

Family

ID=39364225

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2007/000458 WO2008056373A1 (en) 2006-11-10 2007-10-04 Intelligent system to protect softwares from unauthorized duplication

Country Status (1)

Country Link
WO (1) WO2008056373A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010037450A1 (en) * 2000-03-02 2001-11-01 Metlitski Evgueny A. System and method for process protection
EP1184771A1 (en) * 2000-08-24 2002-03-06 Wibu-Systems AG Method and device for protection of computer software and/or computer-readable data
US20050216685A1 (en) * 2004-02-03 2005-09-29 Heden Donald G Intelligent media storage system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010037450A1 (en) * 2000-03-02 2001-11-01 Metlitski Evgueny A. System and method for process protection
EP1184771A1 (en) * 2000-08-24 2002-03-06 Wibu-Systems AG Method and device for protection of computer software and/or computer-readable data
US20050216685A1 (en) * 2004-02-03 2005-09-29 Heden Donald G Intelligent media storage system

Similar Documents

Publication Publication Date Title
US7765373B1 (en) System for controlling use of a solid-state storage subsystem
AU2002368159B2 (en) System and method for authentication
US9251381B1 (en) Solid-state storage subsystem security solution
US20050216685A1 (en) Intelligent media storage system
US20080046997A1 (en) Data safe box enforced by a storage device controller on a per-region basis for improved computer security
JP4610557B2 (en) DATA MANAGEMENT METHOD, PROGRAM THEREOF, AND PROGRAM RECORDING MEDIUM
US20090150631A1 (en) Self-protecting storage device
US9235691B2 (en) Method for preventing illegal use of software
US20090094601A1 (en) Method and device for protecting software from unauthorized use
US8250377B2 (en) Software copyright protection and licensing system using RFID
KR20070105359A (en) Usb secure storage apparatus and method
WO2010127030A2 (en) Selectively securing data and/or erasing secure data caches responsive to security compromising conditions
WO2007033604A1 (en) A method of encrypting/decrypting the document and a safety management storage device and system method of its safety management
CN103262092A (en) Storage drive based antimalware methods and apparatuses
CN102053925A (en) Realization method of data encryption in hard disk
US20070113097A1 (en) [storage media]
US20100174902A1 (en) Portable storage media with high security function
WO2008056373A1 (en) Intelligent system to protect softwares from unauthorized duplication
JP2003208234A (en) Software recording part separation type information processor and software managing method
US20080209579A1 (en) Electro-Mechanical System For Non-Duplication of Operating System
US8079092B2 (en) Electro-mechanical system for non-duplication of software
WO2013024702A1 (en) External storage device and method for controlling external storage device
WO2008078333A1 (en) Intelligent system to protect confidential information from unauthorized duplication
TWI331328B (en) Method and system for protecting hard disks
Chen Software Product Protection

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07859597

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07859597

Country of ref document: EP

Kind code of ref document: A1