WO1997003398A1 - Protection of software against use without permit - Google Patents
Protection of software against use without permit Download PDFInfo
- Publication number
- WO1997003398A1 WO1997003398A1 PCT/NO1996/000171 NO9600171W WO9703398A1 WO 1997003398 A1 WO1997003398 A1 WO 1997003398A1 NO 9600171 W NO9600171 W NO 9600171W WO 9703398 A1 WO9703398 A1 WO 9703398A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- algorithm
- key
- software
- external unit
- accordance
- Prior art date
Links
- 238000004891 communication Methods 0.000 claims abstract description 29
- 238000012545 processing Methods 0.000 claims abstract description 7
- 238000000034 method Methods 0.000 claims description 43
- 238000012546 transfer Methods 0.000 claims description 31
- 238000003860 storage Methods 0.000 claims description 12
- 238000013475 authorization Methods 0.000 claims description 7
- 238000009826 distribution Methods 0.000 claims description 4
- 230000009977 dual effect Effects 0.000 claims description 2
- 238000004519 manufacturing process Methods 0.000 claims description 2
- 238000002360 preparation method Methods 0.000 claims description 2
- 108091006146 Channels Proteins 0.000 claims 10
- 230000000694 effects Effects 0.000 claims 2
- 239000000758 substrate Substances 0.000 claims 2
- 108091005462 Cation channels Proteins 0.000 claims 1
- 230000002093 peripheral effect Effects 0.000 claims 1
- 230000001550 time effect Effects 0.000 claims 1
- 230000006870 function Effects 0.000 description 13
- 238000013478 data encryption standard Methods 0.000 description 9
- 238000004590 computer program Methods 0.000 description 6
- 239000003795 chemical substances by application Substances 0.000 description 2
- 239000012634 fragment Substances 0.000 description 2
- 238000007796 conventional method Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/109—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by using specially-adapted hardware at the client
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/127—Trusted platform modules [TPM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Definitions
- Present invention relates to the protection of software, in particular freely distributed application software, against use without permission of the copyright holder; and concerns in particular a method of preventing unauthorized utilization of software in a computer; a method and device for preparing software for the utilization in a computer only with a corresponding authorization; and a method and device for allowing authorized utilization of software in a computer which has been prepared according to an aspect of the invention.
- Piracy copying of software is an extensive problem to software vendors which annually costs them large amounts of money.
- an arrangement making it possible to use a certain computer program or a computer program package only if the permission of the copyright holder really exists would be of great importance.
- This unit may take the form of a blind plug (also termed "dongle"), for example, which is connected directly to one of the input-output terminals of the computer, and containing fixed tables, identity number, or the like, stored in an internal memory from which information is read upon the request of a programmed additional routine included for this purpose in the application program in question.
- the unit may also take the form of a card reader station, or the like, in which a card is inserted, the matter stored on the card in principle being similar to that of the blind plug above.
- the checking procedure involves that the additional routine of the program makes a direct comparison of the program identity, for example, and a corresponding item of information present in the stored table.
- the additional routine which must be included in the software constitutes the main disadvantage of all such known devices. By simply removing such routines the software will operate normally, and the protection against unauthorized utilization would be lost. Also, during the exchange of data between the processor of the computer and the memory of the unit or card, it is possible to observe the information, and as the course of this information exchanged is the same each time the program is used, it is possible also to reveal the matter stored in the external memory. Even if the contents of the memory is encrypted in one way or another, such kind of recurrence across the communication interface makes it possible to simulate a corresponding hardware unit, for example, or "break the code" by means of relatively modest computing power.
- the RSA crypto system is an asymmetric, two-key system (also termed public-key / private-key crypto system), and in the case of the arrangement according to GB patent application no. 2 163 577, one key only is used which, per se, may be known (the public key) to encrypt the DES key while another key which the user must not get to know (the private or secret key) is used to decrypt the DES key.
- the public key the public key
- the private or secret key is used to decrypt the DES key.
- the latter key i.e.
- the secret key is stored in a memory in the tamper-proof housing and is fetched by the processor in the housing when needed to decrypt encrypted DES keys, each of which belonging to an encrypted application program, for the purpose of being able to execute such an application program.
- An object of the present invention is to provide a crypto arrangement giving suppliers and/or proprietors of the software an improved possibility of protecting their product against unauthorized utilization, and which does not suffer from the drawbacks of prior art, in such a manner that the software can be copied and distributed without restrictions, but yet not be used unless the necessary permission is present.
- a further object of the invention is to provide a crypto arrangement of a universal nature which is able to accommodate not only individual software modules but entire program packages, wherein permission of use may be assigned at different levels, such as for selected parts of a program package.
- a first general aspect of the present invention relates to a method of preventing unauthorized utilization of software in a computer, the method comprising the steps of:
- Another aspect of the present invention relates to a method of preparing software, particularly software intended for free distribution, for the utilization in a computer only with a corresponding authorization, the method comprising encrypting in accordance with a first algorithm at least a part of said software which by the utilization in said computer is decrypted in accordance with a second algorithm, the method being characterized in that a key which is employed for said encryption in accordance with the first algorithm, is a first key which is different from a second key which is employed in the execution of the decryption in accordance with the second algorithm of that part of the software which is encrypted in accordance with the first algorithm and first key.
- the invention also relates to a device for the preparation of software, particularly software intended for free distribution, to be utilized in a computer only with a corresponding authorization, the device comprising:
- - crypto means effecting the encryption of at least a part of said software in accordance with a first algorithm and a first key
- an external unit adapted to be connected to said computer, the external unit at least comprising a processor of its own and a computer readable storage medium for storing a second algorithm and a key, and being disposed to execute decryption of the encrypted part of the software in accordance with said second algorithm and key
- the device being characterized in that it further comprises generator means to provide said second algorithm and a second key intended to be employed in said decryption in accordance with the second algorithm, the second key being different from the first key employed by said crypto means in the execution of the encryption of said part of the software in accordance with the first algorithm.
- a third aspect of the invention relates to a method of making authorized utilization possible in a computer, of software, particularly freely distributed software, which is prepared according to a mode of the second aspect of the invention, the method comprising connecting an external unit to said computer, the external unit at least comprising a computer readable storage medium and a processor of its own, and a second algorithm and a key to be employed in the decryption of the encrypted part of the software being stored in said external unit.
- the method is characterized in that when the computer in the execution of that part of the software which is encrypted in accordance with the first algorithm encounters a call sequence, or a similar instruction, causing a jump to a corresponding entry point to said added object code, this object code is utilized by the computer to establish a communication channel to the external unit through which channel the encrypted part of the software is transferred in a first transfer session to the external unit to be decrypted by the unit's own processor in accordance with a second algorithm and a second key both of which being stored in said external unit, this second key being different from the first key employed in the execution of the encryption of said part of the software in accordance with the first algorithm, and the decrypted software part then being processed in the external unit and the result transferred in a second transfer session the opposite direction through the communication channel for the further utilization in the computer.
- the invention also relates to a device for making authorized utilization of software possible, particularly freely distributed software, prepared by means of a device according to the second aspect of the invention, the device comprising a computer adapted to serve as a host computer for an external unit which at least comprises a processor of its own and a computer readable storage medium, and being intended to be connected to the host computer for the communication therewith.
- this device is then characterized in that said external unit comprises decryption means adapted to execute decryption in accordance with said second algorithm and said second key produced by said generator means, the second key being different from the first key used by said crypto means in the execution of the encryption of said part of the software in accordance with the first algorithm.
- Figure 1 illustrates a preferred hardware configuration according to the invention
- Figure 2 is a simplified general software diagram according to the invention
- Figure 3 illustrates schematically how a common command or execution file (.EXE file) is generated without encryption
- Figures 4 and 5 illustrates schematically how encryption on the level of source code can be carried out according to the invention
- Figure 6 illustrates schematically the partitioning of software onto a magnetic storage disk and a random access memory (RAM), respectively
- Figure 7 illustrates schematically the utilization of protected software in a computer
- Figure 8 shows an example of an encryption process of the type shown in Figures 4 and 5
- Figure 9 illustrates schematically the utilization of protected software in a computer
- Figure 10 illustrates schematically an application area including access checking or authentication
- Figure 11 is a flow chart schematically illustrating a course of processes including encryption-decryption and scrambling-descrambling according to a preferred embodiment of the invention.
- Figure 1 illustrates a preferred hardware configuration of the invention and which shows a computer having the form of a workstation or personal computer (PC) serving as a host computer according to the invention.
- an external unit according to the invention is shown to be in the form of a card reader or processor, particularly for Smart Cards, provided with a commercially available integrated microprocessor, e.g. of the CCA12103 type, the unit being included in the computer shown or disposed in a separate unit of equipment connected to the computer by a serial or parallel connection.
- a commercially available integrated microprocessor e.g. of the CCA12103 type
- Figure 1 also illustrates that now the secured software may be distributed through different types of data networks to which the computer may establish a connection, such as wide area networks (WAN), local area networks (LAN), and, in particular, Internet.
- WAN wide area networks
- LAN local area networks
- Internet Internet
- the software may in deed, as usual, be distributed on flexible disks and/or CD- ROMs (readable only, compact laser disks). In any case, the software may be copied and installed without restrictions.
- the software Since the software is protected against unauthorized utilization, there is no need for any kind of copy protection of the software as the case otherwise often may be.
- the authorization is embedded in the Smart Card, and it is not available to anyone else but the supplier of the software who himself installs the necessary decryption algorithms and the keys on the card. Hence, the permit to use a certain computer program is found on the card, not in the respective program, or another part of the software.
- the protection is provided by the insertion, in different locations of the software, of program calls to the Smart Card, or to special software at the disposal to the card, thereby obtaining the information necessary to proceed correctly in the execution of the protected program.
- this information may be certain parameters which are used when the program is executed, and which is determined by those who wish to protect their software. Because they are necessary for the software to work properly, such program calls cannot be removed.
- the interaction of the protected program with the Smart Card is controlled by the special software (object code) entered into the data library of the program when the original program is encrypted.
- This special software may also provide for scrambling of the communication between the computer and the Smart Card.
- Figure 3 shows how a common command or execution file (.EXE file) is generated without encryption; and Figures 4 and 5, each in their own manner, depict how encryption can be carried out on the source code level according to the invention.
- Figure 6 illustrates that the software itself is placed on a magnetic storage disk, whereas the special program (object code or data library) is supplied to the random access memory (RAM) of the computer.
- object code or data library is supplied to the random access memory (RAM) of the computer.
- FIGS 7 and 9 illustrate such processes which take place when the protected software is utilized in a computer.
- Figure 8 shows an example of an encryption process of the type shown in Figures 4 and 5.
- the source code is present in a high level programming language, such as Pascal, C, Modula, or the like. It is the source code that is being encrypted and thus protected against so-called unauthorized use.
- a few parameters are selected which are encrypted by means of an encryption function g.
- the decrypt program is located in the "spesial software" (the added object code) which constitutes a part of the protected software (see Figure 5).
- This special software also comprises scrambling and descrambling functions, which here are denoted and f 1 , as well programs for the communication with the Smart Card (see Figure 7).
- the functions f an ⁇ f 1 employ keys which are fetched from the Smart Card, the Smart Card itself containing: - a number generator to produce a random value of variable T located in the protected software, - a secret key for the decryption function g '1 ,
- the encryption function g and decryption function g '1 represent a public key crypto system not being symmetric. This means that the encryption function g employs a public key which may be known, this key, however, not being sufficient to arrive at the decryption function g '1 (neither its algorithm, nor its key). Thus, the algorithm and key for the decryption function g '1 is placed on the Smart Card, from which they are never transmitted.
- Smart Cards i.e. users
- a Smart Card may then contain licenses, or per ⁇ missions, at several levels for various software packages which have the same authentication format and algorithms.
- a first level of encryption employing an unsymmetric, dual key encryption arrangement (public key / private key crypto system), such as the RSA crypto system, whereby the public key is available only to the software producer, and the private key is a secret key which the manufacturer of the Smart Card enters into the read only memory (ROM) of the Smart Card according to specifications given by the software producer.
- the private key may be different for each program package.
- An unsymmetric, encrypted authentication key which is transferred to the Smart Card when the running of protected software begins and which is decrypted in the Smart Card by means of a private key no. 0 to initiate an authentication process in the Smart Card.
- a second level of encryption whereby the communication between the host computer and Smart Card is such that it becomes difficult to trace anything making sense from that communication by the logging thereof.
- the algorithms to be employed are located both in the protected software and the Smart Card, and both the encryption keys and the decryption keys are located in the Smart Card, i.e. hidden to the user.
- the encryption algorithm and key may be different for various types of software.
- Figure 10 serves to demonstrate that the application area of the arrangement according to the invention is extendable also to cover access checking, or authentication, for example, as further possibilities also may exist.
- the software to be protected may be provided with an authentication key encrypted by employing a so-called public key and an identification number for the software package in question.
- the external unit such as the Smart Card, would contain decryption algorithms which preferably are mask programmed, and a private key no. 0 (in the ROM) to be used to decrypt the authentication key, as well as an access or authentication table which may be configured as the table shown below.
- PID denotes the identity number of the software, such that different programs are assigned dissimilar identity numbers which also may contain the version number of the respective software products, or the like, for example.
- AcL denotes the access level or status, such as:
- a time limit for the use of a program e.g. a permission expiration date
- the entries in the access level column, AcL, of the table are amendable by the importer or agent of the software product, for example.
- the software producer specifies the secret keys to be employed in the decryption of the encrypted fragments dependent on the identity number, PID, of the software.
- the secret keys are mask programmed in the Smart Card and are not available to anyone else.
- Figure 11 is a flow chart schematically illustrating a principally complete course of processes according to a preferred embodiment of the invention, the steps being:
- a Smart Card constitutes the preferred implementation of the external units indicated in the claims below. This is quite simply because the Smart Card technology is considered as being the most "tamper-proof" protection of the algorithms, keys, a.s.o., which necessarily have to be stored in the external unit, or in a separate article, according to the annexed claims.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mathematical Physics (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Storage Device Security (AREA)
- Emergency Protection Circuit Devices (AREA)
- Devices For Executing Special Programs (AREA)
- Pharmaceuticals Containing Other Organic And Inorganic Compounds (AREA)
- Moving Of Heads (AREA)
- Orthopedics, Nursing, And Contraception (AREA)
Abstract
Description
Claims
Priority Applications (12)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DK96925180T DK0855052T3 (en) | 1995-07-13 | 1996-07-10 | Protection of software against unauthorized use |
IL12288896A IL122888A (en) | 1995-07-13 | 1996-07-10 | Protection of software against use without permit |
AT96925180T ATE233916T1 (en) | 1995-07-13 | 1996-07-10 | PROTECTION OF SOFTWARE AGAINST USE WITHOUT PERMISSION |
JP50571097A JP4267065B2 (en) | 1995-07-13 | 1996-07-10 | Software protection against unauthorized use |
US08/983,461 US6266416B1 (en) | 1995-07-13 | 1996-07-10 | Protection of software against use without permit |
CA002226386A CA2226386C (en) | 1995-07-13 | 1996-07-10 | Protection of software against use without permit |
EP96925180A EP0855052B1 (en) | 1995-07-13 | 1996-07-10 | Protection of software against use without permit |
PL96324525A PL187088B1 (en) | 1995-07-13 | 1996-07-10 | Method of protecting computer software against unauthorised use |
DE69626530T DE69626530T2 (en) | 1995-07-13 | 1996-07-10 | PROTECTION OF SOFTWARE AGAINST USE WITHOUT PERMISSION |
AU65357/96A AU713872B2 (en) | 1995-07-13 | 1996-07-10 | Protection of software against use without permit |
NZ313319A NZ313319A (en) | 1995-07-13 | 1996-07-10 | Protection of software against use without permit |
HK98110296A HK1009533A1 (en) | 1995-07-13 | 1998-08-29 | Protection of software against use without permit |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NO952795 | 1995-07-13 | ||
NO952795A NO302388B1 (en) | 1995-07-13 | 1995-07-13 | Procedure and apparatus for protecting software against unauthorized use |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/983,461 A-371-Of-International US6266416B1 (en) | 1995-07-13 | 1996-07-10 | Protection of software against use without permit |
US09/873,351 Continuation US20030190043A1 (en) | 1995-07-13 | 2001-06-05 | Protection of software against use without permit |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1997003398A1 true WO1997003398A1 (en) | 1997-01-30 |
Family
ID=19898393
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/NO1996/000171 WO1997003398A1 (en) | 1995-07-13 | 1996-07-10 | Protection of software against use without permit |
Country Status (17)
Country | Link |
---|---|
US (3) | US6266416B1 (en) |
EP (2) | EP0855052B1 (en) |
JP (1) | JP4267065B2 (en) |
KR (1) | KR19990028931A (en) |
CN (1) | CN1155866C (en) |
AT (1) | ATE233916T1 (en) |
AU (1) | AU713872B2 (en) |
DE (1) | DE69626530T2 (en) |
DK (1) | DK0855052T3 (en) |
ES (1) | ES2194109T3 (en) |
HK (2) | HK1048674A1 (en) |
IL (1) | IL122888A (en) |
NO (1) | NO302388B1 (en) |
NZ (1) | NZ313319A (en) |
PL (1) | PL187088B1 (en) |
PT (1) | PT855052E (en) |
WO (1) | WO1997003398A1 (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999003031A1 (en) * | 1997-07-07 | 1999-01-21 | Huan Khing Low | A method and system for protecting intellectual property products distributed in mass market |
EP1004979A1 (en) * | 1998-11-24 | 2000-05-31 | CANAL+ Société Anonyme | Portable electronic card |
WO2001055820A2 (en) * | 2000-01-25 | 2001-08-02 | Infineon Technologies Ag | Data processing system |
WO2001069353A1 (en) * | 2000-03-13 | 2001-09-20 | Vestgoete Oerjan | A method and a system for preventing unauthorised use of computer programs in electronic commerce |
MD1871G2 (en) * | 2000-07-28 | 2002-08-31 | Компания ДЕКАРТ с ограниченной ответственностью | Process for protection from copying of databases and computer programs |
US6453369B1 (en) | 1998-01-20 | 2002-09-17 | Fujitsu Limited | Access protection from unauthorized use of memory medium using identifier unique to data storage device |
US6490720B1 (en) | 2001-05-11 | 2002-12-03 | Sospita As | Sequence numbering mechanism to ensure execution order integrity of inter-dependent smart card applications |
WO2004013744A2 (en) * | 2002-08-01 | 2004-02-12 | Matsushita Electric Industrial Co., Ltd. | Apparatuses and methods for decrypting encrypted blocks of data and locating the decrypted blocks of data in memory space used for execution |
EP1471405A1 (en) * | 2001-11-12 | 2004-10-27 | Network Research Lab, Ltd. | Method and device for protecting information against unauthorised use |
EP1185914B1 (en) * | 1999-04-28 | 2007-02-28 | Validy | Method for securing application software from a processing unit and secret storage unit and system therefor |
CN100428262C (en) * | 2006-09-22 | 2008-10-22 | 中山大学 | A software protection method based on modified one time pad |
WO2012126077A1 (en) | 2011-03-21 | 2012-09-27 | Irdeto Canada Corporation | System and method for securely binding and node-locking program execution to a trusted signature authority |
ITMI20120561A1 (en) * | 2012-04-05 | 2013-10-06 | St Microelectronics Srl | METHOD TO PROTECT AN APPLICATION PROGRAM |
Families Citing this family (107)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
NO302388B1 (en) * | 1995-07-13 | 1998-02-23 | Sigurd Sigbjoernsen | Procedure and apparatus for protecting software against unauthorized use |
US6523119B2 (en) | 1996-12-04 | 2003-02-18 | Rainbow Technologies, Inc. | Software protection device and method |
FR2760871B1 (en) * | 1997-03-13 | 1999-04-16 | Bull Cp8 | METHOD FOR STORING AND EXPLOITING SENSITIVE INFORMATION IN A SECURITY MODULE, AND RELATED SECURITY MODULE |
US6442276B1 (en) | 1997-07-21 | 2002-08-27 | Assure Systems, Inc. | Verification of authenticity of goods by use of random numbers |
US6643775B1 (en) * | 1997-12-05 | 2003-11-04 | Jamama, Llc | Use of code obfuscation to inhibit generation of non-use-restricted versions of copy protected software applications |
US7140005B2 (en) * | 1998-12-21 | 2006-11-21 | Intel Corporation | Method and apparatus to test an instruction sequence |
US6697489B1 (en) | 1999-03-30 | 2004-02-24 | Sony Corporation | Method and apparatus for securing control words |
US7730300B2 (en) | 1999-03-30 | 2010-06-01 | Sony Corporation | Method and apparatus for protecting the transfer of data |
JP2001016195A (en) * | 1999-04-27 | 2001-01-19 | Matsushita Electric Ind Co Ltd | Information utilization controller |
US7117369B1 (en) * | 1999-05-03 | 2006-10-03 | Microsoft Corporation | Portable smart card secured memory system for porting user profiles and documents |
US7036738B1 (en) | 1999-05-03 | 2006-05-02 | Microsoft Corporation | PCMCIA-compliant smart card secured memory assembly for porting user profiles and documents |
US6681214B1 (en) * | 1999-06-29 | 2004-01-20 | Assure Systems, Inc. | Secure system for printing authenticating digital signatures |
JP4127587B2 (en) * | 1999-07-09 | 2008-07-30 | 株式会社東芝 | Content management method, content management apparatus, and recording medium |
US7351919B1 (en) * | 1999-07-15 | 2008-04-01 | Thomson Licensing | Port cover for limiting transfer of electromagnetic radiation from a port defined in a host device |
US6684389B1 (en) * | 1999-08-05 | 2004-01-27 | Canon Kabushiki Kaisha | Compiler that decrypts encrypted source code |
EP1076279A1 (en) * | 1999-08-13 | 2001-02-14 | Hewlett-Packard Company | Computer platforms and their methods of operation |
GB9922665D0 (en) | 1999-09-25 | 1999-11-24 | Hewlett Packard Co | A method of enforcing trusted functionality in a full function platform |
US6912513B1 (en) * | 1999-10-29 | 2005-06-28 | Sony Corporation | Copy-protecting management using a user scrambling key |
US7039614B1 (en) | 1999-11-09 | 2006-05-02 | Sony Corporation | Method for simulcrypting scrambled data to a plurality of conditional access devices |
US6304972B1 (en) * | 2000-01-03 | 2001-10-16 | Massachusetts Institute Of Technology | Secure software system and related techniques |
KR20000053933A (en) * | 2000-05-10 | 2000-09-05 | 류종렬 | System for confirming of original software and the method thereof |
DE10023820B4 (en) * | 2000-05-15 | 2006-10-19 | Siemens Ag | Software protection mechanism |
WO2001088817A1 (en) * | 2000-05-17 | 2001-11-22 | Smart Modular Technologies, (Ma) Inc. | Fee management for programming of electronic devices |
CN1302427C (en) * | 2000-07-07 | 2007-02-28 | 富士通株式会社 | IC card terminal device |
JP4067757B2 (en) * | 2000-10-31 | 2008-03-26 | 株式会社東芝 | Program distribution system |
US8909555B2 (en) * | 2001-04-24 | 2014-12-09 | Hewlett-Packard Development Company, L.P. | Information security system |
EP1296477A1 (en) * | 2001-05-15 | 2003-03-26 | Mitsubishi Denki Kabushiki Kaisha | Content reproduction apparatus, content distribution server, and content distribution system |
US7747853B2 (en) | 2001-06-06 | 2010-06-29 | Sony Corporation | IP delivery of secure digital content |
US7127619B2 (en) | 2001-06-06 | 2006-10-24 | Sony Corporation | Decoding and decryption of partially encrypted information |
US7895616B2 (en) | 2001-06-06 | 2011-02-22 | Sony Corporation | Reconstitution of program streams split across multiple packet identifiers |
US7146340B1 (en) * | 2001-07-25 | 2006-12-05 | Novell, Inc. | Method and systems for licensing electronic data |
KR100435918B1 (en) * | 2001-11-09 | 2004-06-16 | 주식회사 휴맥스 | Method for encryption recording a data in digital broadcasting program |
CA2363795A1 (en) * | 2001-11-26 | 2003-05-26 | Cloakware Corporation | Computer system protection by communication diversity |
WO2003055132A1 (en) * | 2001-12-21 | 2003-07-03 | Sony Computer Entertainment Inc. | Methods and apparatus for secure distribution of program content |
KR20030055713A (en) * | 2001-12-27 | 2003-07-04 | 한국전자통신연구원 | The apparatus and method of digital contents's protection |
US7765567B2 (en) | 2002-01-02 | 2010-07-27 | Sony Corporation | Content replacement by PID mapping |
US7823174B2 (en) | 2002-01-02 | 2010-10-26 | Sony Corporation | Macro-block based content replacement by PID mapping |
JP2003280754A (en) * | 2002-03-25 | 2003-10-02 | Nec Corp | Hidden source program, source program converting method and device and source converting program |
US7162644B1 (en) | 2002-03-29 | 2007-01-09 | Xilinx, Inc. | Methods and circuits for protecting proprietary configuration data for programmable logic devices |
US20030200449A1 (en) * | 2002-04-17 | 2003-10-23 | International Business Machines Corporation | Method of accessing a shared subroutine of computer system |
US20030217280A1 (en) * | 2002-05-17 | 2003-11-20 | Keaton Thomas S. | Software watermarking for anti-tamper protection |
US7093119B2 (en) | 2002-07-16 | 2006-08-15 | International Business Machines Corporation | Methods and computer program products for protecting source code of an interpreted programming language |
AU2003268037A1 (en) * | 2002-07-30 | 2004-02-16 | Digital Interactive Streams, Inc. | Digital content security system and method |
GB2392262A (en) * | 2002-08-23 | 2004-02-25 | Hewlett Packard Co | A method of controlling the processing of data |
US8818896B2 (en) | 2002-09-09 | 2014-08-26 | Sony Corporation | Selective encryption with coverage encryption |
US7724907B2 (en) | 2002-11-05 | 2010-05-25 | Sony Corporation | Mechanism for protecting the transfer of digital content |
US8572408B2 (en) | 2002-11-05 | 2013-10-29 | Sony Corporation | Digital rights management of a digital device |
AR042599A1 (en) * | 2002-11-19 | 2005-06-29 | Schiavoni Juan Jose | METHOD OF PROTECTION OF PROGRAMS AND EQUIPMENT TO PERFORM IT |
JP2004171367A (en) * | 2002-11-21 | 2004-06-17 | Matsushita Electric Ind Co Ltd | Circuit operation simulation device, circuit operation simulation method, circuit operation simulation program, and circuit information decoding program |
JP3878542B2 (en) * | 2002-11-29 | 2007-02-07 | 株式会社東芝 | Recording device |
US8667525B2 (en) | 2002-12-13 | 2014-03-04 | Sony Corporation | Targeted advertisement selection from a digital stream |
US8645988B2 (en) | 2002-12-13 | 2014-02-04 | Sony Corporation | Content personalization for digital content |
DE50302771D1 (en) * | 2003-01-14 | 2006-05-18 | Aladdin Knowledge Systems Gmbh | Method for expanding a program by a copy protection function |
US7536558B2 (en) * | 2003-08-29 | 2009-05-19 | Tgbw Inc. | Flash memory distribution of digital content |
US7424620B2 (en) * | 2003-09-25 | 2008-09-09 | Sun Microsystems, Inc. | Interleaved data and instruction streams for application program obfuscation |
US7363620B2 (en) * | 2003-09-25 | 2008-04-22 | Sun Microsystems, Inc. | Non-linear execution of application program instructions for application program obfuscation |
US20050069138A1 (en) * | 2003-09-25 | 2005-03-31 | Sun Microsystems, Inc., A Delaware Corporation | Application program obfuscation |
US8220058B2 (en) * | 2003-09-25 | 2012-07-10 | Oracle America, Inc. | Rendering and encryption engine for application program obfuscation |
US7415618B2 (en) * | 2003-09-25 | 2008-08-19 | Sun Microsystems, Inc. | Permutation of opcode values for application program obfuscation |
US7353499B2 (en) * | 2003-09-25 | 2008-04-01 | Sun Microsystems, Inc. | Multiple instruction dispatch tables for application program obfuscation |
US20050071656A1 (en) * | 2003-09-25 | 2005-03-31 | Klein Dean A. | Secure processor-based system and method |
US7853980B2 (en) | 2003-10-31 | 2010-12-14 | Sony Corporation | Bi-directional indices for trick mode video-on-demand |
KR20060127007A (en) * | 2003-12-22 | 2006-12-11 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | Software execution protection using an active entity |
US20050204405A1 (en) * | 2004-03-04 | 2005-09-15 | Brian Wormington | Method and system for digital rights management |
FR2867635B1 (en) * | 2004-03-11 | 2006-09-22 | Oberthur Card Syst Sa | SECURE DATA PROCESSING METHOD, BASED IN PARTICULAR ON A CRYPTOGRAPHIC ALGORITHM |
CN101023433A (en) * | 2004-07-02 | 2007-08-22 | 皇家飞利浦电子股份有限公司 | Security unit and method for protecting data |
US20060020552A1 (en) * | 2004-07-26 | 2006-01-26 | James Sloan | Copy-restriction system for digitally recorded, computer disk-based music recordings |
US8041190B2 (en) | 2004-12-15 | 2011-10-18 | Sony Corporation | System and method for the creation, synchronization and delivery of alternate content |
US7895617B2 (en) | 2004-12-15 | 2011-02-22 | Sony Corporation | Content substitution editor |
US20060137016A1 (en) * | 2004-12-20 | 2006-06-22 | Dany Margalit | Method for blocking unauthorized use of a software application |
CN100373376C (en) * | 2005-01-21 | 2008-03-05 | 深圳市致芯微电子有限公司 | Encryption chip, CPU program encryption method using said chip and system thereof |
WO2006100522A1 (en) | 2005-03-22 | 2006-09-28 | Hewlett-Packard Development Company, L.P. | Methods, devices and data structures for trusted data |
EP1717723A1 (en) | 2005-04-29 | 2006-11-02 | ST Incard S.r.l. | Improved virtual machine or hardware processor for IC-card portable electronic devices |
JP2007065850A (en) * | 2005-08-30 | 2007-03-15 | Fujitsu Ltd | Information processing device, information processing method and program |
US20070074050A1 (en) * | 2005-09-14 | 2007-03-29 | Noam Camiel | System and method for software and data copy protection |
JP4631658B2 (en) * | 2005-11-09 | 2011-02-16 | ソニー株式会社 | Digital broadcast receiving system and digital broadcast receiving apparatus |
CN100446016C (en) * | 2005-11-17 | 2008-12-24 | 北京兆维电子(集团)有限责任公司 | System for realizing data security protecting |
US7991159B2 (en) * | 2005-12-09 | 2011-08-02 | Alcatel-Lucent Usa Inc. | Layered mobile application security system |
US8701091B1 (en) | 2005-12-15 | 2014-04-15 | Nvidia Corporation | Method and system for providing a generic console interface for a graphics application |
EP1798653B1 (en) | 2005-12-16 | 2011-08-03 | Aladdin Europe GmbH | Method, computer program product and device for protecting a program comprising a function block |
US8185921B2 (en) | 2006-02-28 | 2012-05-22 | Sony Corporation | Parental control of displayed content using closed captioning |
US8452981B1 (en) * | 2006-03-01 | 2013-05-28 | Nvidia Corporation | Method for author verification and software authorization |
RU2296363C1 (en) * | 2006-04-27 | 2007-03-27 | Общество с ограниченной ответственностью "АСТРОМА" | Method and device for protecting software from unsanctioned usage |
US8607151B2 (en) * | 2006-08-01 | 2013-12-10 | Nvidia Corporation | Method and system for debugging a graphics pipeline subunit |
US8436870B1 (en) | 2006-08-01 | 2013-05-07 | Nvidia Corporation | User interface and method for graphical processing analysis |
US8436864B2 (en) * | 2006-08-01 | 2013-05-07 | Nvidia Corporation | Method and user interface for enhanced graphical operation organization |
US8963932B1 (en) | 2006-08-01 | 2015-02-24 | Nvidia Corporation | Method and apparatus for visualizing component workloads in a unified shader GPU architecture |
US20080133419A1 (en) * | 2006-12-05 | 2008-06-05 | Brian Wormington | Secure financial transaction system and method |
US8479020B2 (en) * | 2007-07-25 | 2013-07-02 | Motorola Mobility Llc | Method and apparatus for providing an asymmetric encrypted cookie for product data storage |
DE102007059798B3 (en) * | 2007-12-11 | 2009-04-09 | Ascolab Gmbh | Executable program code i.e. executable file, coding method for computer, involves combining chains of sequential instructions to code fragments, and coding and storing detected code fragments belonging to methods in program library |
US8448002B2 (en) * | 2008-04-10 | 2013-05-21 | Nvidia Corporation | Clock-gated series-coupled data processing modules |
JP5037422B2 (en) * | 2008-04-30 | 2012-09-26 | 株式会社リコー | Image forming apparatus, access control method, and access control program |
KR101224717B1 (en) * | 2008-12-26 | 2013-01-21 | 에스케이플래닛 주식회사 | Method for Protecting Software License, System, Server, Terminal And Computer-Readable Recording Medium with Program therefor |
KR101049718B1 (en) * | 2008-12-29 | 2011-07-19 | 에스케이 텔레콤주식회사 | How to perform software separation, device, and computer-readable recording media |
US20130283396A1 (en) * | 2009-07-30 | 2013-10-24 | Rascalim Software Security Ltd. | System and method for limiting execution of software to authorized users |
DE112012004661T5 (en) | 2011-08-05 | 2014-09-11 | Kpit Technologies Ltd. | System for protection of embedded software code |
US9489541B2 (en) * | 2011-09-09 | 2016-11-08 | Nvidia Corporation | Content protection via online servers and code execution in a secure operating system |
US9323315B2 (en) | 2012-08-15 | 2016-04-26 | Nvidia Corporation | Method and system for automatic clock-gating of a clock grid at a clock source |
US8850371B2 (en) | 2012-09-14 | 2014-09-30 | Nvidia Corporation | Enhanced clock gating in retimed modules |
US9471456B2 (en) | 2013-05-15 | 2016-10-18 | Nvidia Corporation | Interleaved instruction debugger |
CN103324871A (en) * | 2013-05-23 | 2013-09-25 | 董礼貌 | Software changing linking device, system and method |
CN104462990B (en) * | 2013-09-13 | 2019-02-26 | 腾讯科技(深圳)有限公司 | Character string encipher-decipher method and device |
JP6287964B2 (en) * | 2015-06-09 | 2018-03-07 | 株式会社デンソー | Software duplication prevention system |
US9881142B2 (en) * | 2015-09-11 | 2018-01-30 | Patrick Robert Koren | Method and apparatus for preventing and investigating software piracy |
US11829454B2 (en) * | 2018-03-09 | 2023-11-28 | Patrick Robert Koren | Method and apparatus for preventing and investigating software piracy |
DE112017005726T5 (en) * | 2017-06-23 | 2019-08-14 | Mitsubishi Electric Corporation | System for preventing unauthorized ladder program use, method for preventing unauthorized ladder program use, engineering tool, license delivery server and programmable controller |
US20220374512A1 (en) * | 2021-05-21 | 2022-11-24 | Vmware, Inc. | Software-based hardware security module (hsm) for a virtualized computing environment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0266748A2 (en) * | 1986-11-05 | 1988-05-11 | International Business Machines Corporation | A software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor |
EP0478969A2 (en) * | 1990-10-04 | 1992-04-08 | Software Security, Inc. | Method and apparatus for protecting multiple copies of computer software from unauthorized use |
US5337357A (en) * | 1993-06-17 | 1994-08-09 | Software Security, Inc. | Method of software distribution protection |
US5343527A (en) * | 1993-10-27 | 1994-08-30 | International Business Machines Corporation | Hybrid encryption method and system for protecting reusable software components |
DE4419115A1 (en) * | 1994-06-01 | 1994-10-20 | Michael Doelker | Method of highly effective protection from unauthorised use of software copies |
US5398285A (en) * | 1993-12-30 | 1995-03-14 | Motorola, Inc. | Method for generating a password using public key cryptography |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2523745B1 (en) * | 1982-03-18 | 1987-06-26 | Bull Sa | METHOD AND DEVICE FOR PROTECTING SOFTWARE DELIVERED BY A SUPPLIER TO A USER |
US4558176A (en) * | 1982-09-20 | 1985-12-10 | Arnold Mark G | Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software |
US4799258A (en) * | 1984-02-13 | 1989-01-17 | National Research Development Corporation | Apparatus and methods for granting access to computers |
GB2163577B (en) * | 1984-08-23 | 1988-01-13 | Nat Res Dev | Software protection device |
GB8423784D0 (en) * | 1984-09-20 | 1984-10-24 | Fifield K J | Processing device |
CA1238427A (en) * | 1984-12-18 | 1988-06-21 | Jonathan Oseas | Code protection using cryptography |
US4817140A (en) * | 1986-11-05 | 1989-03-28 | International Business Machines Corp. | Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor |
US5109413A (en) * | 1986-11-05 | 1992-04-28 | International Business Machines Corporation | Manipulating rights-to-execute in connection with a software copy protection mechanism |
US5410717A (en) * | 1991-03-22 | 1995-04-25 | Allen-Bradley Company, Inc. | Removable function card for a programmable controller processor |
US5485519A (en) * | 1991-06-07 | 1996-01-16 | Security Dynamics Technologies, Inc. | Enhanced security for a secure token code |
US5222133A (en) * | 1991-10-17 | 1993-06-22 | Wayne W. Chou | Method of protecting computer software from unauthorized execution using multiple keys |
US5319705A (en) * | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
DE4239865A1 (en) | 1992-11-27 | 1994-06-01 | Heinz Johann | Unauthorised program use prevention method - inserting installation chip card data carrier into test appts. before starting, interrogating card to check program addresses, and interrupting program with incorrect answer |
US5319704A (en) * | 1993-06-17 | 1994-06-07 | Exar Corporation | Control circuit for voltage controlled attenuator for speakerphones |
US5651068A (en) * | 1995-03-08 | 1997-07-22 | Hewlett-Packard Company | International cryptography framework |
NO302388B1 (en) * | 1995-07-13 | 1998-02-23 | Sigurd Sigbjoernsen | Procedure and apparatus for protecting software against unauthorized use |
-
1995
- 1995-07-13 NO NO952795A patent/NO302388B1/en not_active IP Right Cessation
-
1996
- 1996-07-10 WO PCT/NO1996/000171 patent/WO1997003398A1/en active Search and Examination
- 1996-07-10 PL PL96324525A patent/PL187088B1/en not_active IP Right Cessation
- 1996-07-10 AT AT96925180T patent/ATE233916T1/en not_active IP Right Cessation
- 1996-07-10 CN CNB96196247XA patent/CN1155866C/en not_active Expired - Fee Related
- 1996-07-10 IL IL12288896A patent/IL122888A/en not_active IP Right Cessation
- 1996-07-10 PT PT96925180T patent/PT855052E/en unknown
- 1996-07-10 NZ NZ313319A patent/NZ313319A/en not_active IP Right Cessation
- 1996-07-10 ES ES96925180T patent/ES2194109T3/en not_active Expired - Lifetime
- 1996-07-10 JP JP50571097A patent/JP4267065B2/en not_active Expired - Fee Related
- 1996-07-10 DK DK96925180T patent/DK0855052T3/en active
- 1996-07-10 EP EP96925180A patent/EP0855052B1/en not_active Expired - Lifetime
- 1996-07-10 KR KR1019980700233A patent/KR19990028931A/en not_active Application Discontinuation
- 1996-07-10 AU AU65357/96A patent/AU713872B2/en not_active Ceased
- 1996-07-10 DE DE69626530T patent/DE69626530T2/en not_active Expired - Fee Related
- 1996-07-10 US US08/983,461 patent/US6266416B1/en not_active Expired - Fee Related
- 1996-07-10 EP EP02010974A patent/EP1253503A3/en not_active Withdrawn
-
1998
- 1998-08-29 HK HK02108918.0A patent/HK1048674A1/en unknown
- 1998-08-29 HK HK98110296A patent/HK1009533A1/en not_active IP Right Cessation
-
2001
- 2001-06-05 US US09/873,351 patent/US20030190043A1/en not_active Abandoned
-
2004
- 2004-01-06 US US10/752,429 patent/US20040193987A1/en not_active Abandoned
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0266748A2 (en) * | 1986-11-05 | 1988-05-11 | International Business Machines Corporation | A software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor |
EP0478969A2 (en) * | 1990-10-04 | 1992-04-08 | Software Security, Inc. | Method and apparatus for protecting multiple copies of computer software from unauthorized use |
US5337357A (en) * | 1993-06-17 | 1994-08-09 | Software Security, Inc. | Method of software distribution protection |
US5343527A (en) * | 1993-10-27 | 1994-08-30 | International Business Machines Corporation | Hybrid encryption method and system for protecting reusable software components |
US5398285A (en) * | 1993-12-30 | 1995-03-14 | Motorola, Inc. | Method for generating a password using public key cryptography |
DE4419115A1 (en) * | 1994-06-01 | 1994-10-20 | Michael Doelker | Method of highly effective protection from unauthorised use of software copies |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999003031A1 (en) * | 1997-07-07 | 1999-01-21 | Huan Khing Low | A method and system for protecting intellectual property products distributed in mass market |
US6453369B1 (en) | 1998-01-20 | 2002-09-17 | Fujitsu Limited | Access protection from unauthorized use of memory medium using identifier unique to data storage device |
US6604153B2 (en) | 1998-01-20 | 2003-08-05 | Fujitsu Limited | Access protection from unauthorized use of memory medium with storage of identifier unique to memory medium in data storage device |
EP1004979A1 (en) * | 1998-11-24 | 2000-05-31 | CANAL+ Société Anonyme | Portable electronic card |
EP1185914B1 (en) * | 1999-04-28 | 2007-02-28 | Validy | Method for securing application software from a processing unit and secret storage unit and system therefor |
WO2001055820A2 (en) * | 2000-01-25 | 2001-08-02 | Infineon Technologies Ag | Data processing system |
WO2001055820A3 (en) * | 2000-01-25 | 2002-06-20 | Infineon Technologies Ag | Data processing system |
WO2001069353A1 (en) * | 2000-03-13 | 2001-09-20 | Vestgoete Oerjan | A method and a system for preventing unauthorised use of computer programs in electronic commerce |
MD1871G2 (en) * | 2000-07-28 | 2002-08-31 | Компания ДЕКАРТ с ограниченной ответственностью | Process for protection from copying of databases and computer programs |
US6490720B1 (en) | 2001-05-11 | 2002-12-03 | Sospita As | Sequence numbering mechanism to ensure execution order integrity of inter-dependent smart card applications |
EP1471405A4 (en) * | 2001-11-12 | 2010-01-13 | Gerite Associates Ltd | Method and device for protecting information against unauthorised use |
EP1471405A1 (en) * | 2001-11-12 | 2004-10-27 | Network Research Lab, Ltd. | Method and device for protecting information against unauthorised use |
US7228423B2 (en) | 2002-08-01 | 2007-06-05 | Matsushita Electric Industrial Co., Ltd. | Apparatuses and methods for decrypting encrypted data and locating the decrypted data in a memory space used for execution |
WO2004013744A3 (en) * | 2002-08-01 | 2004-07-29 | Matsushita Electric Ind Co Ltd | Apparatuses and methods for decrypting encrypted blocks of data and locating the decrypted blocks of data in memory space used for execution |
CN100359425C (en) * | 2002-08-01 | 2008-01-02 | 松下电器产业株式会社 | Apparatuses and methods for decrypting encrypted data and locating the decrypted data in a memory space used for execution |
WO2004013744A2 (en) * | 2002-08-01 | 2004-02-12 | Matsushita Electric Industrial Co., Ltd. | Apparatuses and methods for decrypting encrypted blocks of data and locating the decrypted blocks of data in memory space used for execution |
US7747870B2 (en) | 2002-08-01 | 2010-06-29 | Panasonic Corporation | Apparatuses and methods for decrypting encrypted data and locating the decrypted data in a memory space used for execution |
CN100428262C (en) * | 2006-09-22 | 2008-10-22 | 中山大学 | A software protection method based on modified one time pad |
WO2012126077A1 (en) | 2011-03-21 | 2012-09-27 | Irdeto Canada Corporation | System and method for securely binding and node-locking program execution to a trusted signature authority |
EP2689375A1 (en) * | 2011-03-21 | 2014-01-29 | Irdeto B.V. | System and method for securely binding and node-locking program execution to a trusted signature authority |
EP2689375A4 (en) * | 2011-03-21 | 2014-08-20 | Irdeto Bv | System and method for securely binding and node-locking program execution to a trusted signature authority |
US9754115B2 (en) | 2011-03-21 | 2017-09-05 | Irdeto B.V. | System and method for securely binding and node-locking program execution to a trusted signature authority |
ITMI20120561A1 (en) * | 2012-04-05 | 2013-10-06 | St Microelectronics Srl | METHOD TO PROTECT AN APPLICATION PROGRAM |
US9230071B2 (en) | 2012-04-05 | 2016-01-05 | Stmicroelectronics S.R.L. | Method for protecting an application program |
Also Published As
Publication number | Publication date |
---|---|
NO952795L (en) | 1997-01-14 |
DE69626530T2 (en) | 2003-11-13 |
IL122888A0 (en) | 1998-08-16 |
US20030190043A1 (en) | 2003-10-09 |
EP0855052A1 (en) | 1998-07-29 |
NO952795D0 (en) | 1995-07-13 |
AU713872B2 (en) | 1999-12-09 |
ATE233916T1 (en) | 2003-03-15 |
ES2194109T3 (en) | 2003-11-16 |
NO302388B1 (en) | 1998-02-23 |
DK0855052T3 (en) | 2003-07-07 |
HK1009533A1 (en) | 1999-06-04 |
KR19990028931A (en) | 1999-04-15 |
US20040193987A1 (en) | 2004-09-30 |
MX9800385A (en) | 1998-09-30 |
DE69626530D1 (en) | 2003-04-10 |
EP0855052B1 (en) | 2003-03-05 |
EP1253503A3 (en) | 2004-07-14 |
PT855052E (en) | 2003-06-30 |
AU6535796A (en) | 1997-02-10 |
PL187088B1 (en) | 2004-05-31 |
NZ313319A (en) | 1999-10-28 |
JPH11509023A (en) | 1999-08-03 |
IL122888A (en) | 2000-10-31 |
HK1048674A1 (en) | 2003-04-11 |
US6266416B1 (en) | 2001-07-24 |
EP1253503A2 (en) | 2002-10-30 |
CN1192814A (en) | 1998-09-09 |
PL324525A1 (en) | 1998-06-08 |
JP4267065B2 (en) | 2009-05-27 |
CN1155866C (en) | 2004-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0855052B1 (en) | Protection of software against use without permit | |
White et al. | ABYSS: An architecture for software protection | |
EP1423771B1 (en) | Method to protect software against unauthorized use | |
US6871192B2 (en) | System and method for preventing unauthorized use of protected software utilizing a portable security device | |
US20060048223A1 (en) | Method and system for providing tamper-resistant software | |
US6684198B1 (en) | Program data distribution via open network | |
US6336189B1 (en) | Apparatus and method for data capsule generation | |
US5710817A (en) | Method and device for preventing unauthorized access to a computer system | |
JP4137468B2 (en) | Program usage authentication method | |
US20070198857A1 (en) | Software execution protection using an active entity | |
CA2226386C (en) | Protection of software against use without permit | |
AU2002351507B2 (en) | Apparatus and method for accessing material using an entity locked secure registry | |
KR100310445B1 (en) | Method for controlling Universal Serial Bus security module using crypto-chip | |
WO2006003632A2 (en) | Security unit and method for protecting data | |
AU2002351507A1 (en) | Apparatus and method for accessing material using an entity locked secure registry | |
KR100423506B1 (en) | method of preventing an illegal software copy on-line using an IC chip installed card | |
US7174464B1 (en) | Method of making a user piece of software secure by means of a processing and secret memorizing unit, and a system constituting an application thereof | |
MXPA98000385A (en) | Protection of computer programs against unauthorized use | |
Everett | “PADLOCK”: solution to software protection? | |
RU98102405A (en) | SOFTWARE PROTECTION AGAINST USE WITHOUT PERMISSION |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 96196247.X Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BB BG BR BY CA CH CN CZ DE DK EE ES FI GB GE HU IL IS JP KE KG KP KR KZ LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK TJ TM TR TT UA UG US UZ VN AM AZ BY KG KZ MD RU TJ TM |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): KE LS MW SD SZ UG AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
ENP | Entry into the national phase |
Ref document number: 2226386 Country of ref document: CA Ref document number: 2226386 Country of ref document: CA Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 1997 505710 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: PA/a/1998/000385 Country of ref document: MX Ref document number: 1019980700233 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 313319 Country of ref document: NZ |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1996925180 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 08983461 Country of ref document: US |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWP | Wipo information: published in national office |
Ref document number: 1996925180 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1019980700233 Country of ref document: KR |
|
WWG | Wipo information: grant in national office |
Ref document number: 1996925180 Country of ref document: EP |
|
WWR | Wipo information: refused in national office |
Ref document number: 1019980700233 Country of ref document: KR |
|
DPE2 | Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101) |