WO1997004412A3 - Method for protecting publicly distributed software - Google Patents

Method for protecting publicly distributed software Download PDF

Info

Publication number
WO1997004412A3
WO1997004412A3 PCT/US1996/011416 US9611416W WO9704412A3 WO 1997004412 A3 WO1997004412 A3 WO 1997004412A3 US 9611416 W US9611416 W US 9611416W WO 9704412 A3 WO9704412 A3 WO 9704412A3
Authority
WO
WIPO (PCT)
Prior art keywords
software
hardware key
stored
computer system
network
Prior art date
Application number
PCT/US1996/011416
Other languages
French (fr)
Other versions
WO1997004412A2 (en
Inventor
Thomas H Williams
Claude T Baggett
Original Assignee
Cable Television Lab Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cable Television Lab Inc filed Critical Cable Television Lab Inc
Priority to GB9800437A priority Critical patent/GB2317476B/en
Publication of WO1997004412A2 publication Critical patent/WO1997004412A2/en
Publication of WO1997004412A3 publication Critical patent/WO1997004412A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress

Abstract

A system for protecting software from copying wherein the software to be protected is placed on the computer system in two parts. A first part (120) is stored in non-volatile storage, such as a hard disk or floppy disk within the computer system (100), and a second part is stored and executed in a 'hardware key (122)', which is attached to the computer system (100). The second part is stored in volatile RAM (206) and will be erased when electrical power is removed from the hardware key (122), or when the software stops execution. This requires that the second part of the software be reloaded each time the hardware key (122) is powered up. Typically, the second part of the software will be loaded from a network (130), or from a cable network, thus reloading of the second part into the hardware key (122) is a trivial matter, so long as the user is an active subscriber to the network (130) or cable network.
PCT/US1996/011416 1995-07-19 1996-07-08 Method for protecting publicly distributed software WO1997004412A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB9800437A GB2317476B (en) 1995-07-19 1996-07-08 Method for protecting publicly distributed software

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US08/504,117 US5754646A (en) 1995-07-19 1995-07-19 Method for protecting publicly distributed software
US08/504,117 1995-07-19

Publications (2)

Publication Number Publication Date
WO1997004412A2 WO1997004412A2 (en) 1997-02-06
WO1997004412A3 true WO1997004412A3 (en) 1997-04-03

Family

ID=24004914

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1996/011416 WO1997004412A2 (en) 1995-07-19 1996-07-08 Method for protecting publicly distributed software

Country Status (4)

Country Link
US (1) US5754646A (en)
CA (1) CA2227060A1 (en)
GB (1) GB2317476B (en)
WO (1) WO1997004412A2 (en)

Families Citing this family (93)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7991347B1 (en) * 1994-04-07 2011-08-02 Data Innovation Llc System and method for accessing set of digital data at a remote site
US7181758B1 (en) * 1994-07-25 2007-02-20 Data Innovation, L.L.C. Information distribution and processing system
US6075863A (en) * 1996-02-28 2000-06-13 Encanto Networks Intelligent communication device
US6009543A (en) * 1996-03-01 1999-12-28 Massachusetts Institute Of Technology Secure software system and related techniques
US6523119B2 (en) * 1996-12-04 2003-02-18 Rainbow Technologies, Inc. Software protection device and method
TW315438B (en) * 1997-04-15 1997-09-11 Inventec Corp The method for using hand-held device to protect computer system
FR2762417B1 (en) * 1997-04-16 1999-07-02 Gemplus Card Int METHOD FOR MONITORING THE EXECUTION OF A SOFTWARE PRODUCT
EP0926583A1 (en) * 1997-11-24 1999-06-30 Irdeto B.V. System for controlling the execution of a program or the like
FR2774187B1 (en) * 1998-01-29 2000-03-31 Boxmart APPARATUS FOR THE SIMULTANEOUS PROTECTION OF SEVERAL SOFTWARE INDEPENDENT OF THE SOFTWARE DESIGNER
US6128741A (en) * 1998-03-05 2000-10-03 Rainbow Technologies, Inc. Compact transparent dongle device
US6070171A (en) * 1998-05-15 2000-05-30 Palantir Software, Inc. Method and system for copy-tracking distributed software featuring tokens containing a key field and a usage field
JP3713141B2 (en) * 1998-05-19 2005-11-02 インターナショナル・ビジネス・マシーンズ・コーポレーション How to prevent unauthorized execution of programs
EP1086411B1 (en) * 1998-06-12 2003-11-12 Gemplus Method for verifying the execution of a software product
US7617124B1 (en) 1998-12-04 2009-11-10 Digital River, Inc. Apparatus and method for secure downloading of files
US7058597B1 (en) 1998-12-04 2006-06-06 Digital River, Inc. Apparatus and method for adaptive fraud screening for electronic commerce transactions
US20030195974A1 (en) * 1998-12-04 2003-10-16 Ronning Joel A. Apparatus and method for scheduling of search for updates or downloads of a file
US6343280B2 (en) 1998-12-15 2002-01-29 Jonathan Clark Distributed execution software license server
GB9827831D0 (en) * 1998-12-17 1999-02-10 Tribeka Ltd Method and apparatus for the distribution of digitised information on demand
US6721891B1 (en) 1999-03-29 2004-04-13 Activcard Ireland Limited Method of distributing piracy protected computer software
US6681212B1 (en) 1999-04-23 2004-01-20 Nianning Zeng Internet-based automated system and a method for software copyright protection and sales
US7360252B1 (en) 1999-04-30 2008-04-15 Macrovision Corporation Method and apparatus for secure distribution of software
US6289450B1 (en) 1999-05-28 2001-09-11 Authentica, Inc. Information security architecture for encrypting documents for remote access while maintaining access control
US20050251686A1 (en) * 1999-06-09 2005-11-10 Andres Torrubia-Saez Methods and apparatus for secure distribution of software
US7062584B1 (en) * 1999-07-15 2006-06-13 Thomson Licensing Method and apparatus for supporting two different types of integrated circuit cards with a single connector
EP1076279A1 (en) 1999-08-13 2001-02-14 Hewlett-Packard Company Computer platforms and their methods of operation
AU5405199A (en) * 1999-09-07 2001-04-10 Swisscom Ag Ordering method
EP1085396A1 (en) 1999-09-17 2001-03-21 Hewlett-Packard Company Operation of trusted state in computing platform
GB9922665D0 (en) 1999-09-25 1999-11-24 Hewlett Packard Co A method of enforcing trusted functionality in a full function platform
WO2001045083A1 (en) 1999-12-17 2001-06-21 Sony Corporation Method and apparatus for information processing, and medium for storing program
GB2364139B (en) * 1999-12-22 2004-05-26 Ibm A security mechanism providing access control for locally-held data
US6304972B1 (en) * 2000-01-03 2001-10-16 Massachusetts Institute Of Technology Secure software system and related techniques
US20070271191A1 (en) * 2000-03-09 2007-11-22 Andres Torrubia-Saez Method and apparatus for secure distribution of software
WO2001082204A1 (en) * 2000-04-26 2001-11-01 Venice Technologies, Inc. Methods and systems for securing computer software
JP2004514194A (en) * 2000-04-28 2004-05-13 モルドフロウ コーポレイション Networkable application software system and method
US20060020790A1 (en) * 2000-05-25 2006-01-26 Sprunk Eric J Authorization using ciphertext tokens in a content receiver
GB0012791D0 (en) * 2000-05-25 2000-07-19 Breakertech Inc Mobile node-lock
US20020003884A1 (en) * 2000-05-26 2002-01-10 Sprunk Eric J. Authentication and/or authorization launch
JP2002032135A (en) * 2000-07-18 2002-01-31 Mitsubishi Electric Corp Software distribution system and its method
GB0017478D0 (en) * 2000-07-18 2000-08-30 Bit Arts Ltd Computer software installation
GB0020441D0 (en) 2000-08-18 2000-10-04 Hewlett Packard Co Performance of a service on a computing platform
AU2001285265A1 (en) * 2000-09-12 2002-03-26 Aladdin Knowledge Systems, Ltd. System for managing rights and permitting on-line playback of digital content
GB2376763B (en) 2001-06-19 2004-12-15 Hewlett Packard Co Demonstrating integrity of a compartment of a compartmented operating system
US6978376B2 (en) 2000-12-15 2005-12-20 Authentica, Inc. Information security architecture for encrypting documents for remote access while maintaining access control
DE10065471A1 (en) * 2000-12-28 2002-07-18 Viag Interkom Gmbh & Co Telecommunication system, in particular for the transmission of software programs as well as a suitable method for this and a slide-in cassette
GB2372592B (en) 2001-02-23 2005-03-30 Hewlett Packard Co Information system
GB2372595A (en) 2001-02-23 2002-08-28 Hewlett Packard Co Method of and apparatus for ascertaining the status of a data processing environment.
JP2004537095A (en) 2001-04-24 2004-12-09 ヒューレット・パッカード・カンパニー Information security system
GB2376765B (en) 2001-06-19 2004-12-29 Hewlett Packard Co Multiple trusted computing environments with verifiable environment identities
GB2376761A (en) 2001-06-19 2002-12-24 Hewlett Packard Co An arrangement in which a process is run on a host operating system but may be switched to a guest system if it poses a security risk
GB2376764B (en) 2001-06-19 2004-12-29 Hewlett Packard Co Multiple trusted computing environments
US7509685B2 (en) 2001-06-26 2009-03-24 Sealedmedia Limited Digital rights management
FR2828304B1 (en) * 2001-07-31 2010-09-03 Validy METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "TIME DISSOCIATION" AGAINST ITS UNAUTHORIZED USE
FR2828302B1 (en) * 2001-07-31 2010-09-03 Validy METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE SAID "CONDITIONAL CONNECTION" AGAINST ITS UNAUTHORIZED USE
US20030028765A1 (en) * 2001-07-31 2003-02-06 Cromer Daryl Carvis Protecting information on a computer readable medium
FR2828300B1 (en) * 2001-07-31 2010-09-03 Validy METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "ELEMENTARY FUNCTIONS" AGAINST ITS UNAUTHORIZED USE
FR2828303B1 (en) * 2001-07-31 2010-09-03 Validy METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "RENAMING" AGAINST ITS UNAUTHORIZED USE
FR2828305B1 (en) * 2001-07-31 2010-09-03 Validy METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE SAID "VARIABLE" AGAINST ITS UNAUTHORIZED USE
FR2828301B1 (en) * 2001-07-31 2010-09-03 Validy METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "DETECTION AND COERCITION" AGAINST ITS UNAUTHORIZED USE
US7174466B2 (en) * 2001-08-01 2007-02-06 Sas Validy Method to protect software against unwanted use with a “detection and coercion” principle
US7502940B2 (en) * 2001-08-01 2009-03-10 Sas Validy Method to protect software against unwanted use with a “conditional branch” principle
US7434064B2 (en) * 2001-08-01 2008-10-07 Sas Validy Method to protect software against unwanted use with a “elementary functions” principle
US7269740B2 (en) * 2001-08-01 2007-09-11 Sas Validy Method to protect software against unwanted use with a “variable principle”
US7343494B2 (en) * 2001-08-01 2008-03-11 Sas Validy Method to protect software against unwanted use with a “renaming” principle
FR2834573A1 (en) * 2002-01-08 2003-07-11 Oberthur Card Syst Sa Electronic data processing device suitable for execution of software protected against copying, whereby software is sub-divided with an auxiliary program stocked and executed in a secure chip card reader
SE524931C2 (en) * 2002-02-26 2004-10-26 Sightline Vision Ab Procedure for starting a computer program
JP3816050B2 (en) * 2002-04-23 2006-08-30 松下電器産業株式会社 Signal processing device
US20050137018A1 (en) * 2002-06-05 2005-06-23 Microsoft Corporation DVD-enabling dongle for a console-based gaming system
US20030228911A1 (en) * 2002-06-05 2003-12-11 Dernis Mitchell S. DVD-enabling code server and loader for a console-based gaming system
KR100481374B1 (en) * 2002-06-21 2005-04-07 학교법인 서강대학교 Surface Modification Of Titanium Dioxide For Sunscreen
US7272725B2 (en) * 2002-06-25 2007-09-18 Sas Validy Method to protect software against unwanted use with a “temporal dissociation” principle
GB2392262A (en) 2002-08-23 2004-02-25 Hewlett Packard Co A method of controlling the processing of data
EP1552484B1 (en) * 2002-10-17 2013-03-13 Vodafone Group PLC Facilitating and authenticating transactions
AR042599A1 (en) * 2002-11-19 2005-06-29 Schiavoni Juan Jose METHOD OF PROTECTION OF PROGRAMS AND EQUIPMENT TO PERFORM IT
US8745409B2 (en) * 2002-12-18 2014-06-03 Sandisk Il Ltd. System and method for securing portable data
ATE322039T1 (en) * 2003-01-14 2006-04-15 Aladdin Knowledge Systems Gmbh METHOD FOR EXPANDING A PROGRAM TO INCLUDE A COPY PROTECTION FUNCTION
US20050076211A1 (en) * 2003-06-08 2005-04-07 Siemens Aktiengesellschaft Method for protecting computer programs against unauthorized multiple use
US20050138387A1 (en) * 2003-12-19 2005-06-23 Lam Wai T. System and method for authorizing software use
US20050204405A1 (en) * 2004-03-04 2005-09-15 Brian Wormington Method and system for digital rights management
US7836301B2 (en) * 2004-03-10 2010-11-16 Harris Steven M Computer program for securely viewing a file
US7458102B2 (en) * 2004-08-17 2008-11-25 Emc Corporation Information security architecture for remote access control using non-bidirectional protocols
US7580894B2 (en) 2004-09-30 2009-08-25 Nokia Corporation Method, device and computer program product for activating the right of use at least one secured content item
US20060130154A1 (en) * 2004-11-30 2006-06-15 Wai Lam Method and system for protecting and verifying stored data
EP2194476B1 (en) 2005-03-22 2014-12-03 Hewlett-Packard Development Company, L.P. Method and apparatus for creating a record of a software-verification attestation
US7396257B2 (en) * 2005-05-26 2008-07-08 Itt Manufacturing Enterprises, Inc. Computer input/output (I/O) connector assembly having a security circuit disposed therein
US20070199049A1 (en) * 2005-09-28 2007-08-23 Ubiquitynet, Inc. Broadband network security and authorization method, system and architecture
US8495389B2 (en) * 2005-12-16 2013-07-23 Safenet, Inc. Locking changing hard disk content to a hardware token
US8670552B2 (en) * 2006-02-22 2014-03-11 Verint Systems, Inc. System and method for integrated display of multiple types of call agent data
AU2015204386A1 (en) * 2006-07-13 2015-08-06 Aristocrat Technologies Australia Pty Limited An electronic gaming machine
CN100555939C (en) * 2006-09-20 2009-10-28 北京飞天诚信科技有限公司 A kind of based on network method for protecting software
US20080133419A1 (en) * 2006-12-05 2008-06-05 Brian Wormington Secure financial transaction system and method
JP2008269607A (en) * 2008-04-15 2008-11-06 Gemplus Method for controlling execution of software product
US20150134534A1 (en) * 2013-11-14 2015-05-14 Clarence Edwin Lai Software Protection Method for Preventing Unauthorized Usage
US11595201B2 (en) * 2020-02-21 2023-02-28 Cyber Armor Ltd. System and method for generation of a disposable software module for cryptographic material protection

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4944008A (en) * 1988-02-18 1990-07-24 Motorola, Inc. Electronic keying scheme for locking data
US4959861A (en) * 1988-07-13 1990-09-25 Howlette Edward L Security system for computer software
US5083309A (en) * 1989-11-23 1992-01-21 Schlumberger Industries Method and a system enabling software to be run securely
US5212729A (en) * 1992-01-22 1993-05-18 Schafer Randy J Computer data security device and method
US5379342A (en) * 1993-01-07 1995-01-03 International Business Machines Corp. Method and apparatus for providing enhanced data verification in a computer system

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2523745B1 (en) * 1982-03-18 1987-06-26 Bull Sa METHOD AND DEVICE FOR PROTECTING SOFTWARE DELIVERED BY A SUPPLIER TO A USER
US4578531A (en) * 1982-06-09 1986-03-25 At&T Bell Laboratories Encryption system key distribution method and apparatus
US4819267A (en) * 1984-02-22 1989-04-04 Thumbscan, Inc. Solid state key for controlling access to computer systems and to computer software and/or for secure communications
FR2606185B1 (en) * 1986-11-04 1988-12-09 Eurotechnique Sa METHOD AND DEVICE FOR STORING SOFTWARE DELIVERED BY A SUPPLIER TO A USER
US5166886A (en) * 1989-07-31 1992-11-24 Molnar Charles E System to demonstrate and sell computer programs
US5222134A (en) * 1990-11-07 1993-06-22 Tau Systems Corporation Secure system for activating personal computer software at remote locations
US5343524A (en) * 1991-06-21 1994-08-30 Mu Xiao Chun Intelligent security device
US5222133A (en) * 1991-10-17 1993-06-22 Wayne W. Chou Method of protecting computer software from unauthorized execution using multiple keys
US5276735A (en) * 1992-04-17 1994-01-04 Secure Computing Corporation Data enclave and trusted path system
US5400403A (en) * 1993-08-16 1995-03-21 Rsa Data Security, Inc. Abuse-resistant object distribution system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4944008A (en) * 1988-02-18 1990-07-24 Motorola, Inc. Electronic keying scheme for locking data
US4959861A (en) * 1988-07-13 1990-09-25 Howlette Edward L Security system for computer software
US5083309A (en) * 1989-11-23 1992-01-21 Schlumberger Industries Method and a system enabling software to be run securely
US5212729A (en) * 1992-01-22 1993-05-18 Schafer Randy J Computer data security device and method
US5379342A (en) * 1993-01-07 1995-01-03 International Business Machines Corp. Method and apparatus for providing enhanced data verification in a computer system

Also Published As

Publication number Publication date
GB2317476B (en) 2000-03-22
GB2317476A (en) 1998-03-25
US5754646A (en) 1998-05-19
WO1997004412A2 (en) 1997-02-06
GB9800437D0 (en) 1998-03-04
CA2227060A1 (en) 1997-02-06

Similar Documents

Publication Publication Date Title
WO1997004412A3 (en) Method for protecting publicly distributed software
MY117060A (en) Method and apparatus for restoration of a computer system hard drive
CA2414281A1 (en) System and method for updating and distributing information
EP0084441A3 (en) Method and apparatus for the protection of proprietary computer software
CA2080531A1 (en) Method of protecting computer software from unauthorized execution using multiple keys
EP0770997A3 (en) Password protection for removable hard drive
AU2541697A (en) Call management system with call control from user workstation computers
WO2000019317A8 (en) Protection of boot block code while allowing write accesses to the boot block
WO2001048582A3 (en) Method and device for presenting data to a user
IL129729A0 (en) System and method for protecting a computer and a network from hostile downloadables
EP0803811A3 (en) System and method for stub retrieval and loading
WO2001042921A8 (en) Multiple copy capability for network backup systems
GB2378794A (en) Generating a key hierarchy for use in an isolated execution environment
AU6832994A (en) Storage manager for computer system
AU2294801A (en) Quick starting microprocessor-based system
EP0838758A3 (en) Method and apparatus for performing retroactive backups in a computer system
AU7166996A (en) Personal computer hard disk protection system
GB2330228A (en) Method and apparatus for protecting flash memory
AU4264897A (en) Data storage system with selectable data protection
EP0818748A3 (en) Software management system and method
MY106707A (en) Apparatus and method for decreasing the memory requirements for bios in a personal computer system.
AU6724396A (en) Electronic document and data storage and retrieval system
WO1998035175A3 (en) Vertical cable manager
WO1996010224A3 (en) Mechanism for linking together the files of emulated and host system for access by emulated system users
AU8649998A (en) Backup restoring method, controller therefor/and computer-readable ecording medium stored with backup restore program

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): CA GB

AK Designated states

Kind code of ref document: A3

Designated state(s): CA GB

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref document number: 2227060

Country of ref document: CA

Ref country code: CA

Ref document number: 2227060

Kind code of ref document: A

Format of ref document f/p: F