DE69214080D1 - Verfahren zum Schutz von Programmen durch Verwendung verschiedener Schlüssel gegen unberechtigte Durchführung - Google Patents

Verfahren zum Schutz von Programmen durch Verwendung verschiedener Schlüssel gegen unberechtigte Durchführung

Info

Publication number
DE69214080D1
DE69214080D1 DE69214080T DE69214080T DE69214080D1 DE 69214080 D1 DE69214080 D1 DE 69214080D1 DE 69214080 T DE69214080 T DE 69214080T DE 69214080 T DE69214080 T DE 69214080T DE 69214080 D1 DE69214080 D1 DE 69214080D1
Authority
DE
Germany
Prior art keywords
procedure
against unauthorized
different keys
keys against
unauthorized execution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
DE69214080T
Other languages
English (en)
Other versions
DE69214080T2 (de
Inventor
Wayne W Chou
Richard Erett
Joseph M Kulinets
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SORTWARE SECURITY Inc
Original Assignee
SORTWARE SECURITY Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SORTWARE SECURITY Inc filed Critical SORTWARE SECURITY Inc
Publication of DE69214080D1 publication Critical patent/DE69214080D1/de
Application granted granted Critical
Publication of DE69214080T2 publication Critical patent/DE69214080T2/de
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
DE69214080T 1991-10-17 1992-10-15 Verfahren zum Schutz von Programmen durch Verwendung verschiedener Schlüssel gegen unberechtigte Durchführung Expired - Fee Related DE69214080T2 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US07/778,497 US5222133A (en) 1991-10-17 1991-10-17 Method of protecting computer software from unauthorized execution using multiple keys

Publications (2)

Publication Number Publication Date
DE69214080D1 true DE69214080D1 (de) 1996-10-31
DE69214080T2 DE69214080T2 (de) 1997-02-27

Family

ID=25113550

Family Applications (1)

Application Number Title Priority Date Filing Date
DE69214080T Expired - Fee Related DE69214080T2 (de) 1991-10-17 1992-10-15 Verfahren zum Schutz von Programmen durch Verwendung verschiedener Schlüssel gegen unberechtigte Durchführung

Country Status (4)

Country Link
US (1) US5222133A (de)
EP (1) EP0537738B1 (de)
CA (1) CA2080531C (de)
DE (1) DE69214080T2 (de)

Families Citing this family (64)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5387196A (en) * 1992-05-19 1995-02-07 United States Surgical Corporation Cannula assembly having conductive cannula
NZ255971A (en) * 1992-09-21 1997-05-26 Uniloc Singapore Private Ltd Software registration and licensing system uses matching of licensee indentification codes
US5377269A (en) * 1992-10-29 1994-12-27 Intelligent Security Systems, Inc. Security access and monitoring system for personal computer
US5402492A (en) * 1993-06-18 1995-03-28 Ast Research, Inc. Security system for a stand-alone computer
US5542045A (en) * 1993-10-15 1996-07-30 Software Security, Inc. Method for interposing a security function in a computer program
US5694546A (en) 1994-05-31 1997-12-02 Reisman; Richard R. System for automatic unattended electronic information transport between a server and a client by a vendor provided transport software with a manifest list
DE4419635C2 (de) * 1994-06-04 1996-08-29 Esd Vermoegensverwaltungsgesel Microcontrollersicherungsverfahren
US5586186A (en) * 1994-07-15 1996-12-17 Microsoft Corporation Method and system for controlling unauthorized access to information distributed to users
JP2970739B2 (ja) * 1994-09-30 1999-11-02 日本ビクター株式会社 光ディスクの再生制御方法
DE9420092U1 (de) * 1994-12-15 1995-02-02 Marx Datentechnik Gmbh Modul zum Schutz von Software
US5754761A (en) * 1995-03-06 1998-05-19 Willsey; John A. Universal sofeware key process
NO302388B1 (no) * 1995-07-13 1998-02-23 Sigurd Sigbjoernsen Fremgangsmåte og anordning for å beskytte programvare mot bruk uten tillatelse
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
US5870468A (en) * 1996-03-01 1999-02-09 International Business Machines Corporation Enhanced data privacy for portable computers
US5737424A (en) * 1996-06-04 1998-04-07 Software Security, Inc. Method and system for secure distribution of protected data using elliptic curve systems
US5854891A (en) * 1996-08-09 1998-12-29 Tritheim Technologies, Inc. Smart card reader having multiple data enabling storage compartments
US6052780A (en) * 1996-09-12 2000-04-18 Open Security Solutions, Llc Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information
AT405466B (de) 1996-09-24 1999-08-25 Ericsson Austria Ag Vorrichtung zum schutz eines elektronischen geräts
US5949059A (en) * 1996-12-09 1999-09-07 International Business Machines Corporation Tamper evident labelling system with embedded storage device
US6192475B1 (en) 1997-03-31 2001-02-20 David R. Wallace System and method for cloaking software
US7290288B2 (en) 1997-06-11 2007-10-30 Prism Technologies, L.L.C. Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network
US6023684A (en) * 1997-10-01 2000-02-08 Security First Technologies, Inc. Three tier financial transaction system with cache memory
FR2772532B1 (fr) * 1997-12-16 2000-01-07 Schlumberger Ind Sa Procede de securisation de la transmission d'un message d'un dispositif emetteur a un dispositif recepteur
DE19855431A1 (de) * 1998-11-30 2000-05-31 Bosch Gmbh Robert Steuergerät
US6343280B2 (en) 1998-12-15 2002-01-29 Jonathan Clark Distributed execution software license server
US7032240B1 (en) * 1999-12-07 2006-04-18 Pace Anti-Piracy, Inc. Portable authorization device for authorizing use of protected information and associated method
JP2001216357A (ja) * 2000-02-01 2001-08-10 Toshiba Corp ソフトウェアのライセンス管理方法および電子機器並びに記録媒体
US7249105B1 (en) * 2000-03-14 2007-07-24 Microsoft Corporation BORE-resistant digital goods configuration and distribution methods and arrangements
US7200230B2 (en) * 2000-04-06 2007-04-03 Macrovision Corporation System and method for controlling and enforcing access rights to encrypted media
US20020087884A1 (en) * 2000-06-12 2002-07-04 Hovav Shacham Method and apparatus for enhancing network security protection server performance
US20020039420A1 (en) * 2000-06-12 2002-04-04 Hovav Shacham Method and apparatus for batched network security protection server performance
US7024696B1 (en) 2000-06-14 2006-04-04 Reuben Bahar Method and system for prevention of piracy of a given software application via a communications network
US20040015725A1 (en) * 2000-08-07 2004-01-22 Dan Boneh Client-side inspection and processing of secure content
US7137143B2 (en) 2000-08-07 2006-11-14 Ingrian Systems Inc. Method and system for caching secure web content
DE10046895A1 (de) * 2000-09-21 2002-04-25 Siemens Ag Verfahren zur Übermittlung verschlüsselter Informationen zur Registrierung eines Applikationsprogramms
US7237123B2 (en) 2000-09-22 2007-06-26 Ecd Systems, Inc. Systems and methods for preventing unauthorized use of digital content
CA2435624C (en) * 2000-09-22 2013-05-07 Richard B. Levine Systems and methods for preventing unauthorized use of digital content
US7757278B2 (en) * 2001-01-04 2010-07-13 Safenet, Inc. Method and apparatus for transparent encryption
US7017190B2 (en) * 2001-03-21 2006-03-21 Weber Warren D Portable recordable media anti-theft system
US7328453B2 (en) * 2001-05-09 2008-02-05 Ecd Systems, Inc. Systems and methods for the prevention of unauthorized use and manipulation of digital content
US20040255136A1 (en) * 2001-11-12 2004-12-16 Alexey Borisovich Fadyushin Method and device for protecting information against unauthorised use
US6871192B2 (en) * 2001-12-20 2005-03-22 Pace Anti-Piracy System and method for preventing unauthorized use of protected software utilizing a portable security device
US20030212639A1 (en) * 2002-05-06 2003-11-13 Cronce Paul A. Method and system for providing secure authoring services for protected software
US7290144B1 (en) * 2002-06-21 2007-10-30 Paul Thomas Kitaj Access-control method for software modules and programmable electronic device therefor
AU2003262857A1 (en) * 2002-08-24 2004-03-11 Ingrian Networks, Inc. Selective feature activation
US7835520B2 (en) * 2003-02-20 2010-11-16 Zoran Corporation Unique identifier per chip for digital audio/video data encryption/decryption in personal video recorders
US20060149962A1 (en) * 2003-07-11 2006-07-06 Ingrian Networks, Inc. Network attached encryption
US7519835B2 (en) * 2004-05-20 2009-04-14 Safenet, Inc. Encrypted table indexes and searching encrypted tables
US7953814B1 (en) 2005-02-28 2011-05-31 Mcafee, Inc. Stopping and remediating outbound messaging abuse
US9160755B2 (en) 2004-12-21 2015-10-13 Mcafee, Inc. Trusted communication network
US9015472B1 (en) 2005-03-10 2015-04-21 Mcafee, Inc. Marking electronic messages to indicate human origination
US20070079386A1 (en) * 2005-09-26 2007-04-05 Brian Metzger Transparent encryption using secure encryption device
US20070079140A1 (en) * 2005-09-26 2007-04-05 Brian Metzger Data migration
WO2007092374A2 (en) * 2006-02-03 2007-08-16 Maritime International, Inc. Improved containment boom guide system and method
US8386768B2 (en) * 2006-02-08 2013-02-26 Safenet, Inc. High performance data encryption server and method for transparently encrypting/decrypting data
US7958091B2 (en) 2006-02-16 2011-06-07 Ingrian Networks, Inc. Method for fast bulk loading data into a database while bypassing exit routines
US7788727B2 (en) * 2006-10-13 2010-08-31 Sony Corporation System and method for piggybacking on interface license
US8379865B2 (en) * 2006-10-27 2013-02-19 Safenet, Inc. Multikey support for multiple office system
US8566960B2 (en) * 2007-11-17 2013-10-22 Uniloc Luxembourg S.A. System and method for adjustable licensing of digital products
US20090132804A1 (en) * 2007-11-21 2009-05-21 Prabir Paul Secured live software migration
US20090285390A1 (en) * 2008-05-16 2009-11-19 Ati Technologies Ulc Integrated circuit with secured software image and method therefor
US10354229B2 (en) 2008-08-04 2019-07-16 Mcafee, Llc Method and system for centralized contact management
US8423473B2 (en) * 2009-06-19 2013-04-16 Uniloc Luxembourg S. A. Systems and methods for game activation
US9633183B2 (en) 2009-06-19 2017-04-25 Uniloc Luxembourg S.A. Modular software protection

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4599489A (en) * 1984-02-22 1986-07-08 Gordian Systems, Inc. Solid state key for controlling access to computer software
US4609777A (en) * 1984-02-22 1986-09-02 Gordian Systems, Inc. Solid state key for controlling access to computer software
US4817140A (en) * 1986-11-05 1989-03-28 International Business Machines Corp. Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor
US4866769A (en) * 1987-08-05 1989-09-12 Ibm Corporation Hardware assist for protecting PC software
FR2618926B1 (fr) * 1987-10-30 1990-06-08 Microphar Dispositif a memoire de controle de l'utilisation d'un logiciel, du type cle
US4959861A (en) * 1988-07-13 1990-09-25 Howlette Edward L Security system for computer software
CA2000594A1 (en) * 1989-09-14 1991-03-14 Wayne W. Chou Method and apparatus for protecting computer software using a presettable counter in combination with an additional function
FR2654851B1 (fr) * 1989-11-23 1992-03-27 Schlumberger Ind Sa Procede et systeme d'exploitation securisee d'un logiciel.
US5033084A (en) * 1990-04-02 1991-07-16 Data I/O Corporation Method and apparatus for protection of software in an electronic system
US5081676A (en) * 1990-10-04 1992-01-14 Chou Wayne W Method and apparatus for protecting multiple copies of computer software from unauthorized use

Also Published As

Publication number Publication date
US5222133A (en) 1993-06-22
EP0537738B1 (de) 1996-09-25
CA2080531A1 (en) 1993-04-18
DE69214080T2 (de) 1997-02-27
EP0537738A2 (de) 1993-04-21
CA2080531C (en) 1996-06-18
EP0537738A3 (en) 1993-08-11

Similar Documents

Publication Publication Date Title
DE69214080T2 (de) Verfahren zum Schutz von Programmen durch Verwendung verschiedener Schlüssel gegen unberechtigte Durchführung
DE69610905D1 (de) Verfahren zum schutz von ausführbaren softwareprogrammen gegen infektion durch softwareviren
DE69123680T2 (de) Verfahren und Vorrichtung zum Schutz von Mehrfachrechner-Softwarekopien gegen unberechtigte Benutzung
DE69738722D1 (de) Verfahren zum Schutz eines von einem Sicherheitselement zu einem Dekoder übertragenen Informationselements, Sicherheitselement und Dekoder welcher ein solches Verfahren benutzt
DE69421206D1 (de) Verfahren zum installieren von Klammern
DE69513483D1 (de) Verfahren zum Flammhemmendausrüsten von Kunstharzen
DE59409565D1 (de) Verfahren zur Verbesserung der Sicherheit von Frankiermaschinen
DE69634326D1 (de) Verfahren zum Authentifizieren eines Anwendungsprogramms
DE69113174D1 (de) Verfahren und Zusammensetzung zum Schutz von Chromstahl.
DE69131562T2 (de) Verfahren und Anordnung zur Wiederherstellung von durch Parität geschützten Daten
DE3851724T2 (de) Verfahren und Gerät zum Schutz von Kopiersignalen.
DE69232047D1 (de) Verfahren zum hemmen von bewuchs
DE69208347D1 (de) Anordnung und Verfahren zum Schützen von Oberflächen
DE69331887T2 (de) Verfahren zum Lernen von Mustern
DE3869544D1 (de) Verfahren zum schutz von zementmaterialien vor verfall.
DE69428552D1 (de) Verfahren zum Nachweis von seltenen Ereignissen
DE69020402D1 (de) Zusammensetzung zum Beglaubigen eines Sicherheitspapiers.
DE69201871D1 (de) Verfahren zum Schützen und Verfestigen von steinähnlichen Werkstoffen.
DE59402856D1 (de) Verfahren zum Färben oder Bedrucken von cellulosehaltigen Fasermaterialien
ATE192534T1 (de) Auskleidung zum schutz von pfosten gegen untergrundverfall
DE69114048D1 (de) Verfahren zum Schützen von keramischen Oberflächen.
DE9408321U1 (de) Vorrichtung zum Sperren von Türen
DE69422888D1 (de) Verfahren zum Dispergieren von Pigmenten
DE69426025T2 (de) Verfahren zum behandeln von textilien
DE59408003D1 (de) Verfahren zum Schutz von Faserwerkstoffen

Legal Events

Date Code Title Description
8364 No opposition during term of opposition
8339 Ceased/non-payment of the annual fee