[go: up one dir, main page]

CN100392624C - Method for limiting software to be used only by owner of right of use - Google Patents

Method for limiting software to be used only by owner of right of use Download PDF

Info

Publication number
CN100392624C
CN100392624C CNB998170550A CN99817055A CN100392624C CN 100392624 C CN100392624 C CN 100392624C CN B998170550 A CNB998170550 A CN B998170550A CN 99817055 A CN99817055 A CN 99817055A CN 100392624 C CN100392624 C CN 100392624C
Authority
CN
China
Prior art keywords
software
user
processing device
piece
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
CNB998170550A
Other languages
Chinese (zh)
Other versions
CN1406353A (en
Inventor
谢浩强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xie Haoqiang
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=11004946&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CN100392624(C) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Individual filed Critical Individual
Priority claimed from PCT/IB1999/002026 external-priority patent/WO2001046811A1/en
Publication of CN1406353A publication Critical patent/CN1406353A/en
Application granted granted Critical
Publication of CN100392624C publication Critical patent/CN100392624C/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

中央程序包括一个EI子程序用于提供一个其使用权拥有者的身份,以接通一个网络中央计算机以获取服务或软件产品或类似的,当中牵涉在该使用权拥有者的户口上进行一个安全操作以支付所需款项;和一个AS子程序,其利用“EI子程序存在于一部计算机”作为先决条件以授权所获取的软件产品可用于该计算机。该中央程序用于管理藏于其内的个别子程序的使用,从而使AS子程序可以免被单独地复制。

The central program includes an EI subprogram for providing an identity of a user of the right to use in order to access a network central computer to obtain services or software products or the like, which involves a secure operation on the user's account to pay the required amount; and an AS subprogram, which uses "the EI subprogram exists on a computer" as a prerequisite to authorize the obtained software product to be used on the computer. The central program is used to manage the use of individual subprograms hidden therein, so that the AS subprograms can be prevented from being copied individually.

Description

用于限制软件只可被其使用权拥有者使用的方法 A method for restricting the use of software only by the owner of the right to use it

技术领域 technical field

本发明涉及商业软件的保护,特别是关于保护这些商业软件免遭未经授权的使用或复制。The present invention relates to the protection of commercial software, and in particular to the protection of such commercial software from unauthorized use or copying.

背景技术 Background technique

过去,软件保护方法用于保护由一通讯网络如电话系统所分销的商业软件产品如程序,多媒体软件,会需要将一件硬件包括有解密匙和解密系统装设于一个使用者的计算机内,用以被一在该计算机上运行的软件程序核实身份。当中被使用的是硬件,而不是软件,因为软件复制设施普遍地存在于个人计算机中。然而,这方法是极之麻烦,并对使用者和软件供应者而言都是一种负担。In the past, software protection methods used to protect commercial software products such as programs and multimedia software distributed by a communication network such as a telephone system would require a piece of hardware including a decryption key and a decryption system to be installed in a user's computer, To be authenticated by a software program running on the computer. Hardware is used, not software, since software copying facilities are ubiquitous in personal computers. However, this method is extremely cumbersome and a burden to users and software providers.

由此,本发明的一个目的是提供一件软件以取代上述硬件,和借着一种心理障碍,令这件软件的使用权拥有者不敢于将这件软件复制给其它人。Therefore, an object of the present invention is to provide a piece of software to replace the above-mentioned hardware, and by a kind of psychological barrier, the owner of the right to use the software is afraid to copy the software to others.

本发明的另一个目的是提供一个方法令一个使用权拥有者不敢于将他的软件复制给其它人。Another object of the present invention is to provide a method that makes a right holder afraid to copy his software to others.

发明简述Brief description of the invention

根据本发明的第一个实施方案,它提供一个中央程序包括有1)一个子程序用于提供一个被加密的身份(以下称为EI子程序),2)一个子程序用于授权一软件产品的使用(以下称为AS子程序),3)一个子程序用于核实使用者的计算机的身份(以下称为AC子程序)。According to a first embodiment of the invention, it provides a central program comprising 1) a subroutine for providing an encrypted identity (hereinafter referred to as the EI subroutine), and 2) a subroutine for authorizing a software product (hereinafter referred to as the AS subroutine), 3) a subroutine is used to verify the identity of the user's computer (hereinafter referred to as the AC subroutine).

中央程序用于管理藏于其内的个别子程序的使用,使AS子程序免被外界直接地接触,从而使它免被单独地复制。EI子程序用于提供其使用权拥有者的身份信息(一个被加密的身份),用于访问一个网络中央计算机以获取服务或软件产品或类似,当中牵涉在该使用权拥有者的户口上进行一个安全操作以支付所需款项。AC子程序用于核实其所运行于的计算机为某一预定计算机,通过以软件方式测知该计算机的硬件及软件特性,然后跟所要求的比较。AS子程序用于利用AC子程序的核实结果和以“EI子程序的存在”作为先决条件以授权从前述的方式所获取的软件产品可用于该计算机,而使用者当然是无需再为先前已购买的软件产品重新付款的。而该EI子程序是要没有防止未经授权使用的保护及可被任何使用者用于一部计算机的。The central program is used to manage the use of individual subroutines hidden in it, so that the AS subroutine is protected from being directly accessed by the outside world, thereby preventing it from being individually copied. The EI subroutine is used to provide the identity information (an encrypted identity) of the owner of the right to access a network central computer to obtain services or software products or similar, which involves performing transactions on the account of the owner of the right to use A safe operation to make the required payment. The AC subroutine is used to verify that the computer it is running on is a predetermined computer, by detecting the hardware and software characteristics of the computer through software, and then comparing it with the required one. The AS subroutine is used to use the verification results of the AC subroutine and to authorize the software product obtained in the aforementioned manner to be used on the computer with the "existence of the EI subroutine" as a prerequisite, and the user does not need to re-apply for the previously obtained Purchased software products are repaid. And the EI subroutine is to have no protection against unauthorized use and can be used by any user on a computer.

应注意的是,于中央程序之内,一切有关保护那些软件产品免被其使用权拥有者不正当地复制给其它人的问题上,只有AS子程序是需要加以保护的。而根据本发明,AS子程序可以得到保护,免被其使用权拥有者在未得授权情况下复制予其它人,是基于一个事实,就是一个使用权拥有者是不会复制一件软件,即中央软件给其它人的。因为其内存在着EI子程序,其可以被一未经授权使用者运用以提供该使用权拥有者的身份的信息,以使用该使用权拥有者的户口以获取,比如网络服务或软件产品。从自动取款机磁带咭的使用可以见到,其虽然易于被复制,但事实证明却非常安全。It should be noted that, within the central program, only the AS subroutine needs to be protected in all matters concerning the protection of those software products from being improperly copied to others by the owner of the right to use it. And according to the present invention, the AS subroutine can be protected from being copied to other people without authorization by its owner of the use right, based on the fact that a use right owner will not copy a piece of software, that is Central software to others. Because there is an EI subroutine in it, it can be used by an unauthorized user to provide the information of the identity of the right owner to use the account of the right owner to obtain, such as network services or software products. As can be seen from the use of tape cards in ATMs, although they are easy to copy, they have proven to be very secure.

根据本发明的第二个实施方案,中央程序仅包含EI子程序,而AS子程序变成一个独立程序,用于授权软件产品被使用,但袛是当EI子程序存在于同一部其所运行的计算机的时候,而这点是从EI子程序处接收一个被加密身份而判断出来的。According to a second embodiment of the invention, the central program only contains the EI subroutine, while the AS subroutine becomes an independent program for authorizing the software product to be used, but only when the EI subroutine exists in the same computer it runs When the computer, and this point is judged by receiving an encrypted identity from the EI subroutine place.

根据第三个实施方案,EI和AS子程序基本上是相等的,因而一个使用权拥有者将AS子程序复制给其它人是相等于复制EI子程序给其它人的,从而防止AS子程序未经授权被复制或使用。According to the third embodiment, the EI and AS subroutines are basically equal, so that a use right holder copies the AS subroutine to other people is equal to copying the EI subroutine to other people, thereby preventing the AS subroutine from being unused. Reproduced or used with permission.

附图简述Brief description of the drawings

图1是中央程序的方框图。Figure 1 is a block diagram of the central program.

图2是一个程序的一个部份“B”被加密储存于随机存取存储器(RAM)内的示意图。FIG. 2 is a diagram illustrating a portion "B" of a program encrypted and stored in random access memory (RAM).

优选实施方案详述DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

本发明主要是在于保护软件产品,由一通讯网络销售的,免被未经授权复制或使用,而为求简单,以下的说明是针对储存于一使用者的IBM个人计算机的这些软件产品的保护。还有,本发明将依以下的标题逐一说明:The present invention is primarily concerned with protecting software products sold via a communication network from unauthorized copying or use. For simplicity, the following description is directed to the protection of these software products stored on a user's IBM personal computer. . Also, the present invention will be explained one by one according to the following headings:

1)中央程序1) Central program

2)一个子程序用于提供一个被加密的身份(EI子程序)2) A subroutine is used to provide an encrypted identity (EI subroutine)

3)一个子程序用于授权一软件产品的使用(AS子程序)3) A subroutine is used to authorize the use of a software product (AS subroutine)

4)一个子程序用于核实使用者的计算机的身份(AC子程序)4) A subroutine is used to verify the identity of the user's computer (AC subroutine)

5)其它实施方案5) Other implementations

1)中央程序1) Central program

根据第一个实施方案,其包含一个中央程序,其为一个可执行的程序和可以被以下方式导致被执行的,a)当使用者在DOS环境输入其文件名称,b)被一运行中程序导致。图1是中央程序的方框图,其详述如下:According to a first embodiment, it comprises a central program, which is an executable program and can be caused to be executed a) when the user enters its file name in the DOS environment, b) by a running program lead to. Figure 1 is a block diagram of the central program, which is detailed as follows:

a)当使用者想通过一个通信连接去访问一个网络中央计算机,他需先导致中央程序被执行。中央程序会请求使用者输入一个密码,以使它能够运作,和如果密码与所要求的吻合,它将会响应使用者的命令而发送一个属于其使用权拥有者,其亦应就是该使用者,的被加密身份给予中央计算机。a) When a user wants to access a network central computer through a communication connection, he needs to first cause the central program to be executed. The central program will ask the user to enter a password in order for it to function, and if the password matches what is requested, it will respond to the user's command by sending a message belonging to its user, which should also be the user , the encrypted identity given to the central computer.

这一个使用者输入密码的要求,是有需要以防止其它人访问中央计算机及使用其使用权拥有者的户口,在未获同意的情况下。This requirement for a user to enter a password is necessary to prevent others from accessing the central computer and using the user's account without consent.

中央程序将会导致EI子程序被执行以提供一个使用者的被加密身份予中央计算机,详情容后交代。而如果被加密身份是正确的,中央计算机将会许可使用者的访问要求,详情将于以下项目2交代。The central program will cause the EI subroutine to be executed to provide a user's encrypted identity to the central computer, details will be explained later. And if the encrypted identity is correct, the central computer will grant the user's access request. The details will be explained in item 2 below.

b)当一个运作中的程序想导致AS子程序被执行,以授权其可继续运行,它会先预备一个输入参数用以示意中央程序这一个要求及存储该输入参数于随机存取存储器(RAM)的一个预定的储存单元内,然后通过使用一个用于所述用途的PC DOS服务调用程序(service call),导致中央程序被执行。如果中央程序已被先前所述的密码激活,它将会从预定的储存单元内取出该输入参数,从而中央程序能够知悉有一个正在运行的程序正要求从AS子程序处得到一个授权命令,和将会导致AS子程序被执行。否则,中央程序不会导致AS子程序授权该正在运行的程序去继续运行。由于密码是用于激活AS子程序,同时亦用于激活EI子程序的,其使用权拥有者会因而不敢于将密码提供他人,以使他人可用他的AS子程序。b) When an operating program wants to cause the AS subroutine to be executed to authorize it to continue running, it will first prepare an input parameter to indicate the central program's request and store the input parameter in random access memory (RAM ), which then causes the central program to be executed by using a PC DOS service call for said purpose. If the central program has been activated by the previously mentioned password, it will fetch the input parameter from a predetermined storage location, so that the central program can know that there is a running program that requires an authorization command from the AS subroutine, and will cause the AS subroutine to be executed. Otherwise, the central program will not cause the AS subroutine to authorize the running program to continue running. Since the password is used to activate the AS subroutine, it is also used to activate the EI subroutine, the owner of the right to use will not dare to provide the password to others so that others can use his AS subroutine.

至于中央程序是被使用者所导致执行的那种情况,则这将不会有一个有效的输入参数或没有输入参数而中央程序便会因此知悉。In the case where the central process is caused to be executed by the user, there will not be a valid input parameter or no input parameter and the central process will therefore be aware of it.

2)一个子程序用于提供一个被加密的身份(EI子程序)2) A subroutine is used to provide an encrypted identity (EI subroutine)

这子程序使用一个用于IC信用卡以作身份核实的方法,而其中,一个被加密的身份是会被产生的。This subroutine uses a method for identity verification for IC credit cards, where an encrypted identity is generated.

当开始运作时,EI子程序发送一个访问要求往中央计算机,而作为一个响应,中央计算机会送回一个随机数。EI子程序将用一个预定的算法A1加密随机数,和将结果发送给中央计算机,其将会允许访问,如果该结果与其通过执行同一加密算法于该随机数所得的是相同的。应注意的是,对于每一个使用者,其有一个对应的个别的加密算法A1用于其身份核实,另外,中央计算机可利用从EI子程序得来的加密结果,如其是正确的话,作为使用者的授权,用以从一个使用者的户口支付款项,以获取网络服务或软件产品或类似的用途。When starting to operate, the EI subroutine sends an access request to the central computer, and as a response, the central computer sends back a random number. The EI subroutine will encrypt the random number with a predetermined algorithm A1, and send the result to the central computer, which will allow access if the result is the same as that obtained by executing the same encryption algorithm on the random number. It should be noted that for each user, there is a corresponding individual encryption algorithm A1 for its identity verification. In addition, the central computer can use the encryption result obtained from the EI subroutine, if it is correct, as the use User's authorization to make payments from a user's account for network services or software products or similar purposes.

3)一个子程序用于授权一软件产品的使用(AS子程序)3) A subroutine is used to authorize the use of a software product (AS subroutine)

根据本发明,有2个途径用于授权一软件产品的使用:According to the present invention, there are 2 approaches for authorizing the use of a software product:

i)通过发送被加密的命令给正在运行的软件程序,以授权其继续运行于一计算机上,用如同前述项目2所述的用于身份核实的方式。确实地说,该正在运行的软件程序将一其所产生的随机数,加入前述项目1b所述的输入参数内,然后导致中央程序被执行。而AS子程序,如前述项目1b所述,被中央程序导致执行时,会将一个预定的加密算法A2运作于该随机数并将其所得结果发送给该正在运行的软件程序。而该正在运行的软件程序将会接受这被加密的命令和继续运行,如果该结果与其将相同的加密算法A2运作于该随机数的结果是相同的。i) Authorize the running software program to continue running on a computer by sending encrypted commands to it, in the same way as described in item 2 above for identity verification. Specifically, the running software program adds a random number it generates to the input parameters described in item 1b above, which then causes the central program to be executed. The AS subroutine, as described in item 1b above, when executed by the central program, will operate a predetermined encryption algorithm A2 on the random number and send the result to the running software program. And the running software program will accept the encrypted command and continue to run if the result is the same as the result of operating the random number with the same encryption algorithm A2.

应注意的是,要持续地使用该软件程序需要让其持续地收到被加密的命令。It should be noted that continuous use of the software program requires that it continuously receive encrypted commands.

又应注意的是,对于每一个使用者,每一个用于其计算机上的软件产品都使用一个相同的个别地属于该使用者的加密算法A2和加密算法A2是在中央计算机要将每一个这些软件产品供应给使用者的计算机时,被加入在每一个这些软件产品内。It should also be noted that for each user, each software product used on its computer uses the same encryption algorithm A2 that belongs to the user individually and the encryption algorithm A2 is to be used in the central computer to convert each of these The software products are included in each of these software products when they are delivered to users' computers.

ii)通过解密一个软件产品的被加密部份或完全被加密的一个软件产品。ii) By decrypting an encrypted portion of a software product or a fully encrypted software product.

应注意的是,如果该软件产品为一个程序,则仅将其部份加密已经足够防止未经授权的使用或复制。然而,如果该软件产品为一个视听多媒体数据文件,则将其整个软件产品加密更为理想。It should be noted that if the software product is a program, only partially encrypting it is sufficient to prevent unauthorized use or copying. However, if the software product is an audio-visual multimedia data file, it is more desirable to encrypt the entire software product.

部份或整个软件产品的解密过程在其的一个存于随机存取存储器(RAM)上的临时副本进行,而这临时副本于使用者完成使用软件产品后,便不应继续存在,以防止不合法的复制。以下提供一个例子,图2是一个程序的一个部份“B”被加密储存于随机存取存储器(RAM)内的示意图。图中所见,AS子程序将“B部份”解密后,其所得结果的体积将与被加密版本应该不一样,储存于“被解密的B部份”。The decryption process of part or the entire software product is carried out on a temporary copy of it stored in random access memory (RAM), and this temporary copy should not continue to exist after the user has finished using the software product to prevent unauthorized access. legal copying. An example is provided below. FIG. 2 is a schematic diagram of a part "B" of a program encrypted and stored in a random access memory (RAM). As can be seen in the figure, after AS subroutine decrypts "Part B", the volume of the obtained result will be different from the encrypted version, and it will be stored in "Decrypted Part B".

AS子程序然后将“被加密的B部份”的第一个储存单元,写上新的指令“跳至被解密的B部份”和于“被解密的B部份”的尾部加上指令“跳至C部份”。就这样,该软件的被加密部份将不会被执行而被解密部份才会被执行。The AS subroutine then writes a new command "jump to the decrypted part B" in the first storage unit of the "encrypted part B" and adds instructions at the end of the "decrypted part B" "Skip to Part C". In this way, the encrypted part of the software will not be executed but the decrypted part will be executed.

至于视听多媒体数据软件,它将会被分成多个小部份然后被逐一解密,而每个一小部份是在即将要被一视听程序用以产生视听效果时才会被解密。即是说,该视听程序要以前述项目1b所述的方式导致AS子程序被执行,当每次它需要一个小部份被解密的时候。最好的是,一个刚刚被解密的小部份会被写上于一个先前被解密的部份,这样一个完整的被解密的软件就不会存在于随机存取存储器(RAM)内。As for the audio-visual multimedia data software, it will be divided into multiple small parts and then decrypted one by one, and each small part will be decrypted when it is about to be used by an audio-visual program to produce audio-visual effects. That is, the audiovisual program causes the AS subroutine to be executed in the manner described in the preceding item 1b, each time it needs a small part to be decrypted. Preferably, a just-decrypted small portion is written over a previously decrypted portion so that a complete decrypted piece of software does not exist in random access memory (RAM).

4)一个子程序用于核实使用者的计算机的身份(AC子程序)4) A subroutine is used to verify the identity of the user's computer (AC subroutine)

AC子程序用于核实其运行于的计算机为某一预定的计算机,和如果该计算机不是的话,便防止被保护的软件被使用,和AC子程序的操作是受中央程序所控制的。The AC subroutine is used to verify that the computer it is running on is a predetermined computer, and if the computer is not, to prevent the protected software from being used, and the operation of the AC subroutine is controlled by the central program.

仔细的说,当中央程序被装置于一使用者计算机的硬磁盘后和被执行时,它会查察一个储存其内的被加密的状态信息,从而它知悉这是它首次被执行并将会导致一初始化程序展开。在初始化程序中,中央程序会一如前述项目2所述的,将一个其使用权拥有者的被加密身份发送给中央计算机,然后AC子程序向中央计算机要求一被加密命令。中央计算机会提供被加密命令,一如前述项目3i所述的方式,如果该使用权拥有者有一个有效户口而且是未被结束的话。Specifically, when the central program is installed on a user's computer's hard disk and executed, it checks an encrypted state message stored therein so that it knows that this is the first time it has been executed and will result in An initialization procedure is launched. In the initialization procedure, the central program will send an encrypted identity of its use right owner to the central computer as described in item 2 above, and then the AC subroutine requests an encrypted command from the central computer. The central computer will provide encrypted commands, as described in item 3i above, if the access holder has a valid account and is not terminated.

于核实命令后,AC子程序会测知使用者计算机的硬件和软件特性,例如包括,外围设备的身份比如鼠标,打印机,游戏杆,硬磁盘和软盘驱动器等,又如运行速度的测知,其为中央处理器频率,高速缓冲存储器的储存量等的函数;又如硬磁盘的磁头(head),磁道(cylinder),扇区(sector)数目和坏扇区的位置;又如操作系统软件的版本和某一软件产品包括中央程序于硬磁盘的实际位置;又如计算机的硬件身份码或类似的;通过使用本领域的技术人员所普遍熟悉的技术。实例有,通过导致计算机执行一测试程序,和激活一硬件计数器以量度计算机完成执行程序所需的时间,可测知其运行速度。另一实例,操作系统的版本可通过使用一特定的DOS服务调用程序(service call)以测知。After verifying the command, the AC subroutine will detect the hardware and software characteristics of the user's computer, including, for example, the identity of the peripheral equipment such as mouse, printer, joystick, hard disk and floppy disk drive, etc., and the detection of running speed, etc. It is a function of the frequency of the central processing unit, the storage capacity of the cache memory, etc.; another example is the head (head), track (cylinder), number of sectors (sector) and the position of the bad sector of the hard disk; another example is the version of the operating system software And a certain software product includes the central program at the physical location on the hard disk; also as the computer's hardware ID or similar; by using techniques generally familiar to those skilled in the art. For example, the speed of the computer can be measured by causing the computer to execute a test program and activating a hardware counter to measure the time it takes the computer to finish executing the program. As another example, the version of the operating system can be detected by using a specific DOS service call.

测知的结果和一示意中央程序已被初始化的状态信息将会被AC子程序以被加密资料形式,储存于硬磁盘内的中央程序的一预定部份。这之后,每次当中央程序被执行时,它将会先查看该状态信息,和在判断它自己已被初始化后,它会执行一个被要求的工作,如前述项目1所述的,此外,它还会自动地导致AC子程序被执行以进行一次测知,每次它会测知其所运行中的计算机的至少一部份前述的计算机的硬件和软件特性,和AC子程序将会将一个用作示意的信息加密及储存于中央程序的另一预定的部份,以导致AS子程序不可运行,如果任何被测知的部份特性跟它先前加密及储存的对应部份是不同的话。The detected result and a state information indicating that the central program has been initialized will be stored in a predetermined part of the central program in the hard disk in the form of encrypted data by the AC subroutine. After that, each time when the central program is executed, it will first check the status information, and after judging that it has been initialized, it will perform a required job, as described in the aforementioned item 1, and in addition, It will also automatically cause the AC subroutine to be executed to perform a test, each time it will test at least some of the aforementioned computer hardware and software characteristics of the computer it is running on, and the AC subroutine will An indicative message is encrypted and stored in another predetermined part of the central program to render the AS subroutine inoperable if any detected part characteristic is different from its previously encrypted and stored counterpart .

此外,AC子程序亦会清除被加密的状态信息以使另一个初始化程序自动展开,当使用者导致中央程序被执行时,和这另一个初始化程序是需要得到中央计算机的另一个被加密命令来授权的。这被加密命令应可免费提供,或只收取一较该被保护软件价值为低的服务费。In addition, the AC subroutine will also clear the encrypted state information so that another initialization program is automatically launched when the user causes the central program to be executed, and this another initialization program needs to get another encrypted command from the central computer to authorized. The encrypted commands should be available free of charge, or only for a service fee that is less than the value of the protected software.

这可防止使用者当把户口结束后,蓄意地将中央程序安置入其它人的计算机内。This prevents the user from intentionally placing the central program on someone else's computer after closing the account.

还有,中央计算机提供的被加密命令可改为通过,例如,电话线路,给予使用者的,然后由使用者输入使用者计算机中。确实地说,当要求一被加密命令时,AC子程序会产生一随机数及将该随机数传达予使用者,他接着通过将随机数用电话按键输入并因而产生出电话双音信号,将随机数通过电话线路供给予中央计算机。当将随机数加密后,中央计算机会通过同一电话线路将结果经语音合成器传给使用者。Also, encrypted commands provided by the central computer may instead be given to the user via, for example, a telephone line, and then entered into the user's computer by the user. Specifically, when an encrypted command is requested, the AC subroutine generates a random number and communicates the random number to the user, who then sends the random number to the phone by entering the random number with the keys of the telephone and thus generating a telephone two-tone signal. The random numbers are supplied to the central computer over the telephone line. After the random number is encrypted, the central computer will pass the result to the user through the voice synthesizer through the same telephone line.

5)其它实施方案5) Other implementations

根据第二个实施方案,AS子程序从中央程序中抽出而变成一个独立程序,至于中央程序它则仅包含有AC子程序。AS子程序是被连系于EI子程序的,方法是通过限制AS子程序仅在EI子程序同时存在于同一部计算机时,方可运作。确实的说,当AS子程序在运行时,它能导致EI子程序被执行以产生一被加密的身份,以供其核实。EI子程序会知道这是AS子程序所要求的被加密的身份,而不是使用者所要求的被加密的身份以访问中央计算机,通过一如前述项目1b所述的输入参数方法。According to a second embodiment, the AS subroutine is extracted from the central program to become an independent program, which only contains the AC subroutine. The AS subroutine is linked to the EI subroutine by restricting the AS subroutine to run only when the EI subroutine exists simultaneously on the same computer. Indeed, when the AS subroutine is running, it can cause the EI subroutine to be executed to generate an encrypted identity for its verification. The EI subroutine will know that this is the encrypted identity required by the AS subroutine, not the encrypted identity requested by the user to access the central computer, through the input parameter method as described in item 1b above.

另外,EI子程序于送出被加密的身份予AS子程序前,可先查核其本身的数据完整性,实例如使用检验和方法(Checksum Method)。又或者,可由AS子程序执行这查核工作。如果查核的结果是EI子程序内有资料被更改,则在前者情况,AS子程序会被EI子程序导致无法操作,通过不送出被加密的身份予AS子程序,而至于后者,AS子程序会自己导致无法操作。In addition, before the EI subroutine sends the encrypted identity to the AS subroutine, it can first check its own data integrity, such as using a checksum method (Checksum Method). Alternatively, the checking work can be performed by the AS subroutine. If the result of the check is that data in the EI subroutine has been changed, then in the former case, the AS subroutine will be rendered inoperable by the EI subroutine, by not sending the encrypted identity to the AS subroutine, and as for the latter, the AS subroutine The program will render itself inoperable.

根据第三个实施方案,EI和AS子程序所个别地使用的加密算法A1和A2,用以分别产生一个被加密的身份给中央计算机和产生被加密的命令以授权软件产品的使用,为同一加密算法。因之,如果一个使用权拥有者将其AS子程序复制给其它人是等同于复制其EI子程序给其它人的。在这情况,将AS子程序稍作修改即可使其等同于EI子程序,而当中仅牵涉加入一接口程序以从中央计算机处接收随机数,及将随机数送给AS子程序,再从AS子程序接收加密的结果,然后将加密的结果送给中央计算机,而这些功能是常见于网络接口软件的。又或者,A1和A2加密算法可以是2个不同的加密算法,但代表着A1加密算法的信息被加入AS子程序内及可为使用者所利用,或当AS子程序被执行时,可被AS子程序使用以执行对应的加密功能而此功能为使用者可以使用的。According to a third embodiment, the encryption algorithms A1 and A2 used individually by the EI and AS subroutines to respectively generate an encrypted identity to the central computer and to generate encrypted commands to authorize the use of the software product are the same Encryption Algorithm. Therefore, if a use right holder copies its AS subroutine to others, it is equivalent to copying its EI subroutine to others. In this case, a slight modification of the AS subroutine can make it equivalent to the EI subroutine, and only involves adding an interface program to receive random numbers from the central computer, and send the random numbers to the AS subroutine, and then from the The AS subroutine receives the encrypted result, and then sends the encrypted result to the central computer, and these functions are common in network interface software. Alternatively, the A1 and A2 encryption algorithms can be two different encryption algorithms, but the information representing the A1 encryption algorithm is added into the AS subroutine and can be used by the user, or when the AS subroutine is executed, it can be used The AS subroutine is used to execute the corresponding encryption function and this function is available to the user.

再者,根据本发明的另一个实施方案,软件产品和AS子程序每个都被加入一个使用权拥有者身份,以便对盗版行为进行法律行动。还有,当AS子程序被执行时,会逐一接触每一软件产品以查核其内的使用权拥有者身份,方法是通过利用某一DOS服务调用程序(servicecall),将储存于其所运行中的计算机内的软件产品从硬磁盘中加载至随机存取存储器(RAM)。如有任何软件产品被发现有一个使用权拥有者的身份与AS子程序的不同,则AS子程序会禁止所有受其所控制的软件产品被使用于该计算机,包括它自己。这些使用权拥有者身份可储于软件产品的一个预定的储存单元内,和为防其被窜改,每一软件产品内加入一被加密的身份于另一储存单元内,而在不同的软件产品内的“另一储存单元”,其每个的位置都是不同的,以防止其被发现及被窜改。另外,每一软件产品当被执行时,都会自动查核该被加密的身份的被解密后的结果与该没有被加密的身份是否相符,若果不符,软件产品不会运作。该不被加密的和被加密的使用权拥有者身份是当中央计算机在要将软件产品送给使用者计算机时,被加入于软件产品内的。还有,为防止AS子程序误将一个储存于使用者计算机内的软件产品但不是中央计算机所供应的,为一个受其所控制的软件产品,中央计算机可进一步于每一软件产品内的第三个预定的储存单元内,加入信息以给AS子程序示意该软件产品为其所供应,和每一软件产品将不会运作,如果当其被执行时,发觉该信息被窜改的话。Furthermore, according to another embodiment of the present invention, each of the software product and the AS subroutine is added with an identity of the owner of the usage right, so as to carry out legal action against piracy. In addition, when the AS subroutine is executed, it will contact each software product one by one to check the identity of the owner of the right to use it. Software products in your computer are loaded from a hard disk into random access memory (RAM). If any software product is found to have a use right owner whose identity is different from that of the AS subroutine, the AS subroutine will prohibit all software products under its control from being used on the computer, including itself. These user rights owner identities can be stored in a predetermined storage unit of the software product, and in order to prevent it from being tampered with, an encrypted identity is added in each software product in another storage unit, and in different software products Each of the "another storage unit" in the storage unit is in a different location to prevent it from being discovered and tampered with. In addition, when each software product is executed, it will automatically check whether the decrypted result of the encrypted identity is consistent with the unencrypted identity. If not, the software product will not work. The unencrypted and encrypted user rights owner identities are added to the software product when the central computer sends the software product to the user computer. Also, in order to prevent the AS subroutine from mistaking a software product stored in the user's computer but not supplied by the central computer as a software product controlled by it, the central computer can further add In the three predetermined memory locations, information is added to the AS subroutine indicating that the software product is supplied for it, and each software product will not function if the information is found to be tampered with when it is executed.

应该注意的是,以上的实施方案只是通过举例的方式给出的,而对本领域的普通技术人员是显而易见的是,可以在不偏离本发明思想的同时作出各种各样的变化和修改。It should be noted that the above embodiments are given by way of example only, and it is obvious to those skilled in the art that various changes and modifications can be made without departing from the idea of the present invention.

Claims (12)

1.一种方法用于保护一种可被使用者复制的软件免被未经授权的复制及使用,包括以下步骤:1. A method for protecting a software that can be copied by a user from unauthorized copying and use, comprising the steps of: 判断一种身份软件存在于一种处理设备;Determining that an identity software exists in a processing device; 以所述的判断的肯定的结果作为一个先决条件以导致所述处理设备容许使用者可享用所述的要被保护的软件的使用权利;Taking an affirmative result of the judgment as a precondition to cause the processing device to allow the user to enjoy the right to use the software to be protected; 其中:in: 所述的身份软件被所述处理设备使用以产生一段信息,所述被产生的一段信息用于被一种电子交易设备核实,从而令拥有所述的要被保护的软件的使用权的使用者需要承担责任的电子交易操作能够进行;Said identity software is used by said processing device to generate a piece of information, said generated piece of information is used to be verified by an electronic transaction device, so that a user having the right to use said software to be protected Electronic trading operations that require liability can be carried out; 和所述的方法中没有导致一个所述的电子交易被完成。and said method does not result in one of said electronic transactions being completed. 2.如权利要求1中所述的一种方法用于保护一种可被使用者复制的软件免被未经授权的复制及使用,  其中进一步地包括以下步骤:2. A method as claimed in claim 1 is used to protect a software that can be copied by a user from being copied and used without authorization, further comprising the following steps: 核实所述的身份软件的身份;verify the identity of said identity software; 如果所述的核实的结果是肯定的,判断所述的身份软件为存在的,否则判断所述的身份软件为不存在的。If the verification result is affirmative, it is judged that the identity software exists; otherwise, it is judged that the identity software does not exist. 3.如权利要求1中所述的一种方法用于保护一种可被使用者复制的软件免被未经授权的复制及使用,其中所述的电子交易操作是有关于从所述的拥有使用权的使用者的户口支付款项的操作,以获取一种服务或商品。3. A method as claimed in claim 1 for protecting a user-reproducible software from unauthorized copying and use, wherein said electronic transaction operation is related to The operation of making a payment from the account of the user of the right of use in order to obtain a service or commodity. 4.一种方法用于保护一种可被使用者复制的软件免被未经授权的复制及使用,包括以下步骤:4. A method for protecting a software that can be copied by a user from unauthorized copying and use, comprising the steps of: 核实一种身份软件的身份,其储存于一种处理设备;Verifying the identity of an identity software stored in a processing device; 以所述的核实的肯定的结果作为一个先决条件以导致所述处理设备容许使用者可享用所述的要被保护的软件的使用权利;taking a positive result of said verification as a precondition to cause said processing device to allow a user to enjoy said right to use said software to be protected; 其中:in: 所述的身份软件被所述处理设备使用以产生一段信息,所述被产生的一段信息用于被一种电子交易设备核实,从而令拥有所述的要被保护的软件的使用权的使用者需要承担责任的电子交易操作能够进行;Said identity software is used by said processing device to generate a piece of information, said generated piece of information is used to be verified by an electronic transaction device, so that a user having the right to use said software to be protected Electronic trading operations that require liability can be carried out; 所述的方法中没有导致一个所述的电子交易被完成。Nothing in said method results in one of said electronic transactions being completed. 5.一种方法用于核实一种处理设备的使用者的身份,包括以下步骤:5. A method for verifying the identity of a user of a processing device comprising the steps of: 由所述一种处理设备从使用者取得第一段信息,以产生第二段信息,所述的第二段信息用以授权使用一个属于所述使用者的付款户口;obtaining a first piece of information from a user by said processing device to generate a second piece of information authorizing use of a payment account belonging to said user; 由一种电子交易设备基于所述的第二段信息,查证所述户口的有效性;verifying the validity of said account based on said second piece of information by an electronic transaction device; 所述一种处理设备以所述户口被查证为有效,以作为一个先决条件,以容许使用者使用最少一部份所述一种处理设备的功能;Said one processing device is verified as valid as a prerequisite for allowing the user to use at least a part of said one processing device's functions; 其中所述方法中所述的户口没有被支取任何费用及所述最少一部份功能跟所述户口的有效生不存在任何关系。Wherein the account mentioned in the method has not been withdrawn any fees and said at least a part of the functions have no relationship with the effective operation of said account. 6.一种方法用于保护一种可被使用者复制的软件免被未经授权的复制及使用,通过限制其由一位人仕使用,包括以下步骤:6. A method for protecting a user-reproducible software from unauthorized copying and use by restricting its use by a person, comprising the steps of: 一种处理设备向一种电子交易设备传送有关于所述人仕的一段信息;a processing device transmits a piece of information about said person to an electronic transaction device; 所述的一段信息用于被所述的电子交易设备查证所述的人仕拥有一个有效的付款户口及令至所述的电子交易设备容许所述的付款户口可被使用;The said piece of information is used by the said electronic transaction device to verify that said person has a valid payment account and to order said electronic transaction device to allow said payment account to be used; 所述的处理设备从所述的电子交易设备接收所述户口查证的结果;The processing device receives the account verification result from the electronic transaction device; 以所述查证的肯定结果,作为一个先决条件,以导致所述处理设备容许使用者可享用所述的要被保护的软件的使用权利;Taking an affirmative result of the verification as a precondition to cause the processing device to allow the user to enjoy the right to use the software to be protected; 其中所述方法中没有导致所述的户口有任何电子交易被完成。Wherein said method does not result in any electronic transaction being completed on said account. 7.一种方法用于保护软件免被未经授权的使用,通过限制其由一位人仕使用,包括一个子方法,所述的子方法包括以下步骤:7. A method for protecting software from unauthorized use by restricting its use by a person, comprising a sub-method comprising the steps of: (甲)一种处理设备,在此称为第一处理设备向一种电子交易设备传送有关于所述人仕的一段信息;(a) a processing device, referred to herein as a first processing device, transmits a piece of information about said person to an electronic transaction device; 所述的一段信息用于被所述的电子交易设备查证所述的人仕拥有一个有效的户口及令至所述的电子交易设备容许所述的付款户口可被使用;Said piece of information is used by said electronic transaction device to verify that said person has a valid account and to order said electronic transaction device to allow said payment account to be used; (乙)所述的第一处理设备从所述的电子交易设备接收所述户口查证的结果;(b) said first processing device receives said account verification result from said electronic transaction device; (丙)以所述查证的肯定结果,作为一个先决条件,以从所述处理设备中判辨出有关于其硬件和/或软件的一段信息,为于将来在以下(丁)步骤作参考之用;其后(c) With the affirmative result of the verification as a prerequisite, to identify a piece of information about its hardware and/or software from the processing device for future reference in the following step (d) use; later (丁)查核一种处理设备的身份,以证明其为所述第一处理设备,基于至少部份的所述硬件和/或软件的所述一段信息;(d) checking the identity of a processing device to prove that it is said first processing device, based at least in part on said piece of information of said hardware and/or software; (戊)以所述查核的肯定结果,作为一个先决条件,以导致所述第一处理设备容许使用者可享用所述的要被保护的软件的使用权利;(e) using the affirmative result of the check as a precondition to cause the first processing device to allow the user to enjoy the right to use the software to be protected; 其中所述的户口被收取一个费用;其后The account described therein is charged a fee; thereafter 所述的子方法能被使用于一种处理设备,在此称为第二处理设备,免费地或从所述的户口收取一个比较所述费用低的费用。Said sub-method can be used at a processing facility, here referred to as a second processing facility, free of charge or charged to said account for a fee which is lower than said fee. 8.一种方法用于保护软件免被未经授权的使用,通过限制其由一位人仕使用,在所述的方法中一种保护性软件被使用,和所述保护性软件的运作上的要求是以“一种身份软件/系统存在于一种处理设备”作为一个先决条件以在所述的处理设备内执行以下的步骤(甲),和所述的身份软件/系统被所述处理设备使用以产生第一段信息,所述被产生的第一段信息用于被一种电子交易设备核实,从而使所述的人仕需要承担责任的电子交易操作能够进行;8. A method for protecting software from unauthorized use by restricting its use by a person, in which method a protective software is used, and in operation of said protective software The requirement is that "an identity software/system exists in a processing device" as a prerequisite to perform the following step (A) in said processing device, and said identity software/system is said processing equipment used to generate a first piece of information for verification by an electronic transaction device to enable electronic transaction operations for which said person is liable; 所述的方法包括以下步骤:Described method comprises the following steps: (甲)由运行于合符所述先决条件的一种处理设备,在此称为第一处理设备的所述保护性软件从所述第一处理设备判辨出关于其硬件和/或软件的第二段信息,为于将来在以下(乙)步骤作参考之用;其后(a) by said protective software running on a processing device that meets said prerequisites, referred to herein as a first processing device, distinguishes from said first processing device about its hardware and/or software The second piece of information is for future reference in the following (B) steps; thereafter (乙)查核一种处理设备的身份,以证明其为所述第一处理设备,基于至少部份的所述硬件和/或软件的所述第二段信息:(b) checking the identity of a processing device to prove that it is said first processing device, based at least in part on said second piece of information of said hardware and/or software: (丙)以所述查核的肯定结果,作为一个先决条件,以导致所述第一处理设备容许使用者可享用所述的要被保护的软件的使用权利;(c) using the affirmative result of the check as a precondition to cause the first processing device to allow the user to enjoy the right to use the software to be protected; 其中所述方法中没有任何步骤是有关于使用者因使用所述的要被保护的软件而要付款的或导致一个所述的电子交易被完成。None of the steps in the method relate to payment by the user for use of the protected software or cause an electronic transaction to be completed. 9.一种方法用于保护一种可被使用者复制的软件免被未经授权的复制及使用,包括以下步骤:9. A method for protecting a software that can be copied by a user from unauthorized copying and use, comprising the steps of: 从一种处理设备的使用者获取第一段信息,所述处理设备储存着一种身份软件;obtaining a first piece of information from a user of a processing device storing an identity software; 以所述获取的第一段信息是正确的和所述一种身份软件存在于所述处理设备,作为先决条件,以导致所述的处理设备容许使用者可享用所述的要被保护的软件的使用权利;The first piece of information obtained is correct and the identity software exists in the processing device as a prerequisite, so that the processing device allows the user to enjoy the software to be protected the right to use; 其中如果所述身份软件能从其使用者获取所述的正确第一段信息,所述身份软件便可以被激活,而令至其可以被所述处理设备使用以产生一段信息,所述被产生的一段信息用于被一种电子交易设备核实,从而让拥有所述的要被保护的软件的使用权的使用者需要承担责任的电子交易操作能够进行;Wherein if the identity software can obtain the correct first piece of information from its user, the identity software can be activated so that it can be used by the processing device to generate a piece of information, the generated A piece of information is used to be verified by an electronic transaction device, thereby enabling electronic transaction operations for which the user who has the right to use the software to be protected is responsible; 和在所述方法中没有导致一个所述的电子交易被完成。and in said method does not result in a said electronic transaction being completed. 10.如权利要求9中所述的一种用于保护一种可被使用者复制的软件免被未经授权的复制及使用的方法,其中所述的要被保护软件为一种软件,在此称为第一软件,用于所述的处理设备以判辨出关于所述的处理设备的硬件和/或软件的一段信息,在此称为第二段信息;10. A method for protecting a software that can be copied by a user from being copied and used without authorization as claimed in claim 9, wherein said software to be protected is a software, in This is referred to as the first piece of software for the processing device to identify a piece of information about the hardware and/or software of the processing device, referred to herein as the second piece of information; 其中进一步地包括一种软件,在此称为第二软件,当被执行时,用于查核其所运行于的计算机为所述的处理设备,基于至少部份的所述第二段信息;It further includes software, referred to herein as second software, which, when executed, is used to check that the computer it is running on is said processing device, based on at least part of said second piece of information; 和如果所述查核结果为肯定的,所述第二软件便可用于容许使用者可享用一种软件,在此称为第三软件的使用权利。And if the checking result is affirmative, the second software can be used to allow the user to enjoy a kind of software, which is referred to as the right to use the third software. 11.如权利要求9中所述的一种用于保护一种可被使用者复制的软件免被未经授权的复制及使用的方法,其中所述的电子交易操作是有关于从所述的拥有使用权的使用者的户口支付款项的操作,以获取一种服务或商品,和所述第一段信息是一个密码。11. A method for protecting a user-reproducible software from unauthorized copying and use as recited in claim 9, wherein said electronic transaction operation is related to The operation of making payment to the account of the user who has the right to use to obtain a service or commodity, and the first piece of information is a password. 12.如权利要求9中所述的一种用于保护一种可被使用者复制的软件免被未经授权的复制及使用的方法,其中所述的要被保护软件是被购买了的软件商品。12. A method for protecting a software that can be copied by a user from unauthorized copying and use as claimed in claim 9, wherein said software to be protected is purchased software commodity.
CNB998170550A 1999-12-20 1999-12-20 Method for limiting software to be used only by owner of right of use Ceased CN100392624C (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IB1999/002026 WO2001046811A1 (en) 1995-12-01 1999-12-20 Software for restricting other software to be used by the rightful user only and method therefor

Publications (2)

Publication Number Publication Date
CN1406353A CN1406353A (en) 2003-03-26
CN100392624C true CN100392624C (en) 2008-06-04

Family

ID=11004946

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB998170550A Ceased CN100392624C (en) 1999-12-20 1999-12-20 Method for limiting software to be used only by owner of right of use

Country Status (4)

Country Link
JP (1) JP2003523003A (en)
CN (1) CN100392624C (en)
AU (1) AU765841B2 (en)
CA (1) CA2389526A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4497450B2 (en) * 2003-12-10 2010-07-07 独立行政法人科学技術振興機構 Program authentication system
JP2011044155A (en) * 2010-09-16 2011-03-03 Keung Tse Ho Software for regulating use of other software only to valid user and method for the same
CN104580316B (en) * 2013-10-24 2019-03-22 深圳市国信互联科技有限公司 Soft ware authorization management method and system
US9276943B2 (en) * 2013-10-25 2016-03-01 International Business Machines Corporation Authorizing a change within a computer system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4757534A (en) * 1984-12-18 1988-07-12 International Business Machines Corporation Code protection using cryptography
US5889863A (en) * 1996-06-17 1999-03-30 Verifone, Inc. System, method and article of manufacture for remote virtual point of sale processing utilizing a multichannel, extensible, flexible architecture
US5889860A (en) * 1996-11-08 1999-03-30 Sunhawk Corporation, Inc. Encryption system with transaction coded decryption key

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5719938A (en) * 1994-08-01 1998-02-17 Lucent Technologies Inc. Methods for providing secure access to shared information
JP3630451B2 (en) * 1994-09-20 2005-03-16 富士通株式会社 Software usage control device
JPH11194937A (en) * 1997-12-26 1999-07-21 Orix Rentec Kk Rent control system for electronic computer program

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4757534A (en) * 1984-12-18 1988-07-12 International Business Machines Corporation Code protection using cryptography
US5889863A (en) * 1996-06-17 1999-03-30 Verifone, Inc. System, method and article of manufacture for remote virtual point of sale processing utilizing a multichannel, extensible, flexible architecture
US5889860A (en) * 1996-11-08 1999-03-30 Sunhawk Corporation, Inc. Encryption system with transaction coded decryption key

Also Published As

Publication number Publication date
CN1406353A (en) 2003-03-26
AU1790800A (en) 2001-07-03
JP2003523003A (en) 2003-07-29
AU765841B2 (en) 2003-10-02
CA2389526A1 (en) 2001-06-28

Similar Documents

Publication Publication Date Title
US7680743B2 (en) Software application protection by way of a digital rights management (DRM) system
US8065521B2 (en) Secure processor architecture for use with a digital rights management (DRM) system on a computing device
US7051005B1 (en) Method for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system
US7103574B1 (en) Enforcement architecture and method for digital rights management
US7624451B2 (en) Binding a digital license to a portable or the like in a digital rights management (DMR) system and checking out/checking in the digital license to/from the portable device or the like
US6772340B1 (en) Digital rights management system operating on computing device and having black box tied to computing device
US7383205B1 (en) Structure of a digital content package
US6665797B1 (en) Protection of software again against unauthorized use
US20020012432A1 (en) Secure video card in computing device having digital rights management (DRM) system
WO2000058859A2 (en) Digital license and method for obtaining/providing a digital license
GB2404536A (en) Protection of data using software wrappers
WO2000059152A2 (en) Method for interdependently validating a digital content package and a corresponding digital license
WO2001052018A1 (en) Specifying security for an element by assigning a scaled value representative of the relative security thereof
WO2001052020A1 (en) Releasing decrypted digital content to an authenticated path
WO2000059151A2 (en) Rendering digital content in an encrypted rights-protected form
CN100392624C (en) Method for limiting software to be used only by owner of right of use
JP2000207197A (en) System and method for protecting computer software
JPH10187433A (en) Electronic devices and storage media
JP2011044155A (en) Software for regulating use of other software only to valid user and method for the same
KR20030015192A (en) Software for Restricting Other Software to be used by the Rightful User Only and Method therefor
HK1051918A (en) Secure video card in computing device having digital rights management (drm) system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: XIE HAOQIANG

Free format text: FORMER OWNER: BAIWEI CO., LTD.

Effective date: 20050114

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20050114

Address after: Box 70492, Kowloon Central Post Office, Hongkong, China

Applicant after: Xie Haoqiang

Address before: Kowloon, Hongkong, China

Applicant before: Baiwei Co., Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
C35 Partial or whole invalidation of patent or utility model
IW01 Full invalidation of patent right

Decision date of declaring invalidation: 20130410

Decision number of declaring invalidation: 20428

Granted publication date: 20080604