CA2080531A1 - Method of protecting computer software from unauthorized execution using multiple keys - Google Patents
Method of protecting computer software from unauthorized execution using multiple keysInfo
- Publication number
- CA2080531A1 CA2080531A1 CA2080531A CA2080531A CA2080531A1 CA 2080531 A1 CA2080531 A1 CA 2080531A1 CA 2080531 A CA2080531 A CA 2080531A CA 2080531 A CA2080531 A CA 2080531A CA 2080531 A1 CA2080531 A1 CA 2080531A1
- Authority
- CA
- Canada
- Prior art keywords
- software
- key
- computer
- algorithm
- keys
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title abstract 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Abstract
A method of protecting computer software is provided by storing a first key in a plug-in hardware device, storing an algorithm for processing a purality of keys including the first key in software to be protected, loading the software containing the algorithm in the computer and plugging in a hardware device in a communications port of the computer. A second key, external to the software, to be protected which bears a relationship to the first key by the algorithm is loaded into the computer where processing takes place of the first and second keys in the algorithm for deriving a control key, if present, for the continued processing of the software being protected. The step of loading the second key is performed using a computer keyboard, any input/output port, a hard disk file or any other method of entry in the computer. Additional keys external to the software which bear a relationship to the first and second keys configured in the algorithm may be provided.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US07/778,497 | 1991-10-17 | ||
US07/778,497 US5222133A (en) | 1991-10-17 | 1991-10-17 | Method of protecting computer software from unauthorized execution using multiple keys |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2080531A1 true CA2080531A1 (en) | 1993-04-18 |
CA2080531C CA2080531C (en) | 1996-06-18 |
Family
ID=25113550
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002080531A Expired - Fee Related CA2080531C (en) | 1991-10-17 | 1992-10-14 | Method of protecting computer software from unauthorized execution using multiple keys |
Country Status (4)
Country | Link |
---|---|
US (1) | US5222133A (en) |
EP (1) | EP0537738B1 (en) |
CA (1) | CA2080531C (en) |
DE (1) | DE69214080T2 (en) |
Families Citing this family (64)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5387196A (en) * | 1992-05-19 | 1995-02-07 | United States Surgical Corporation | Cannula assembly having conductive cannula |
EP0689697A1 (en) * | 1992-09-21 | 1996-01-03 | Uniloc (Singapore) Private Limited | System for software registration |
US5377269A (en) * | 1992-10-29 | 1994-12-27 | Intelligent Security Systems, Inc. | Security access and monitoring system for personal computer |
US5402492A (en) * | 1993-06-18 | 1995-03-28 | Ast Research, Inc. | Security system for a stand-alone computer |
US5542045A (en) * | 1993-10-15 | 1996-07-30 | Software Security, Inc. | Method for interposing a security function in a computer program |
US5694546A (en) | 1994-05-31 | 1997-12-02 | Reisman; Richard R. | System for automatic unattended electronic information transport between a server and a client by a vendor provided transport software with a manifest list |
DE4419635C2 (en) * | 1994-06-04 | 1996-08-29 | Esd Vermoegensverwaltungsgesel | Microcontroller backup procedures |
US5586186A (en) * | 1994-07-15 | 1996-12-17 | Microsoft Corporation | Method and system for controlling unauthorized access to information distributed to users |
JP2970739B2 (en) * | 1994-09-30 | 1999-11-02 | 日本ビクター株式会社 | Optical disc playback control method |
DE9420092U1 (en) * | 1994-12-15 | 1995-02-02 | Marx Datentechnik Gmbh | Software protection module |
US5754761A (en) * | 1995-03-06 | 1998-05-19 | Willsey; John A. | Universal sofeware key process |
NO302388B1 (en) * | 1995-07-13 | 1998-02-23 | Sigurd Sigbjoernsen | Procedure and apparatus for protecting software against unauthorized use |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
US5870468A (en) * | 1996-03-01 | 1999-02-09 | International Business Machines Corporation | Enhanced data privacy for portable computers |
US5737424A (en) * | 1996-06-04 | 1998-04-07 | Software Security, Inc. | Method and system for secure distribution of protected data using elliptic curve systems |
US5854891A (en) * | 1996-08-09 | 1998-12-29 | Tritheim Technologies, Inc. | Smart card reader having multiple data enabling storage compartments |
US6052780A (en) * | 1996-09-12 | 2000-04-18 | Open Security Solutions, Llc | Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information |
AT405466B (en) * | 1996-09-24 | 1999-08-25 | Ericsson Austria Ag | DEVICE FOR PROTECTING AN ELECTRONIC DEVICE |
US5949059A (en) * | 1996-12-09 | 1999-09-07 | International Business Machines Corporation | Tamper evident labelling system with embedded storage device |
US6192475B1 (en) | 1997-03-31 | 2001-02-20 | David R. Wallace | System and method for cloaking software |
US7290288B2 (en) | 1997-06-11 | 2007-10-30 | Prism Technologies, L.L.C. | Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network |
US6023684A (en) * | 1997-10-01 | 2000-02-08 | Security First Technologies, Inc. | Three tier financial transaction system with cache memory |
FR2772532B1 (en) * | 1997-12-16 | 2000-01-07 | Schlumberger Ind Sa | METHOD FOR SECURING THE TRANSMISSION OF A MESSAGE FROM A TRANSMITTING DEVICE TO A RECEIVING DEVICE |
DE19855431A1 (en) * | 1998-11-30 | 2000-05-31 | Bosch Gmbh Robert | Control unit |
US6343280B2 (en) | 1998-12-15 | 2002-01-29 | Jonathan Clark | Distributed execution software license server |
US7032240B1 (en) * | 1999-12-07 | 2006-04-18 | Pace Anti-Piracy, Inc. | Portable authorization device for authorizing use of protected information and associated method |
JP2001216357A (en) * | 2000-02-01 | 2001-08-10 | Toshiba Corp | Software license managing method, electronic equipment, and recording medium |
US7249105B1 (en) * | 2000-03-14 | 2007-07-24 | Microsoft Corporation | BORE-resistant digital goods configuration and distribution methods and arrangements |
US7200230B2 (en) * | 2000-04-06 | 2007-04-03 | Macrovision Corporation | System and method for controlling and enforcing access rights to encrypted media |
US20020087884A1 (en) * | 2000-06-12 | 2002-07-04 | Hovav Shacham | Method and apparatus for enhancing network security protection server performance |
US20020039420A1 (en) * | 2000-06-12 | 2002-04-04 | Hovav Shacham | Method and apparatus for batched network security protection server performance |
US7024696B1 (en) | 2000-06-14 | 2006-04-04 | Reuben Bahar | Method and system for prevention of piracy of a given software application via a communications network |
US20040015725A1 (en) * | 2000-08-07 | 2004-01-22 | Dan Boneh | Client-side inspection and processing of secure content |
US7137143B2 (en) | 2000-08-07 | 2006-11-14 | Ingrian Systems Inc. | Method and system for caching secure web content |
DE10046895A1 (en) * | 2000-09-21 | 2002-04-25 | Siemens Ag | Process for the transmission of encrypted information for the registration of an application program |
US7237123B2 (en) | 2000-09-22 | 2007-06-26 | Ecd Systems, Inc. | Systems and methods for preventing unauthorized use of digital content |
EP1352307A2 (en) * | 2000-09-22 | 2003-10-15 | EDC Systems, Inc. | Systems and methods for preventing unauthorized use of digital content |
US7757278B2 (en) * | 2001-01-04 | 2010-07-13 | Safenet, Inc. | Method and apparatus for transparent encryption |
US7017190B2 (en) * | 2001-03-21 | 2006-03-21 | Weber Warren D | Portable recordable media anti-theft system |
WO2002091146A2 (en) * | 2001-05-09 | 2002-11-14 | Ecd Systems, Inc. | Systems and methods for the prevention of unauthorized use and manipulation of digital content |
JP2005512170A (en) * | 2001-11-12 | 2005-04-28 | ネットワーク リサーチ ラブ リミテッド | Information protection method and apparatus against unauthorized use |
US6871192B2 (en) * | 2001-12-20 | 2005-03-22 | Pace Anti-Piracy | System and method for preventing unauthorized use of protected software utilizing a portable security device |
US20030212639A1 (en) * | 2002-05-06 | 2003-11-13 | Cronce Paul A. | Method and system for providing secure authoring services for protected software |
US7290144B1 (en) * | 2002-06-21 | 2007-10-30 | Paul Thomas Kitaj | Access-control method for software modules and programmable electronic device therefor |
US20070107067A1 (en) * | 2002-08-24 | 2007-05-10 | Ingrian Networks, Inc. | Secure feature activation |
US7835520B2 (en) * | 2003-02-20 | 2010-11-16 | Zoran Corporation | Unique identifier per chip for digital audio/video data encryption/decryption in personal video recorders |
US20060149962A1 (en) * | 2003-07-11 | 2006-07-06 | Ingrian Networks, Inc. | Network attached encryption |
US7519835B2 (en) * | 2004-05-20 | 2009-04-14 | Safenet, Inc. | Encrypted table indexes and searching encrypted tables |
US7953814B1 (en) | 2005-02-28 | 2011-05-31 | Mcafee, Inc. | Stopping and remediating outbound messaging abuse |
US9160755B2 (en) | 2004-12-21 | 2015-10-13 | Mcafee, Inc. | Trusted communication network |
US9015472B1 (en) | 2005-03-10 | 2015-04-21 | Mcafee, Inc. | Marking electronic messages to indicate human origination |
US20070079140A1 (en) * | 2005-09-26 | 2007-04-05 | Brian Metzger | Data migration |
US20070079386A1 (en) * | 2005-09-26 | 2007-04-05 | Brian Metzger | Transparent encryption using secure encryption device |
US7618214B2 (en) * | 2006-02-03 | 2009-11-17 | Maritime International, Inc. | Containment boom guide system and method |
US8386768B2 (en) * | 2006-02-08 | 2013-02-26 | Safenet, Inc. | High performance data encryption server and method for transparently encrypting/decrypting data |
US7958091B2 (en) | 2006-02-16 | 2011-06-07 | Ingrian Networks, Inc. | Method for fast bulk loading data into a database while bypassing exit routines |
US7788727B2 (en) * | 2006-10-13 | 2010-08-31 | Sony Corporation | System and method for piggybacking on interface license |
US8379865B2 (en) * | 2006-10-27 | 2013-02-19 | Safenet, Inc. | Multikey support for multiple office system |
EP2223256A1 (en) * | 2007-11-17 | 2010-09-01 | Uniloc Usa, Inc. | System and method for adjustable licensing of digital products |
US20090132804A1 (en) * | 2007-11-21 | 2009-05-21 | Prabir Paul | Secured live software migration |
US20090285390A1 (en) * | 2008-05-16 | 2009-11-19 | Ati Technologies Ulc | Integrated circuit with secured software image and method therefor |
US10354229B2 (en) | 2008-08-04 | 2019-07-16 | Mcafee, Llc | Method and system for centralized contact management |
US8423473B2 (en) * | 2009-06-19 | 2013-04-16 | Uniloc Luxembourg S. A. | Systems and methods for game activation |
US9633183B2 (en) | 2009-06-19 | 2017-04-25 | Uniloc Luxembourg S.A. | Modular software protection |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4609777A (en) * | 1984-02-22 | 1986-09-02 | Gordian Systems, Inc. | Solid state key for controlling access to computer software |
US4599489A (en) * | 1984-02-22 | 1986-07-08 | Gordian Systems, Inc. | Solid state key for controlling access to computer software |
US4817140A (en) * | 1986-11-05 | 1989-03-28 | International Business Machines Corp. | Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor |
US4866769A (en) * | 1987-08-05 | 1989-09-12 | Ibm Corporation | Hardware assist for protecting PC software |
FR2618926B1 (en) * | 1987-10-30 | 1990-06-08 | Microphar | MEMORY DEVICE FOR CONTROLLING THE USE OF SOFTWARE, OF THE KEY TYPE |
US4959861A (en) * | 1988-07-13 | 1990-09-25 | Howlette Edward L | Security system for computer software |
CA2000594A1 (en) * | 1989-09-14 | 1991-03-14 | Wayne W. Chou | Method and apparatus for protecting computer software using a presettable counter in combination with an additional function |
FR2654851B1 (en) * | 1989-11-23 | 1992-03-27 | Schlumberger Ind Sa | METHOD AND SYSTEM FOR SECURE OPERATION OF SOFTWARE. |
US5033084A (en) * | 1990-04-02 | 1991-07-16 | Data I/O Corporation | Method and apparatus for protection of software in an electronic system |
US5081676A (en) * | 1990-10-04 | 1992-01-14 | Chou Wayne W | Method and apparatus for protecting multiple copies of computer software from unauthorized use |
-
1991
- 1991-10-17 US US07/778,497 patent/US5222133A/en not_active Expired - Lifetime
-
1992
- 1992-10-14 CA CA002080531A patent/CA2080531C/en not_active Expired - Fee Related
- 1992-10-15 EP EP92117624A patent/EP0537738B1/en not_active Expired - Lifetime
- 1992-10-15 DE DE69214080T patent/DE69214080T2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
EP0537738A2 (en) | 1993-04-21 |
EP0537738A3 (en) | 1993-08-11 |
DE69214080D1 (en) | 1996-10-31 |
DE69214080T2 (en) | 1997-02-27 |
CA2080531C (en) | 1996-06-18 |
EP0537738B1 (en) | 1996-09-25 |
US5222133A (en) | 1993-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2080531A1 (en) | Method of protecting computer software from unauthorized execution using multiple keys | |
CA2051576A1 (en) | Method and apparatus for protecting multiple copies of computer software from unauthorized use | |
US6453417B1 (en) | Microcontroller with secure signature extraction | |
EP0297347A3 (en) | Method to prevent use of incorrect program version in a computer system | |
AU3830399A (en) | Terminal and system for implementing secure electronic transactions | |
PL324525A1 (en) | Method of protecting computer software against unauthorised use | |
AU1432301A (en) | Adaptable security mechanism for preventing unauthorized access of digital data | |
EP0382468A3 (en) | Power-on password functions for computer system | |
EP0276930A3 (en) | Electronic locking system | |
WO1997004412A3 (en) | Method for protecting publicly distributed software | |
EP0268141A3 (en) | Remote access terminal security | |
CA2448614A1 (en) | Storage access keys | |
CN1353365A (en) | Use method of safety cipher in nonsafety programming environment | |
AU2001270814A1 (en) | Digital data protection arrangement | |
WO2001031422A3 (en) | Method for protection against analysis of unintended side-channel signals | |
JPS63240629A (en) | Secret protection of program and maintenance control of program with protected secret | |
EP0334503A3 (en) | Data-processing apparatus and method | |
WO2004012029A3 (en) | Restricting access to a method in a component | |
KR20020071274A (en) | Universal Serial Bus(USB) security secondary storage device using Crypto Chip and Flash memory based on PC | |
US20210012037A1 (en) | Proofing against tampering with a computer | |
JPH05158879A (en) | Keyboard lock type secrecy protecting device | |
JPS6432355A (en) | Data processor | |
JPS58221428A (en) | Method for inhibiting key input | |
JPH02253338A (en) | Initialization system for security information | |
KR950003384Y1 (en) | Software protect apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |