CA1321036C - Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded hardware device - Google Patents

Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded hardware device

Info

Publication number
CA1321036C
CA1321036C CA000603858A CA603858A CA1321036C CA 1321036 C CA1321036 C CA 1321036C CA 000603858 A CA000603858 A CA 000603858A CA 603858 A CA603858 A CA 603858A CA 1321036 C CA1321036 C CA 1321036C
Authority
CA
Canada
Prior art keywords
computer
software
code
bits
reference code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CA000603858A
Other languages
French (fr)
Inventor
Richard E. Erett
Wayne W. Chou
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Software Security Inc
Original Assignee
Software Security, Inc.
Richard E. Erett
Wayne W. Chou
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Software Security, Inc., Richard E. Erett, Wayne W. Chou filed Critical Software Security, Inc.
Application granted granted Critical
Publication of CA1321036C publication Critical patent/CA1321036C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress

Abstract

METHOD AND APPARATUS FOR PROTECTING COMPUTER SOFTWARE
UTILIZING CODED FILTER NETWORK IN CONJUNCTION
WITH AN ACTIVE CODED HARDWARE DEVICE

Inventors: Wayne W. Chou and Richard E. Erett ABSTRACT
Filter networks are incorporated within a software protection hardware device which is plugged into a communications port of a computer which device will select bits or combinations of bits emanating from the communications port resulting from commands of a controlling software in use with the computer which is desired to be protected. The filter networks select the bits of a disguised predetermined control code which when matched with a stored reference code results in an output from the filter used to activate functions within the protection device. A stream of bits including a disguised predetermined control code issuing from the computer through the security device are compared with a stored reference code in a programmable memory. When a match occurs an output emanates providing an acknowledgment code to the computer indicating that the hardware device has been plugged in and is a proper one. The stored reference code can be provided by a programmable memory using an intermediate storage register between the programmable memory and the selection network. The intermediate storage register is clocked changing the reference code in a predetermined manner. Accordingly, the reference code is changed in accordance with what is stored in the programmable memory and by the content of an intermediate register at any given time, the effect of which is to continually change the reference code by clocking the intermediate register.

Description

13~V36 ~ACKGROUND OF THE INVENTION

This invention relates to a security system for the protection of computer programs, and more particularly to such a system which employs a software protection hardware device which is plugged into a communications port of a computer,and distinguishes a disguised predetermined code hidden within a stream of signals emanating from the computer by comparing the disguised predetermined code with a stored reference code which itself may be chang~d and used to decode the computer trans-mission under the control of the software to be protected.

Hardware based software protection devices have been proposed in which the security device is plugged into a communi-cations port of a computer via an interface connector through which signals to and from the computer are exchanged. One example,is US Patent 4,5~2,306 to the inventors of the present application,in which an actively coded hardware device is used to protect computer software. In this patent the hardware security device is attached to an interface connector which is plugged in to a communications port of a computer through which signals pass from the computer to the security device under the control of the software,and other signals from the security device to the computer as a response to the signals applied from the computer.
In such devices the hardware security device is usually encapsulated in plastic or epoxy in order to further en-hance the security making it difficult or impossible to discover the code without tearing the device apart. However, the security may be compromised by observing the signals to and from the security device regardless of their nature by simply monitoring -3- ~

and studying such signals using reverse engineering to eventual-ly break down the code or functioning of the hardware device.
Accordingly, the security of the plugged in device for the soft-ware program which it is desired to protect will be primarily a function of how difficult it is to find out what the hardware device is doing and what signals it is operating on to provide the protection. The present invention is directed to providing a deterrent which can be configured in such a manner that any attempt to decipher or emulate the signals may be deemed im-practical.

SU~ARY OF THE INVE~TION

Accordingly, it is an object of this invention to pro-vide a new and improved method and apparatus for protecting computer software using a software protection hardware security device which is capable of decoding signals to the security de-vice such that coded signals will have no special attributes over any other random signal rendering detection of the coded signals by ordinary means of observation impossible.
Another object of this invention is to provide a new and improved software protection hardware security device which decodes a disguised predetermined control code from the computer and may do so by continually altering a stored reference code in the hardware security device.
Still another object of this invention is to provide a new and improved plug-in device for protecting computer software which permits an ever changing 'code predetermined by a programmer which when intermixed with false codes appears com-pletely random to,those trying to decipher a true code.
Still another object of this invention is to provide a new and improved method and apparatus for protecting computer software using a hardware plug-in device whose security lies in the fact that no logical sequence exists for a disguiséd prede-termined code which appears to be completely random in a maze ofrandom information.
In carrying out this invention in one illustrative em-bodiment thereof, a method is provided for protecting computer software using a software protection hardware security device plugged into a communications port of a computer which is con-trolled by the computer software desired to be protected by gen-erating a pluralitv of bits containing a disguised predetermined control code to a port of a computer under the control of the software which is desired to be protected. A software protection hardware apparatus containing an acknowledgement code is plugged into the computer port which hardware decodes the disguised pre-determined control code into an operational signal in the hard-ware security device by comparing the disguised predetermined control code with a stored reference code and using the opera-tional signal as an acknowledgement code to the computer.
The stored reference code can be programmable and may be contin-ually varied in a controlled manner from the computer under the control of the software.

BRIEF DFSCRIPTION O _ HE DRAWINGS

The invention together with further aspects, objects, advantages and features thereof, may be more clearly understood from the following description taken in connection with the ac-companying drawings.
Figure 1 is a block diagram of a computer terminal connected to an active hardware device which is utilized for software protection.
Figures 2, A, B, C and D are schematic diagram circuits which act as digital filters in the form of a logical AND repre-sentation providing an output when bits are high (logical 1), a logical NOR circuit providing an output when bits are low (logical o), the combination of high and low bit filters by means of an OR
gate, and an EXCLUSIVE NOR gate which is the logical equivalent of that shown in Fig. 2C.

Figure 3A is a schematic dia~ram illustrating two or more of the bit filters illustrated in Fig. 2 being combined using an AND gate to form a byte filter.
Figure 3B illustrates a schematic diagram showing one stage of an EXCLUSIVE NOR gate of the same byte filter as illus-trated in Fig. 3A modified with a changing reference code.
Figure 4 illustrates a schematic block diagram illus-trating how a basic filter and associated register stages with memory can be used in varying ways to produce an overall filter which is the product of the function of two basic groups of filters.
Figure 5 is a block diagram which illustrates an inter-connection of several groups of filters for decoding a group of inputs which block diagram is built upon and is an extension of the approach used in the circuits of Fig. 4.
Figure 6 is a simplified block diagram of Fig. 4 using the same reference numerals for corresponding components with registers clocked as a direct result of input data to aid in explaining the rationale of one illustrative embodiment of this invention.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

Referring now to Fig. 1, which shows the basic arrange-ment having a computer 10 and a software protection security device 12 being connected to a port of the computer via an inter-facing connector 14 which permits the communication between the computer 10 and the hardware security device 12. The interface connector 14 includes a plurality of lines 16 for transmitting a plurality of bits from the computer to the security device 12.
The interconnector 14 also contains a line 18 through which a signal of acknowledgement is provided. The signals sent to the security device in the form of bits are generally under control of a specific software program running in the computer whereas the signals returning from the security device 12 are in response to the signals transmitted thereto from the computer. If the signals from the security device 1~ in response to those from the computer are determined by the software as being proper and correct, it is then generally assumed that a proper security device has been connected to that computer port. The vulnerabil-ity of the system illustrated in Fig. 1 resides in the interface connector 14 which may be tapped and the signals to and from the security device 12 can be monitored, studied and by the applica-tion of reverse engineering, the operation of the security device can be broken and emulated.
In accordance with the present invention a disguised predetermined control code which is sent over the lines 16 of the interconnector 14 is compared with/stored reference code, and decoded in apparatus which is incorporated and contained in the security device 12. The predetermined control code has no spec-ial attributes over any other random signal and could only be determined and used in the decoder, accordingly rendering de-tection of the internally coded signals by an ordinary means of observation impossible. The stored reference code inclusive in the security device is not the same as, and should not be confus-ed with the disguised predetermined control code required to cause the security device to respond. The stored reference code in the security device 12 may be altered by means of apparatus either directly or indirectly as a result of signals from the computer under the command from software which is operating the computer and which is desired to be protected. The everchanging local stored reference code although predetermined by the pro-grammer when intermixed with the other signals appearing as bits on the interconnector line 16 would appear to be completely random to an outside observer since the true disguised prede-termined reference code cannot be distinguished from any other series of signals which are fed to the security device and need appear no more frequently than would occur if they were part of a truly random sequence. Thus, in accordance with the present in-vention the security of the system will lie in the fact that no logical sequence exists in a totally random field making the apparatus extremely difficult to reverse engineer. Both the control code and the reference code are of necessity sequential-ly varied using the same sequence for both.
Referring first to Fig. 2, apparatus and its several variants will be described for coding and decoding signals ap-plied to the security device 12 in which the apparatus acts as a digital filter which provides an output when the input signals match a given reference in accordance with digital logic conven-tion. For example, in Fig. 2A, a simple logical AND gate ~2 is shown having an input 20 and a reference input 23. When the reference input 23 is at logic l,an output 24 will be a true logic 1 when an input 20 matches its reference 23. Similarly, in Fig. 2B which illustrates a logical NOR gate 25 provides an output 28 which is a logical 1 when the input 26 matches the reference input 27 at a -logical 0. These types of output become analagous to a high and a low pass single bit filter in Fig. 2A
and 2B, respectively. It will be appreciated that the filter does not pass anything but simply indicates a match whenever there is a high or a low bit present at the input of the logical gate.
Fig. 2C illustrates the combination of the high and low bit filters by means of an AND gate 29 and a NOR gate 30 each having common input 32 and a common reference input 33 whose respective outputs are applied to the input of an OR gate 31. The output 34 of the OR gate 31 is a true logic 1 whenever the input level 32 matches the reference level 33,and according-ly, by selecting a given reference,a single bit level may thus ~21036 be filtered. In Fig. 2D, a schematic representation is shown of an EXCLUSIVE NOR gate which is the logical equivalent of the cir-cuit shown in Fig. 2C. An EXCLUSIVE NOR gate 35 has an input 36 and a reference input 37 applied thereto and an output 38 is provided whenever the input 36 matches reference input 37 thereby producing a logical 1 at the output 38. An EXCLUSrVE OR gate can be used when selecting the complement of the EXCLUSIVE NOR gate.
In view of the simplicity and versatility of the EXCLUSIVE NOR
gate 35, it will be used in explaining the present invention in preference to other configurations illustrated in Fig. 2. How-ever, it should be apparent to those skilled in the art that such a preference is not considered to limit the present invention to the chosen illustrations as other filters may be utilized depend-ing on the particular application and the effect desired. In addition, it should be pointed out that for purposes of discus-sion although positive logic convention may be used for illustra-tive purposes, it is equivalent to negative logic convention and further, anyone skilled in the art may, for convenience or other-wise, combine both types of logic convention for a given design application. Failure to illustrate all the variances due to specific logic elements should not be considered limitations on the scope of the present invention.
Referring now to Fig. 3A, an implementation of the present invention is illustrated using an EXCLUSIVE NOR gate of the type illustrated in Fig. 2D. In Fig. 3 EXCLUSIVE NOR gates 44 and 49 are illustrated and the exact number of EXCLUSIVE NOR
gates utilized will depend on the number of bits 43 supplied from different lines from the computer. Each EXCLUSIVE NOR gate is supplied with a memory cell namely, memory 41 for ExcLusrv~ NOR
gate 44. and memory 48 for EXCLUSIVE NOR gate 49. Each memory cell will provide the reference for its respective bit which is transmitted via the line 16 of the connector 14 from the computer 10. The memory cells 41 and 48 may be any means which provide provide one state or another including hand wiring the reference input to a high or a low which is the simplest form, or may com-prise a more sophisticated electrically programmable cell. As illustrated in Fig. 3A, when two or more of the bit filters represented by the EXCLUSIVE NOR gates 44 and 49 are combined as shown having their input applied to an AND gate 50, a byte filter is formed in which only a correct combination of bits 43 which are inputted to the filters will pass the AND gate 50 as the true byte output 51. Accordingly, a disguised predetermined control code which has been encoded in the computer and is transmitted via the interconnector 14 to the security device 12 is in the form of 0 to n number of bits which are ap~lied to EXCLUSIVE NOR
gates 44, 49 etc., each having a reference memory, for example 41 and 48, respectively, in which the transmitted bits 0 to n are compared with their respective references formed by the bit memories, for example 41 and 48 for EXCLUSIVE NOR gates 44 and 49, respectively, producing compared outputs 47 which are applied to the n bit AND gate 50 producing a true output 51 when and only when a byte represented by the n number of bits 43 which pass the digital filter of Fig. 3A. The output 51 represents the de-coded disguised, predetermined control code which was original-ly encoded prior to its exit from the computer 10. It is be-lieved apparent that the large number of bits from the computer and references provided by the different memory cells begin to confuse anyone who is trying to tap into the line to try and determine how the device is functioning.
In order to make that task of reverse engineering more difficult, it has been stated that it is desirable to change the reference code actively at the security device 12 under software control, either directly or indirectly. Fig. 3B illustrates one stage of an EXCLUSIVE NOR gate filter 44 of the sa~ne type of bit filter as 132~3~
illustrated in Fig. 3A which instead of using a fixed memory 41, a temporary memory 55 is substituted therefor which m~y be part of a counter, of a ring type or any other incrementing or de-crementing type, a shift register or any other combination of flip-flop stages which can be toggled or switched to produce a pradictable change in its output state. Thus, in the circuit shown in Fig. 3B the fixed memory 41 supplying a reference input 46 to the ExcLusrvE ~CRgate 44 is first applied to a temporary memory 55 which may be loaded by line 52 initially by the memory cell 41. By applying a clock advance 54 to the temporary memory 55 produces outputs which change in the manner prescribed by the way in which the flip-flops are interconnected and interdependent.
~he clock 54 allows considerable freedom of choice of how derived.
It may be the result of a complex function of various input sequences from the computer yielding a very indirect relationship between the input values and the clock itself, or it may be direct and the clock can be the result of any filtered output thus changing the code each time the filter passes a true word.
Innumerable varieties can be provided. In the illustrated ex-ample, the clock advance 54 will produce a changing reference 57 from the b~orary memory 55 which is applied to the EXCIUSIVE NOR gate 44.
If this corresponds to the coding provided for the bit informa-tion on line 42 which is coded before leaving the computer, a match will still produce an output which is supplied to the AND
gate 50 which requires a number of m~tched bits to provide a byte output 51. Another fixed memory 48 is applied to a tempor-ary memory 56 producing another changing reference 58 which is applied to another E~I~S~ NOR gate. The ~mber of stages of fixed and temporary memories need not necessarily equal the number of filters as some stages may be skipped and some stages may be ~2103~
shared in accordance with the coding and the design of the filter by the user for a specific application. It is believed apparent however, that in providing the building blocks as illustrated in Figs 3A and 3B that an endless variety embodying the basic con-cepts of the invention can be provided with any level of desired sophistication. The only limiting factors will reside in the complexity and cost and that will depend on how far a user wishes to go in providing protection. Very simple approaches such as demonstrated in Figs. 3A and 3B may prove adequate for the pur-pose.
Fig. 4 further illustrates the implementation of the basic filter and associated register stages with memories to produce an overall filter which is a product of the functions of two basic groups of filters represented by n stages 74 which provide changing reference inputs to EXCLUSIVE NOR gates 59, 62 and 63 or more depending on the number of inputs 61 and cascaded z stages 78 which provides changing reference inputs to a plural-ity of EXCLUSIVE NOR gates 70. Several variants have been in-cluded in the circuit arrangement of Fig. 4 to further illustrate the endless variety of changes which can be made to the system to complicate a reverse engineering task in trying to determine what the hardware security device 12 is doing. One variant is pro-vided by the EXCLUSIVE NOR gate 62 which omits one of the EXCLU-SIVE NOR gates 70 and one of the inputs from the z register stages 78. Accordingly, the output of the EXCLUSIVE NOR gate 62 is connected directly to the input of an AND gate 71 so that the E%CLUSIVE NOR gate 62 is in effect, not cascaded with an EXCLU-SIVE NOR gate from filter stages 70. Another variant is illus-trated by inserting an EXCLUSIVE NOR gate 69 between the output of EXCLUSIVE NOR gate 5g and the input of an EXCLUSIVE NOR gate in the filter stases 70. The input 65 of the EXCLUSIVE NOR gate 69 imposes an initial condition on the input, the function of which further modifies the output as a result of this particular 65 input. In addition, other attributes 66 from other sources against other references 67 are filtered by the EXCLUSIVE NOR
gate 68 before being applied to the AND gate 71. Finally, out-puts 66'from other systems logic may also be applied to the AND
gate 71. Accordingly, the output 72 from the AND gate 71 yields a logic 1 when and only when all of the conditions of all of these EXCLUSIVE NOR gates 62, 63, 68 and those stages in 70 in combination with EXCLUSIVE NOR gate 59 and 69 are coincidentally true. However, true can mean in portions of the illustration, either positive or negative logic depending on the reference states of the cascaded filters. For example, if all the EXCLUSIVE
NOR gate inputs 61 matches that of the n references of stages 74, a logic l will appear at each output of the n input byte filter. Howe~er, if the zth reference stage of stages 78 contains a 0, then the only way a 1 will appear at the output is if all the inputs ~f the AND gate are l's which includes the zth filter stage 70. This means that the output of the nth filter must also be 0 and that the nth input 61 must be dissimilar with its reference stage. The output, then is not merely the ANDed n output of the several sources, but in the case of cascaded filter elements becomes additionally the ANDing of the result of the function of a function of yet another function, etc. In the case of the illustration in Fig. 4, the output is a result of filtered AND inputs which is a function of n references which is also a function of z references except for the input of filter 62 since its output is directed only to the input of the AND
gate 71, and with the exception of the EXCLUSIVE NOR gates 69 whose function is also a function of another attribute 65, all of which must occur simultaneously along with a true bit output from the filter 68 as well as other system logics 66'. Although the illustrative circuit in Fig. 4 serves to show how the vari-ous possibilities in applying the concept and building blocks of 132~03~
the byte filter can be used in a specific way, it more import-antly illustrates the endless variance possible in accordance with the concepts and approach utilized in this invention.
In regard to Fig. 4 which illustrates different vari-ations in logical output, no attempt has been made to illustrate conservation in elements or other potential connections which would yield the same logical output. For example, if the column of filters 70 were removed from the position as shown in Fig. 4 and instead used to compare the n register stages 74 and the z register stages 78 at the respective inputs of the filter 70, the outputs of which are then used as references to the filters 59, 62 and 63 instead of a direct connection to the n register stages 74 as shown, the output 72 would be equ~l to the same Boolean expression as the output illustrated in Fig. 4. Again, the concept of the filter with a memory reference which memory can be a temporary regis-ter that can be clocked to change the value of the reference is a feature of the present invention and not the various connections which are only illustrative examples to demonstrate the invention, its usefulness and operation.
Fig. 5 illustrates an interconnection of a plurality of building blocks which were used in Fig. 4 to decode a group of n inputs with an output corresponding to a successful decod-ing of that group to create a hypothetical hierarchal structure, which of course, may be varied at the desire of the designer.
In order to simplify the illustration of Fig. 5, all filter groups are assumed to have the same characteristics as those il-ustrated in Fig. 4. Filters 83, 85 and 87, having filter Group82, 84 and 86 I, II and III inputs/ respectively, the outputs 92, 93 and 94 of which feed into a filter 96 where along with other inputs 95 are compared with the memory register x. To pass the filter 96 with a true output 97, the input Groups I, II, III must pass the second 132~ 036 level of security represented by the code in register x of filter 96. Similarly, to achieve a final output 102, the origin-al input Groups I, II and III must additionally pass the third level comparison of register y in filters 101. These along with the second level test for inputs ~8 and 90 from Groups rv and V, respectively, and inputs 95 to filter 96 and also inputs 100 to filter 101.
In order to aid in understanding the rationale of the present invention, reference is now made to Fig. 6 which is a simplified version of Fig. 4 in which the registers are clocked as a direct result of input data. In Fig. 6 data bits 0, 1 and 2 are applied via data lines 61 to the input of EXCLUS nE NOR
gates 59, 62 and 63, respectively, and at the same time to a logical NOR gate 60 which applies its output in the form o~ clock pulses N to a three stage ring register 74. The register 74 produces reference outputs No~ Nl and N2 which are applied to the reference input of EXCLUSIVE NOR gates 59, 62 and 63, respect-ively. The clock pulse N is a combination of (data bl~F ~ + aata t 1 ~ aala ~ ). Data bits 3, 4 and 5 are applied to AND
gate 77 which generates a clock pulse Z equal to data bit 3 X
data bit 4 X data bit 5 which is applied to the two stage ring register 78 having outputs Z0 and Zl which are applied to the reference inputs of ExcLusrvE NOR gates 70 as shown. One example of the loading of the registers as well as the data input bit vs output results with the registers loaded are shown in the Truth Table as follows:

TRUTH TABLE ( F ig . ~ ) N Register Z Register 1st Six Data Bits Contents Ccntents Program Step ~o. 0 1 2 3 4 5 No Nl N o 1 Out .

_ 0 1 1 0 1 0 1 1 1 0 o 2 1 1 1 0 0 0 0 1 1 1 0 o 6 0 1 0 1 1 0 1 1 ~ O
-7 O 1 0 1 1 _ 1 1 1 0 1 0 0 8 O 1 0 1 1 0 1 1 0 1 0 o 0 0 0 1 1 1 0 1 1 0 1 o , Rerun same data la 1 0 1 1 0 1 0 1 1 0 1 _ 0 2a 1 1 1 0 0 0 0 1 1 0 _ 3a O 0 0 1 0 _ 1 _ 1 0 1 0 1 0 4a 0 1 0 1 1 1 1 0 1 1 0 0 5a O 0 0 1 1 0 1 1 0 1 0 0 6a 0 1 0 1 1 0 1 1 0 1 0 0 _ 7a 0 1 0 1 1 1 1 1 0 0 8a 0 1 0 1 1 0 1 1 _ 0 0 9a 1 1 1 0 1 0 1 1 0 0 1 0 10a _0 _0 0 1 1 1 0 1 1 1 0 0 It should be noted that m line 8 the data inputs are the same as line 6 but does not produce an output, yet in line 9 the & ta is different from line 6 but does produce an output which of oourse, is a result of the changing oontents of the regist~rs 74 and 78. On the second run of identical data input results in output at different steps namely, 2a, 7a and 8a which are oompletely different than the first run. It should be noted that the oontents of the register are the sa~e in ste~s 10 and la. The output as shcwn in the Truth Tables can be oounted or checked at every step to verify proper input code sequence as predetermined ~y the software which is to be protected. With the outputs occurring at different times for the same data it can be readily apparent that it will be difficult to find out what particular sequence ~ c~ nnC~C in th~ ~n~teCti~a ccmPuter software.

The multi stage filter as illustrated in Fig. 6 may be plugged in or otherwise connected to the printer port of a com-puter, for example, a serial/parallel adapter 23 made by IBM. A
typical address for such a printer port in an IBM compatible micro-computer operating in an MSDOS enrironment might by "888n.
In the specified adapter there are eight data bit lines so eight bits to a byte of which the last two are higher order bits (6 and 7) are arbitrary and have no purpose in the examples chosen for purposes of illustration. Accordingly, a typical program in BASIC takes the form of instruction; out ~ddre~s~, "byte value", provides signals appearing on the computer printer port as fol-lows:

.
Bit Values 1 2 4 8 16 32 64 128 Data Bits 0 1 2 3 4 5 6 7 Program Step No. Statement 1 Out 888,45 Yields 1 0 1 1 0 1 0 0 2 Out 888,71 " 1 1 1 0 0 0 1 0 3 Out 888,168 " 0 0 0 1 0 1 0 .
4 Out 888,250 " O 1 0 Out 888,24 " 0 0 0 1 1 0 0 0 6 Out 888,90 " 0 1 0 1 1 0 1 0 7 Out 888,250 " 0 1 0 8 Out 888,154 " 0 1 0 1 1 0 0 .
9 Out 888,87 " 1 1 1 0 1 0 1 0 Out 888,56 " 0 0 0 1 1 1 0 0 .

; As will be noted these correspond to the examples chos-en in the Truth Tables for the operation and application to the filter network of Fig. 6. The outputs generated from that filter network may be connected to an acknowledgement line, for examina-tion by the computer or may be counted, accumulated and used in a different manner until an additional result is achieved and then applied to the acknowledgement line of the computer. By using a series of filter stages which are modified as the signal inputs are applied to the initial stages and passed from time to time as conditions are right in the filter, it will be apparent that a simple disguised predetermined control code may be extrem~ly dif-ficult to detect or recreate when it can be seen that the same data produces different results at different times and only the computer can evaluate the proper sequence because it has the key beforehand.
Accordingly, the use of digital byte filters with an ever changing code which gives the effect of total randomness, provides a security device which is virtually unbreakable, but which is composed of relatively simple, inexpensive, solid-state elements and components. Although the changing code appears random, it is totally predictable and decodable in the hands of its designer and can produce connections which perform functions which are dependent on other functions ad infinitum. By dis-guising a predetermined control code generated in a series of bits produced by the computer at the control of the software and transmitting this disguised, predetermined control code to a hardware security device plugged into a computer port and decod-ing that disguised, predetermined controi code into an operation-al signal which is re-transmitted to the computer, a software protection device can be constructed which has a virtually un-breakable code. The structure can be made as simple or as complex as desired, depending on the particular design of the system. Even complex configurations using the simple changeable memories of the present invention which can be either fixed or varied simply either locally or remotely to provide change in states in a predetermined pattern determined by the software engineer. The software which is desired to be protected can be so protected to any degree of sophistication desired.
Since other changes and modifications varied to fit particular operating requirements and environments will be appar-ent to those skilled in the art, the invention is not considered limited to the examples chosen for purposes of illustration, and includes all changes and modifications which do not constitute a departure from the true spirit and scope of this invention as claimed in the following claims and equivalents thereto.

Claims (15)

1. The method of protecting computer software using a software protection hardware security device plugged into a communications port of a computer which is controlled by the computer software or software within computer control which is desired to be protected comprising the steps of:
applying a plurality of bits containing a disguised predetermined control code thereon to a port of a computer from software which is desired to be protected, plugging a software protection hardware apparatus into said computer port containing a derived stored reference code which in at least one form corresponds to said disguised predetermined control code, comparing said plurality of bits containing said disguised predetermined control code in said software protection hardware with said stored reference code and passing an operational signal when a match occurs, utilizing said operational signal as an acknowledgement that the disguised predetermined control code is present in said plurality of bits.
2. The method of protecting computer software as claimed in Claim 1 including the step of:
continually changing said stored reference code in a predetermined controlled manner.
3. The method of protecting computer software as claimed in Claim 1 wherein the steps of comparing said disguised predetermined control code with said stored reference code involves a plurality of successive comparisons which must match before an operational signal is passed.
4. The method of protecting computer software as claimed in Claim 2 wherein the step of continually changing said stored reference code involves varying the state of a memory in which a reference is stored.
5. The method of protecting computer software as claimed in Claim 1 wherein said comparison step involves a series of comparison stages where outputs from prior stages are compared with different reference stages to produce said operational signal when a match occurs as a result of said comparisons in said series of comparison stages.
6. The method of protecting computer software as claim-ed in Claim 5 which comparison step involves comparing the output from a previous stage with any selected signal.
7. A software protection hardware device which is plugged into a communications port of a computer to receive a plurality of bits from the computer containing a disguised prede-termined control code resulting from commands from the software controlling the computer which software is desired to be pro-tected comprising:
a digital decoder filter having an input and an output and a programmable memory coupled to said input for providing a stored reference code for said filter which in at least one form corresponds to said predetermined control code adapted to be plugged into a communications port of a computer, comparison means in said digital decoder filter for comparing an input with said stored reference code and passing an operational control signal when a match occurs, means for applying said pluraltiy of bits including said disguised predetermined control code to the input of said filter, and means coupled between said output of said filter and said computer port for applying said passed operational control signal to said computer port when a match occurs between said control code with said reference code.
8. The software protection hardware device as claimed in Claim 7 including:
means coupled to said digital decoder filter for altering the stored reference code in a predetermined manner.
9. The software protection hardware device as claimed in Claim 8 in which said means for altering the disguised predetermined code in a predetermined manner is an intermediate storage register.
10. The software protection hardware device as claimed in Claim 8 wherein said digital decoder filter comprises a plurality of EXCLUSIVE NOR gates having inputs and an output and each EXCLUSIVE NOR gate having a programmable memory with a bit stored therein connected to the input thereof along with a bit of said series of bits from said computer port, an AND gate coupled to the outputs of said EXCLUSIVE NOR gates whereby only a correct combination of bits will produce an output when the bits applied correspond to the bits in memory which will produce an output from said AND gate when the proper byte is formed by said EXCLUSIVE NOR gates.
11. The software protection hardware device as claimed in Claim 10 in which each programmable memory is a temporary memory, and means coupled to said temporary memory for continually changing the output states of said temporary memories in a predetermined manner.
12. The software protection hardware device as claimed in Claim 11 wherein said means for continually changing the out-put states of said temporary memories is an intermediate storage register.
13. The software protection hardware device as claimed in Claim 7 in which said digital decoder filter comprises a plur-ality of filters each having a different bit of said plurality of bits from said computer applied thereto and each of which has a programmable memory with a stored reference code and means for combining the outputs of said plurality of filters when a match occurs to pass said operational control signal.
14. The software protection hardware device as claimed in Claim 13 including means coupled to said memories for changing the reference code of each memory in a predetermined manner thereby controllably changing the stored reference code of each digital decoder filter.
15. The software protection hardware device as claimed in Claim 13 wherein said plurality of filters are arranged in cascaded stages each having separately programmable memories controllable from different sources whereby the comparison be-tween the plurality of bits from the computer takes place in said filter in a plurality of cascaded filters having different ref-erence code controls.
CA000603858A 1988-09-16 1989-06-23 Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded hardware device Expired - Fee Related CA1321036C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US07/245,714 US4932054A (en) 1988-09-16 1988-09-16 Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded hardware device
US07/245,714 1988-09-16

Publications (1)

Publication Number Publication Date
CA1321036C true CA1321036C (en) 1993-08-03

Family

ID=22927779

Family Applications (1)

Application Number Title Priority Date Filing Date
CA000603858A Expired - Fee Related CA1321036C (en) 1988-09-16 1989-06-23 Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded hardware device

Country Status (3)

Country Link
US (1) US4932054A (en)
EP (1) EP0359220A3 (en)
CA (1) CA1321036C (en)

Families Citing this family (79)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5014234A (en) * 1986-08-25 1991-05-07 Ncr Corporation System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software
US5146575A (en) * 1986-11-05 1992-09-08 International Business Machines Corp. Implementing privilege on microprocessor systems for use in software asset protection
FR2654851B1 (en) * 1989-11-23 1992-03-27 Schlumberger Ind Sa METHOD AND SYSTEM FOR SECURE OPERATION OF SOFTWARE.
US5081676A (en) * 1990-10-04 1992-01-14 Chou Wayne W Method and apparatus for protecting multiple copies of computer software from unauthorized use
JPH0799497B2 (en) * 1990-12-14 1995-10-25 インターナショナル・ビジネス・マシーンズ・コーポレイション Device and method for controlling the use of software
US5252960A (en) * 1991-08-26 1993-10-12 Stanley Home Automation Secure keyless entry system for automatic garage door operator
KR100302222B1 (en) * 1992-06-12 2001-11-22 그레이스 스테펀 에스 Security Front End Communication Systems for Process Control Computers and Methods
WO1993025965A1 (en) * 1992-06-12 1993-12-23 The Dow Chemical Company Intelligent process control communication system and method
US5564038A (en) * 1994-05-20 1996-10-08 International Business Machines Corporation Method and apparatus for providing a trial period for a software license product using a date stamp and designated test period
JPH08263438A (en) * 1994-11-23 1996-10-11 Xerox Corp Distribution and use control system of digital work and access control method to digital work
US7117180B1 (en) 1994-11-23 2006-10-03 Contentguard Holdings, Inc. System for controlling the use of digital works using removable content repositories
US6865551B1 (en) 1994-11-23 2005-03-08 Contentguard Holdings, Inc. Removable content repositories
US5634012A (en) * 1994-11-23 1997-05-27 Xerox Corporation System for controlling the distribution and use of digital works having a fee reporting mechanism
US5638443A (en) 1994-11-23 1997-06-10 Xerox Corporation System for controlling the distribution and use of composite digital works
US20050149450A1 (en) * 1994-11-23 2005-07-07 Contentguard Holdings, Inc. System, method, and device for controlling distribution and use of digital works based on a usage rights grammar
US5629980A (en) 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works
US6963859B2 (en) * 1994-11-23 2005-11-08 Contentguard Holdings, Inc. Content rendering repository
US5715403A (en) 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
DE9420092U1 (en) * 1994-12-15 1995-02-02 Marx Datentechnik Gmbh Software protection module
JP2000503154A (en) * 1996-01-11 2000-03-14 エムアールジェイ インコーポレイテッド System for controlling access and distribution of digital ownership
US5864666A (en) * 1996-12-23 1999-01-26 International Business Machines Corporation Web-based administration of IP tunneling on internet firewalls
US6233684B1 (en) * 1997-02-28 2001-05-15 Contenaguard Holdings, Inc. System for controlling the distribution and use of rendered digital works through watermaking
US7290288B2 (en) 1997-06-11 2007-10-30 Prism Technologies, L.L.C. Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network
AU6645398A (en) * 1998-02-13 1999-08-30 National Computer Board Method for protecting bytecode
US7068787B1 (en) 1998-10-23 2006-06-27 Contentguard Holdings, Inc. System and method for protection of digital works
US6832318B1 (en) 1999-01-15 2004-12-14 Sony Corporation Method and apparatus for secure distribution of information recorded on fixed media
US6499106B1 (en) 1999-01-15 2002-12-24 Sony Corporation Method and apparatus for secure distribution of information recorded of fixed media
US7356688B1 (en) 1999-04-06 2008-04-08 Contentguard Holdings, Inc. System and method for document distribution
US7286665B1 (en) 1999-04-06 2007-10-23 Contentguard Holdings, Inc. System and method for transferring the right to decode messages
US6937726B1 (en) 1999-04-06 2005-08-30 Contentguard Holdings, Inc. System and method for protecting data files by periodically refreshing a decryption key
US6859533B1 (en) 1999-04-06 2005-02-22 Contentguard Holdings, Inc. System and method for transferring the right to decode messages in a symmetric encoding scheme
US6961850B1 (en) * 1999-04-21 2005-11-01 Recording Industry Association Of America Method and system for minimizing pirating and/or unauthorized copying and/or unauthorized access of/to data on/from data media including compact discs and digital versatile discs
US6564253B1 (en) * 1999-05-07 2003-05-13 Recording Industry Association Of America Content authorization system over networks including searching and reporting for unauthorized content locations
US6188248B1 (en) * 1999-08-26 2001-02-13 Mips Technologies, Inc. Output synchronization-free, high-fanin dynamic NOR gate
US6885748B1 (en) 1999-10-23 2005-04-26 Contentguard Holdings, Inc. System and method for protection of digital works
US7032240B1 (en) 1999-12-07 2006-04-18 Pace Anti-Piracy, Inc. Portable authorization device for authorizing use of protected information and associated method
US7743259B2 (en) 2000-08-28 2010-06-22 Contentguard Holdings, Inc. System and method for digital rights management using a standard rendering engine
US7073199B1 (en) 2000-08-28 2006-07-04 Contentguard Holdings, Inc. Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine
US6931545B1 (en) * 2000-08-28 2005-08-16 Contentguard Holdings, Inc. Systems and methods for integrity certification and verification of content consumption environments
US20030196109A1 (en) * 2000-08-28 2003-10-16 Contentguard Holdings, Inc. Method and apparatus for content transaction aggregation
JP2002105639A (en) * 2000-09-25 2002-04-10 L'air Liquide Copperr raw material solution for mocvd treatment and its manufacturing method
US7343324B2 (en) * 2000-11-03 2008-03-11 Contentguard Holdings Inc. Method, system, and computer readable medium for automatically publishing content
US6912294B2 (en) 2000-12-29 2005-06-28 Contentguard Holdings, Inc. Multi-stage watermarking process and system
CN101369299B (en) 2001-01-17 2010-06-09 康坦夹德控股股份有限公司 Method and apparatus for managing digital content usage rights
US8069116B2 (en) 2001-01-17 2011-11-29 Contentguard Holdings, Inc. System and method for supplying and managing usage rights associated with an item repository
US6754642B2 (en) 2001-05-31 2004-06-22 Contentguard Holdings, Inc. Method and apparatus for dynamically assigning usage rights to digital works
US7774279B2 (en) * 2001-05-31 2010-08-10 Contentguard Holdings, Inc. Rights offering and granting
US7028009B2 (en) * 2001-01-17 2006-04-11 Contentguardiholdings, Inc. Method and apparatus for distributing enforceable property rights
US7206765B2 (en) * 2001-01-17 2007-04-17 Contentguard Holdings, Inc. System and method for supplying and managing usage rights based on rules
US20030043852A1 (en) * 2001-05-18 2003-03-06 Bijan Tadayon Method and apparatus for verifying data integrity based on data compression parameters
US7152046B2 (en) * 2001-05-31 2006-12-19 Contentguard Holdings, Inc. Method and apparatus for tracking status of resource in a system for managing use of the resources
US6876984B2 (en) * 2001-05-31 2005-04-05 Contentguard Holdings, Inc. Method and apparatus for establishing usage rights for digital content to be created in the future
US7222104B2 (en) * 2001-05-31 2007-05-22 Contentguard Holdings, Inc. Method and apparatus for transferring usage rights and digital work having transferrable usage rights
US6976009B2 (en) 2001-05-31 2005-12-13 Contentguard Holdings, Inc. Method and apparatus for assigning consequential rights to documents and documents having such rights
US6895503B2 (en) * 2001-05-31 2005-05-17 Contentguard Holdings, Inc. Method and apparatus for hierarchical assignment of rights to documents and documents having such rights
US8099364B2 (en) 2001-05-31 2012-01-17 Contentguard Holdings, Inc. Digital rights management of content when content is a future live event
US6973445B2 (en) * 2001-05-31 2005-12-06 Contentguard Holdings, Inc. Demarcated digital content and method for creating and processing demarcated digital works
US7725401B2 (en) 2001-05-31 2010-05-25 Contentguard Holdings, Inc. Method and apparatus for establishing usage rights for digital content to be created in the future
US8275716B2 (en) 2001-05-31 2012-09-25 Contentguard Holdings, Inc. Method and system for subscription digital rights management
US8275709B2 (en) 2001-05-31 2012-09-25 Contentguard Holdings, Inc. Digital rights management of content when content is a future live event
US8001053B2 (en) 2001-05-31 2011-08-16 Contentguard Holdings, Inc. System and method for rights offering and granting using shared state variables
US20030009424A1 (en) * 2001-05-31 2003-01-09 Contentguard Holdings, Inc. Method for managing access and use of resources by verifying conditions and conditions for use therewith
AU2002345577A1 (en) * 2001-06-07 2002-12-23 Contentguard Holdings, Inc. Protected content distribution system
WO2002101490A2 (en) * 2001-06-07 2002-12-19 Contentguard Holdings, Inc. Cryptographic trust zones in digital rights management
CN1539115A (en) * 2001-06-07 2004-10-20 ��̹�е¿عɹɷ����޹�˾ Method and apparatus for managing transfer of rights
US7774280B2 (en) * 2001-06-07 2010-08-10 Contentguard Holdings, Inc. System and method for managing transfer of rights using shared state variables
FR2828301B1 (en) * 2001-07-31 2010-09-03 Validy METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "DETECTION AND COERCITION" AGAINST ITS UNAUTHORIZED USE
US7174466B2 (en) 2001-08-01 2007-02-06 Sas Validy Method to protect software against unwanted use with a “detection and coercion” principle
US7953814B1 (en) 2005-02-28 2011-05-31 Mcafee, Inc. Stopping and remediating outbound messaging abuse
US9160755B2 (en) 2004-12-21 2015-10-13 Mcafee, Inc. Trusted communication network
US9015472B1 (en) 2005-03-10 2015-04-21 Mcafee, Inc. Marking electronic messages to indicate human origination
US20060271493A1 (en) * 2005-05-24 2006-11-30 Contentguard Holdings, Inc. Method and apparatus for executing code in accordance with usage rights
US7438078B2 (en) * 2005-08-05 2008-10-21 Peter Woodruff Sleeping bag and system
CN101473333B (en) * 2006-06-21 2011-09-07 威步系统股份公司 Method and system for intrusion detection
JP2009027525A (en) * 2007-07-20 2009-02-05 Nec Corp Optical transmission system and optical transmission method
US10354229B2 (en) 2008-08-04 2019-07-16 Mcafee, Llc Method and system for centralized contact management
US20120251083A1 (en) * 2011-03-29 2012-10-04 Svendsen Jostein Systems and methods for low bandwidth consumption online content editing
US10739941B2 (en) 2011-03-29 2020-08-11 Wevideo, Inc. Multi-source journal content integration systems and methods and systems and methods for collaborative online content editing
US11748833B2 (en) 2013-03-05 2023-09-05 Wevideo, Inc. Systems and methods for a theme-based effects multimedia editing platform

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3609697A (en) * 1968-10-21 1971-09-28 Ibm Program security device
US4513389A (en) * 1981-11-12 1985-04-23 Ncr Corporation ROM security circuit
EP0084441A3 (en) * 1982-01-19 1984-08-22 Tabs Limited Method and apparatus for the protection of proprietary computer software
FR2550638A1 (en) * 1983-08-11 1985-02-15 Christophe Leveque DEVICE FOR PROTECTING SOFTWARE USED BY A COMPUTER CONNECTED TO AT LEAST ONE PERIPHERAL TERMINAL
US4562306A (en) * 1983-09-14 1985-12-31 Chou Wayne W Method and apparatus for protecting computer software utilizing an active coded hardware device
US4799258A (en) * 1984-02-13 1989-01-17 National Research Development Corporation Apparatus and methods for granting access to computers
US4819267A (en) * 1984-02-22 1989-04-04 Thumbscan, Inc. Solid state key for controlling access to computer systems and to computer software and/or for secure communications
US4791565A (en) * 1984-06-20 1988-12-13 Effective Security Systems, Inc. Apparatus for controlling the use of computer software
EP0175487A3 (en) * 1984-08-23 1989-03-08 Btg International Limited Software protection device
CA1238427A (en) * 1984-12-18 1988-06-21 Jonathan Oseas Code protection using cryptography
CA1270339A (en) * 1985-06-24 1990-06-12 Katsuya Nakagawa System for determining a truth of software in an information processing apparatus
US4683968A (en) * 1985-09-03 1987-08-04 Burroughs Corporation System for preventing software piracy employing multi-encrypted keys and single decryption circuit modules
US4757533A (en) * 1985-09-11 1988-07-12 Computer Security Corporation Security system for microcomputers
GB8522569D0 (en) * 1985-09-12 1985-10-16 Philipsz B E Computer security method
US4827508A (en) * 1986-10-14 1989-05-02 Personal Library Software, Inc. Database usage metering and protection system and method
US4796181A (en) * 1986-10-24 1989-01-03 Wiedemer John D Billing system for computer software
US4817140A (en) * 1986-11-05 1989-03-28 International Business Machines Corp. Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor
FR2610744B1 (en) * 1987-02-05 1991-02-01 Microphar METHOD AND DEVICE FOR LIMITING THE OPERATION OF SOFTWARE

Also Published As

Publication number Publication date
EP0359220A3 (en) 1990-10-17
EP0359220A2 (en) 1990-03-21
AU612098B2 (en) 1991-06-27
US4932054A (en) 1990-06-05
AU4136489A (en) 1990-03-22

Similar Documents

Publication Publication Date Title
CA1321036C (en) Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded hardware device
US3609697A (en) Program security device
EP1324495B1 (en) Programmable logic device with ferrroelectric configuration memories
US5206905A (en) Password protected device using incorrect passwords as seed values for pseudo-random number generator for outputting random data to thwart unauthorized accesses
US5528526A (en) Arbitrary repeating pattern detector
WO1983001848A1 (en) Memory security system
US4698617A (en) ROM Protection scheme
NZ198054A (en) Polernary logic:multilevel circuits
EP0048825B1 (en) Microprocessor controlled machine
JPS61150022A (en) Command unit by key
US5306961A (en) Low-power integrated circuit with selectable battery modes
US5506991A (en) Printer port adapter with overlaid one-wire interface for electronic key
US6272388B1 (en) Program structure and method for industrial control
US7036002B1 (en) System and method for using multiple working memories to improve microprocessor security
Israeli et al. Self-stabilizing ring orientation
US4780840A (en) Method of generating a pseudo-random sequence of signs of a large sequence length
US3969702A (en) Electronic computer with independent functional networks for simultaneously carrying out different operations on the same data
Ruohonen Event detection for ODEs and nonrecursive hierarchies
US20030120941A1 (en) Apparatus for protecting code ROM data in code ROM test
CA1219372A (en) Flexible computer control unit
EP0417611A2 (en) Method and apparatus for protecting computer software using a presettable counter in combination with an additional function
US4697250A (en) Flexible computer control unit
SU1118989A1 (en) Hypergeometric sequence generator
WO1991019067A1 (en) Electronic key integrated circuit
Rosu On safety properties and their monitoring

Legal Events

Date Code Title Description
MKLA Lapsed