WO2008056373A1 - Intelligent system to protect softwares from unauthorized duplication - Google Patents
Intelligent system to protect softwares from unauthorized duplication Download PDFInfo
- Publication number
- WO2008056373A1 WO2008056373A1 PCT/IN2007/000458 IN2007000458W WO2008056373A1 WO 2008056373 A1 WO2008056373 A1 WO 2008056373A1 IN 2007000458 W IN2007000458 W IN 2007000458W WO 2008056373 A1 WO2008056373 A1 WO 2008056373A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- software
- security
- unit
- computer
- data
- Prior art date
Links
- 238000013507 mapping Methods 0.000 claims abstract description 14
- 238000000034 method Methods 0.000 claims abstract description 13
- 230000007246 mechanism Effects 0.000 claims description 14
- 108091028043 Nucleic acid sequence Proteins 0.000 claims description 3
- 230000000694 effects Effects 0.000 claims description 3
- 230000002207 retinal effect Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 claims description 2
- 230000009977 dual effect Effects 0.000 claims 1
- 230000001681 protective effect Effects 0.000 claims 1
- 238000004590 computer program Methods 0.000 description 3
- 238000009434 installation Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 1
- 108090000623 proteins and genes Proteins 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
Definitions
- the present invention provides a new unique means which uses an efficient software encryption and memory mapping mechanism to protect softwares from unauthorized duplication.
- a software encryption mechanism and memory mapping mechanism by way of a software encryption mechanism and memory mapping mechanism, computer programs (softwares) and or data files are delivered to a computer system in a secured manner, so that the computer softwares are not allowed for unauthorized usage and duplication.
- the present invention provides an intelligent system for delivering computer softwares from the software manufacturer to the end user in a much-secured way without allowing unauthorized multiple duplications in between and thereafter.
- the present invention provides an intelligent system, which uses biometrics techniques such as fingerprint, retinal pattern, DNA sequence, voice recognition, and other techniques for user authentication.
- biometrics techniques such as fingerprint, retinal pattern, DNA sequence, voice recognition, and other techniques for user authentication.
- the present invention provides an intelligent system, which uses license management mechanism to monitor utilization of software licenses.
- Still more particularly another object of the present invention is to provide a software encryption and memory mapping mechanism to allow the usage of the computer softwares effectively and securely, wherein copying techniques such as copying of distribution media, keys and passwords, hard drives, system fingerprinting, and other common privacy concerns are prohibited.
- an Intelligent Control Element is installed between a computer system and a mass storage device.
- ICE could be attached along with Hard Drive, CD, DVD, Flash Drive Etc.
- the Main drawback of this invention is, it allows read or write file creation, data coding, copying, deleting and encryption of files from IMSS like any other conventional storage media. Also it has no role in license management.
- a mass storage apparatus having features of the present invention provides multiple levels of protection for the software or other digital content recorded on the apparatus.
- a first level of protection is physical and prevents access to the physical media on which the software or other digital content is recorded.
- a second level of protection is effected by software, which prevents unauthorized electronic access to the mass storage apparatus while the apparatus is in electronic communication with the host computer.
- a third level of protection is effected by the encryption of the software of other digital content that is stored within the apparatus.
- Present invention uses a separate application to write data into the mass storage device and to read data from it securely without allowing unauthorized duplication.
- Hardware security as mentioned in the above prior art is not required in the present invention, because user has to use the specific application to read data from the mass storage unit even if he removes the memory chip.
- the main object of the present invention is to provide security system by way of an encryption and memory mapping mechanism to protect softwares from unauthorized duplication.
- the present invention provides a software encryption and memory mapping mechanism for avoiding softwares from being getting duplicated by computing systems like computers, Laptops, other digital systems.
- the present invention provides a software encryption method, which delivers computer programs (softwares) from the software manufacturer to the end user in a secured manner, so that the computer softwares are not allowed for unauthorized usage and duplication.
- the present invention also provides software encryption mechanism to allow the usage of the computer softwares effectively and securely, wherein copying techniques such as copying of distribution media, keys and passwords, hard drives, system fingerprinting, and other common privacy concerns are prohibited.
- Still another object of the present invention is to provide a software encryption mechanism and memory mapping mechanism for Non- Duplication of Softwares useful for preventing in the unauthorized installation of licensed software to a computer.
- Still another object of the present invention provides an electronic system, which executes the softwares in the well-protected environment within the computer without allowing user to do unauthorized activities on the software files.
- Still another object of the present invention is to use license management mechanism to monitor the licenses of the software within the device.
- This device provides both active and passive protection for the licensed software files.
- Fig (1) represents the Intelligent System to Protect Softwares from unauthorized duplication wherein (9) our device section, (10) is the Computer section.
- An Intelligent System to Protect Softwares from unauthorized duplication comprising: an intelligent device 9, disposed in electronic communication with an associated computer system 10.
- This Intelligent device 9 contains storage device i, this may be hard drive, CD-ROM, DVD-ROM, PCMCIA Flash Cards, Flash IC Chips, etc. In this storage device all the softwares files that are to be protected from unauthorized usage are stored. All the data within this will be in the mapped format.
- This storage device 1 is interfaced with Security Unit 3, via one of the following mentioned communications: ATA, IDE, SATA, SCSI, SAS, USB, MCMCIA, FLASH, Internet, NV-RAM, Network, etc.
- This Security Unit (3) takes care of all the required security issues. It does all the required encryption and memory mapping to the data. All the softwares required for the functionality of the device and for security are stored within this unit. They receive commands from Computer System and act accordingly.
- This Security Unit (3) is interfaced with Computer System through ISA, PCI/PCI-X, PCI-E, VME, USB, Network, etc. If this security unit permits only the software files will come out of the Storage Unit (1) to Computer Section (10).
- User Authentication Unit (3A) is responsible for authenticating the authorized user of the device. It stores all the user authentication details such as fingerprint, retinal pattern, DNA sequence, voice recognition, and other techniques.
- Security Unit (3) stores all the license details of the softwares stored within the device. It allows using softwares for only mentioned number of licenses. It doesn't allow user to use software exceeding the number of licenses provided to him.
- Security Unit (3) connects Storage Device to an appropriate IDE, ATA,
- Computer Section (10) contains application software, which is already installed to access this Intelligent System. This application software is made in such a way that, no other software can access this Intelligent
- this data will be processed in the Mapping Engine (6), to recover data from the original mapped format.
- the electro-mechanical system functions as per the following steps: a) All the softwares files that are to be protected from unauthorized duplication are stored in the Storage Unit (1) of Intelligent Device in the mapped format after encryption. b) Whenever the user plugs this Intelligent Device into end Computer Unit, he has to use the application software provided to access this Intelligent Device. c) User has to authenticate himself to use the device confirming his biometrics informations preconfigured earlier. d) Now, user has to perform only authorized operations on the Intelligent Device to use the device and the device will not be accessible to any unauthorized operations such as copy, cut, print screen etc. e) If the Intelligent device finds authorized commands from the user, it sends the software file from the Storage Unit to Computer Section.
- Decrypt Engine prepares data for further execution by decrypting the software received from the Intelligent Device.
- Mapping Engine processes the decrypted data, to recover data from the original mapped format. i) Now the software will be installed in the computer safely, without giving any view of software setup files and other files to the user. j) Now the software is ready for the user to use.
- the major advantages of the present invention are as follows:
- the present invention Intelligent System to Protect Softwares from Unauthorized Duplication is effective in protecting software files from the unauthorized duplication.
- the present invention prevents unauthorized duplication of licensed software.
- the system can be miniaturized to a chip configuration.
- the electromechanical system integrated into a chip can be operated easily on any desktop, laptop, notebook and the like.
- the electromechanical system can replace the CDs for installation/reinstallation of software.
- the system can be miniaturized to a MEMS configuration.
- the present invention automatically restricts usage of software to the number of licenses allowed in the storage device.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention concerns an intelligent system to protect software from unauthorized duplication comprising a device section (9) and a computer section (10).The device section comprises a storage unit (1 ), a security unit (3) and a user authentication unit (3A) which authenticates the user by using biometric techniques. The storage unit (1 ) stores licensed software files and interfaces (2) with the security unit (3), which takes care of the requires security issues of the intelligent system. The security unit (3) is further interfaced via a computer system interface (4) with the computer section (10), which contains a decrypt (5) and a mapping engine (6). The device sends software to the computer in a uniquely secured way so that user is not allowed to use licensed software for unauthorized purposes.
Description
"Intelligent System to Protect Softwares from Unauthorized Duplication "
FIELD OF THE INVENTION:
The present invention provides a new unique means which uses an efficient software encryption and memory mapping mechanism to protect softwares from unauthorized duplication.
More particularly the present invention, by way of a software encryption mechanism and memory mapping mechanism, computer programs (softwares) and or data files are delivered to a computer system in a secured manner, so that the computer softwares are not allowed for unauthorized usage and duplication.
Still more particularly the present invention provides an intelligent system for delivering computer softwares from the software manufacturer to the end user in a much-secured way without allowing unauthorized multiple duplications in between and thereafter.
Still more particularly, the present invention provides an intelligent system, which uses biometrics techniques such as fingerprint, retinal pattern, DNA sequence, voice recognition, and other techniques for user authentication.
Still more particularly, the present invention provides an intelligent system, which uses license management mechanism to monitor utilization of software licenses.
Still more particularly another object of the present invention is to provide a software encryption and memory mapping mechanism to allow the usage of the computer softwares effectively and securely,
wherein copying techniques such as copying of distribution media, keys and passwords, hard drives, system fingerprinting, and other common privacy concerns are prohibited.
BACKGROUND ART:
The biggest legal problem affecting the software industry today is the unauthorized duplication, which is the illegal copying or use of software files. Unauthorized duplication is a huge problem mainly because it is so easy to do.
Software duplication is a ubiquitous issue in the computer industry.
When a consumer purchase a single copy of a given software package, he can duplicate the software into unlimited amount of copies and distribute them all over the world for a significant reduction in sale price.
Governments all over the world recognized the impact of software duplication on the computer industry and try to protect software owner's intellectual property with international treaties, laws and more severe penalties for infringement of the copyright and the intellectual property rights of software owners.
This unauthorized duplication problem has created a role for a new industry of license and software protection devices to emerge and to be successfully fight the piracy problem.
Unauthorized software duplication is thriving because of the amount of avenues it opens in business for pirates.
One of the most important aspects of software duplication is the media used. All the present software distribution medias failed to protect the softwares from being getting duplicated.
Reference may be made to the US Publication No. 2005 0216685 Al Heden, Donald Gene; et al, wherein it has been disclosed that: - The Intelligent Media Storage System disclosed herein protects computer programs and/or data files from being copied and used in an unauthorized manner. According to an example embodiment of the invention, an Intelligent Control Element (ICE) is installed between a computer system and a mass storage device.
In this prior art we can see that the data file access in IMSS is allowed through authentication code system operating through ICE. ICE could be attached along with Hard Drive, CD, DVD, Flash Drive Etc. The Main drawback of this invention is, it allows read or write file creation, data coding, copying, deleting and encryption of files from IMSS like any other conventional storage media. Also it has no role in license management.
Reference may also be made to the US Publication No. 20050210278, Al, Conklin, Bruce; (San Antonio, TX); Conklin, Suzan; (San Antonio, TX); et al, wherein it has been disclosed that: - A mass storage apparatus, and method for using same, for securely delivering digital content to a host computer that satisfies the need for reliable, secure, and safe distribute distribution that is easy for end-users to use and for manufacturers to implement yet provides surpassing protection of Manufacturers1 intellectual property. The apparatus provides both passive and active protection for the digital content to be distributed. Passive protection is designed to prevent physical access to the media within the apparatus. Active protection will render the media unreadable should the passive protection fail.
In this prior art, we can see that a mass storage apparatus having features of the present invention provides multiple levels of protection
for the software or other digital content recorded on the apparatus. In one embodiment, a first level of protection is physical and prevents access to the physical media on which the software or other digital content is recorded. A second level of protection is effected by software, which prevents unauthorized electronic access to the mass storage apparatus while the apparatus is in electronic communication with the host computer. A third level of protection is effected by the encryption of the software of other digital content that is stored within the apparatus.
In this prior art, it is mentioned that a program is operative to disable Internet or network connectivity to or from said user's computer while said digital content is being accessed. It doesn't mention about license management of software.
But in the present invention no need to disable Internet or network connectivity to or from said user's computer. Present invention uses a separate application to write data into the mass storage device and to read data from it securely without allowing unauthorized duplication. Hardware security as mentioned in the above prior art is not required in the present invention, because user has to use the specific application to read data from the mass storage unit even if he removes the memory chip.
OBJECTS OF THE INVENTION:
The main object of the present invention is to provide security system by way of an encryption and memory mapping mechanism to protect softwares from unauthorized duplication.
The present invention provides a software encryption and memory mapping mechanism for avoiding softwares from being getting
duplicated by computing systems like computers, Laptops, other digital systems.
Also, the present invention provides a software encryption method, which delivers computer programs (softwares) from the software manufacturer to the end user in a secured manner, so that the computer softwares are not allowed for unauthorized usage and duplication.
The present invention also provides software encryption mechanism to allow the usage of the computer softwares effectively and securely, wherein copying techniques such as copying of distribution media, keys and passwords, hard drives, system fingerprinting, and other common privacy concerns are prohibited.
Still another object of the present invention is to provide a software encryption mechanism and memory mapping mechanism for Non- Duplication of Softwares useful for preventing in the unauthorized installation of licensed software to a computer.
Still another object of the present invention provides an electronic system, which executes the softwares in the well-protected environment within the computer without allowing user to do unauthorized activities on the software files.
Still another object of the present invention is to use license management mechanism to monitor the licenses of the software within the device.
This device provides both active and passive protection for the licensed software files.
BRIEF DESCRIPTION OF THE DRAWINGS:
In the drawing accompanying this specification, Fig (1) represents the Intelligent System to Protect Softwares from unauthorized duplication wherein (9) our device section, (10) is the Computer section. An Intelligent System to Protect Softwares from unauthorized duplication, according to the invention is provided comprising: an intelligent device 9, disposed in electronic communication with an associated computer system 10.
This Intelligent device 9 contains storage device i, this may be hard drive, CD-ROM, DVD-ROM, PCMCIA Flash Cards, Flash IC Chips, etc. In this storage device all the softwares files that are to be protected from unauthorized usage are stored. All the data within this will be in the mapped format.
This storage device 1 is interfaced with Security Unit 3, via one of the following mentioned communications: ATA, IDE, SATA, SCSI, SAS, USB, MCMCIA, FLASH, Internet, NV-RAM, Network, etc. This Security Unit (3) takes care of all the required security issues. It does all the required encryption and memory mapping to the data. All the softwares required for the functionality of the device and for security are stored within this unit. They receive commands from Computer System and act accordingly. This Security Unit (3) is interfaced with Computer System through ISA, PCI/PCI-X, PCI-E, VME, USB, Network, etc. If this security unit permits only the software files will come out of the Storage Unit (1) to Computer Section (10).
User Authentication Unit (3A) is responsible for authenticating the authorized user of the device. It stores all the user authentication details such as fingerprint, retinal pattern, DNA sequence, voice recognition, and other techniques.
Separate application software is provided to write software data into the Storage Unit (1). This application software will interact with
Security Unit and hence write software data accordingly into the
Storage Unit (1). Before writing the software data into the Storage
Unit (1), software data gets encrypted by the security software stored in the Security Unit (3) using the unique encryption algorithm provided. Writing and reading of Software data from the Storage Unit will be strictly under the control of Security unit (3). After encryption, software data will be stored in the Storage Unit (1) in the mapped format.
Security Unit (3) stores all the license details of the softwares stored within the device. It allows using softwares for only mentioned number of licenses. It doesn't allow user to use software exceeding the number of licenses provided to him.
Security Unit (3) connects Storage Device to an appropriate IDE, ATA,
SATA, SCSI, SAS, USB, PC-MCIA, FLASH, Battery-backup-RAM,
NVRAM, Ethernet, Internet, network, etc.
Computer Section (10) contains application software, which is already installed to access this Intelligent System. This application software is made in such a way that, no other software can access this Intelligent
System.
Now in Computer Section, data received from the Device will be decrypted by the Decrypt Engine (5), which prepares data for further execution.
Then this data will be processed in the Mapping Engine (6), to recover data from the original mapped format.
Now the software from the Intelligent System will be installed in the computer safely, without giving any view of software setup files and other supporting files to the user.
Now the software is ready for use.
It ensures total protection of data regardless of its access mode and file types.
FUNCTIONAL FEATURES OF THE INVENTION:
According to the invention, the electro-mechanical system functions as per the following steps: a) All the softwares files that are to be protected from unauthorized duplication are stored in the Storage Unit (1) of Intelligent Device in the mapped format after encryption. b) Whenever the user plugs this Intelligent Device into end Computer Unit, he has to use the application software provided to access this Intelligent Device. c) User has to authenticate himself to use the device confirming his biometrics informations preconfigured earlier. d) Now, user has to perform only authorized operations on the Intelligent Device to use the device and the device will not be accessible to any unauthorized operations such as copy, cut, print screen etc. e) If the Intelligent device finds authorized commands from the user, it sends the software file from the Storage Unit to Computer Section. f) User is allowed to use softwares within the device for only number of licenses provided to him, whose license details will be stored in the Security Unit (3). g) In Computer Section, Decrypt Engine prepares data for further execution by decrypting the software received from the Intelligent Device. h) Mapping Engine processes the decrypted data, to recover data from the original mapped format.
i) Now the software will be installed in the computer safely, without giving any view of software setup files and other files to the user. j) Now the software is ready for the user to use.
Example
Consider MEMSPRO software file to be distributed to the end user securely without allowing him to duplicate by any means. If this software is distributed through the mentioned present invention, it assures a complete non-duplicatable security guarantee. This Intelligent System comes with a media, which will give application software, which needs to be installed to use the intelligent system. When the Intelligent System is connected to the computer section, user has to access the device through the application software installed. User finds no other way to access the device. He can install the software into his system, but prevented from other unauthorized activities. User can use the MEMSPro software for only number of licenses he is provided with.
ADVANTAGES OF THE INVENTION:
The major advantages of the present invention are as follows: The present invention Intelligent System to Protect Softwares from Unauthorized Duplication is effective in protecting software files from the unauthorized duplication.
1. The present invention prevents unauthorized duplication of licensed software.
2. The system can be miniaturized to a chip configuration.
3. The electromechanical system integrated into a chip can be operated easily on any desktop, laptop, notebook and the like.
4. The electromechanical system can replace the CDs for installation/reinstallation of software. The system can be miniaturized to a MEMS configuration.
5. The present invention automatically restricts usage of software to the number of licenses allowed in the storage device.
Claims
1. An Intelligent System to Protect Softwares from Unauthorized Duplication comprises a) Device section (9), b) Computer section (10). Storage unit of the Device section (9) stores all the software files to be secured in the Storage Unit (1), Security Unit (3) takes care of all the required security issues, User Authentication Unit (3A) which authenticate the user by using biometrics techniques, decrypt engine (5) of the Computer section (10) decrypt the software file received from the Device section (9) and prepares data for further executions, Mapping Engine (6) processes the decrypted data, to recover data from the original mapped format.
2. Storage Unit (1) claimed in claim 1, stores all the encrypted softwares to be secured in the mapped format after encryption, this storage Unit may be a memory flash, a memory card, a hard disk, a EPROM, a EEPROM, a RAM, a disc on chip.
3. Storage Unit (1) claimed in claim 1 to 2 will be interfaced with the Security Unit (3) through ATA, IDE, SATA, SCSI, SAS, USB, PCMCIA, FLASH, Internet, Network, NV-RAM, etc.
4. Security Unit (3) claimed in claim 1 and claim 3 takes care of all the required security issues of the Intelligent System. All the softwares required for the functionality of the intelligent system and for security, are stored within this unit.. They receive commands from Computer System and act according to the predefined security instructions.
5. Security Unit (3) claimed in claim 1, claim 3 and claim 4 encrypt the software data before writing it into the Storage Unit (1). It also employs mapping logic mechanism, indirect authentication mechanism, crypt key logic mechanism to ensure a complete security to the digital data.
6. Security Unit (3) claimed in claim 1, claim 3, claim 4 and claim 5 is provided with a User Authentication Unit (3A), which stores all the authentication details of the user, such as biometrics techniques, example fingerprint, retinal pattern, DNA sequence, voice recognition, and other techniques.
7. Security Unit (3) claimed in claim 1, claim 3, claim 4, claim 5 and claim 6 stores all the license details of the software file stored within the device and restricts the user to use the software for only number of licenses provided to him.
8. Security Unit (3) claimed in claim 1, claim 3, claim 4, claim 5, claim 6 and claim 7 will be a FPGA, ASIC, CPU.
9. Security Unit (3) claimed in claim 1, claim 3, claim 4, claim 5 claim 6, claim 7 and claim 8, will be interfaced with the Computer Section (10) through ISA, USB, PCI-E, VME, DDR/DDR-II, Network, SDRAM, RAMBUS, IEEE, Dual Port RAM, etc.
10. Software Data received from the intelligent system will be decrypted by the Decrypt Engine (5), which prepares data for further execution.
11. Decrypt engine claimed in claim 1 and claim 10 will be a separate application software stored in the computer section.
12. This decrypted data will be processed in the Mapping Engine (6), to recover data from the original mapped format.
13. Mapping Engine (6) claimed in claim 1 and claim 12 will be separate application software stored in the computer section.
14. Intelligent System claimed in claim 1 to claim 13 creates a protective environment in the Computer section which will prevent all the unauthorized activities predefined in the Security Unit (3).
15. Intelligent System claimed in claim 1 to claim 14 ensures total protection of software files regardless of its access mode and file types.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN2084CH2006 | 2006-11-10 | ||
IN2084/CHE/2006 | 2006-11-10 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008056373A1 true WO2008056373A1 (en) | 2008-05-15 |
Family
ID=39364225
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IN2007/000458 WO2008056373A1 (en) | 2006-11-10 | 2007-10-04 | Intelligent system to protect softwares from unauthorized duplication |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2008056373A1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010037450A1 (en) * | 2000-03-02 | 2001-11-01 | Metlitski Evgueny A. | System and method for process protection |
EP1184771A1 (en) * | 2000-08-24 | 2002-03-06 | Wibu-Systems AG | Method and device for protection of computer software and/or computer-readable data |
US20050216685A1 (en) * | 2004-02-03 | 2005-09-29 | Heden Donald G | Intelligent media storage system |
-
2007
- 2007-10-04 WO PCT/IN2007/000458 patent/WO2008056373A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010037450A1 (en) * | 2000-03-02 | 2001-11-01 | Metlitski Evgueny A. | System and method for process protection |
EP1184771A1 (en) * | 2000-08-24 | 2002-03-06 | Wibu-Systems AG | Method and device for protection of computer software and/or computer-readable data |
US20050216685A1 (en) * | 2004-02-03 | 2005-09-29 | Heden Donald G | Intelligent media storage system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7765373B1 (en) | System for controlling use of a solid-state storage subsystem | |
AU2002368159B2 (en) | System and method for authentication | |
US9251381B1 (en) | Solid-state storage subsystem security solution | |
US20050216685A1 (en) | Intelligent media storage system | |
US20080046997A1 (en) | Data safe box enforced by a storage device controller on a per-region basis for improved computer security | |
JP4610557B2 (en) | DATA MANAGEMENT METHOD, PROGRAM THEREOF, AND PROGRAM RECORDING MEDIUM | |
US20090150631A1 (en) | Self-protecting storage device | |
US9235691B2 (en) | Method for preventing illegal use of software | |
US20090094601A1 (en) | Method and device for protecting software from unauthorized use | |
US8250377B2 (en) | Software copyright protection and licensing system using RFID | |
US20020073340A1 (en) | Secure mass storage device with embedded biometri record that blocks access by disabling plug-and-play configuration | |
KR20070105359A (en) | Usb secure storage apparatus and method | |
WO2010127030A2 (en) | Selectively securing data and/or erasing secure data caches responsive to security compromising conditions | |
CN103262092A (en) | Storage drive based antimalware methods and apparatuses | |
US20100174902A1 (en) | Portable storage media with high security function | |
WO2008056373A1 (en) | Intelligent system to protect softwares from unauthorized duplication | |
JP2003208234A (en) | Software recording part separation type information processor and software managing method | |
WO2013024702A1 (en) | External storage device and method for controlling external storage device | |
US20080209579A1 (en) | Electro-Mechanical System For Non-Duplication of Operating System | |
US8079092B2 (en) | Electro-mechanical system for non-duplication of software | |
CN103870770A (en) | Method and system for protecting magnetic disk | |
WO2008078333A1 (en) | Intelligent system to protect confidential information from unauthorized duplication | |
TWI331328B (en) | Method and system for protecting hard disks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07859597 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 07859597 Country of ref document: EP Kind code of ref document: A1 |