Software protection system using a single-key cryptosystem, a ha

Cryptography – Cryptanalysis

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 25, H04L 900

Patent

active

048171409

ABSTRACT:
The invention provides a software asset protection mechanism which is based on the separation of the software to be protected from the right to execute that software. Protected software can only be executed on composite computing systems in which a physically and logically secure coprocessor is associated with a host computer. The software to be protected is broken down into a protected (encrypted) portion and an (optional) unprotected or plain text portion. The software is distributed by any conventional software distribution mechanism (for example a floppy disk) including the files already identified along with an encrypted software decryption key. The coprocessor is capable of decrypting the software decryption key so it can thereafter decrypt the software, for execution purposes. However, the coprocessor will not perform these functions unless and until the user's right to execute is evidenced by presentation of a physically secure token. The physically secure token provides to the coprocessor token data in plain text form (the physical security of the plain text token data is provided by the cartridge within which token data is stored). The physical properties of that cartridge taken together with the correspondence between the token data provided by the cartridge and the encrypted token data evidence the user's right to execute. While the coprocessor can, thereafter, decrypt and execute the protected portion of the software, access to that software is denied the user by the physical and logical features of the coprocessor. Other properties of the cartridge (specifically a destructive read property) ensure that the act of transferring token data to the coprocessor obliterates that data from the cartridge so it cannot be revised. Further, the protocol for the coprocessor/cartridge exchange is arranged so that observation of even the entire exchange provides inadequate information with which to simulate or spoof the effect of an authentic, unused cartridge.

REFERENCES:
patent: 3996449 (1976-12-01), Attanasio
patent: 4104721 (1978-08-01), Markstein
patent: 4120030 (1978-10-01), Johnstone
patent: 4168396 (1979-09-01), Best
patent: 4183085 (1980-01-01), Roberts
patent: 4246638 (1981-01-01), Thomas
patent: 4278837 (1981-07-01), Best
patent: 4433207 (1984-02-01), Best
patent: 4442484 (1984-04-01), Childs, Jr.
patent: 4446519 (1984-05-01), Thomas
patent: 4458315 (1984-07-01), Uchenick
patent: 4462078 (1984-07-01), Ross
patent: 4465901 (1984-08-01), Best
patent: 4471163 (1984-09-01), Donald et al.
patent: 4471216 (1984-09-01), Herve
patent: 4513174 (1985-04-01), Herman
patent: 4523271 (1985-06-01), Levien
patent: 4525599 (1985-06-01), Curran et al.
patent: 4558176 (1985-12-01), Arnold et al.
patent: 4562305 (1985-12-01), Gaffney, Jr.
patent: 4562306 (1985-12-01), Chou
patent: 4577289 (1986-03-01), Comerford
patent: 4598288 (1986-07-01), Yarbrough
patent: 4599489 (1986-07-01), Cargile
patent: 4609777 (1986-09-01), Cargile
patent: 4609985 (1986-09-01), Dozier
patent: 4621321 (1986-11-01), Boebert et al.
patent: 4621334 (1986-11-01), Garcia
patent: 4633388 (1986-12-01), Chiu
patent: 4644493 (1987-02-01), Chandra et al.
patent: 4652990 (1987-03-01), Pailen et al.
Best, Preventing Software Piracy with Crypto-Microprocessors, IEEE, 1980.
Everett, "Padlock", Computer Bulletin, Mar. 1985, pp. 16-17 + Padlock Public Key Software Protection System.
Goldschmitt, "Thou Shall Not Dupe", Computerworld, Jan. 28, 1985.
Herzberg, "Public Protection of Software", Lecture Notes in Computer Science, vol. 218, 1986 (Proc. Crypto 85), pp. 158-178.
Kent, Protecting Externally Supplied Software in Small Computers, Phd. thesis, M.I.T., Sep. 1980.
Lipson, "Little Black Box `Blocks` Illicit Software Copying", Stamford Advocate, Sep. 14, 1986, pp. E1-E2.
Maude, "Hardware Protection Against Software Piracy", Communications of the ACM, vol. 27, No. 9, Sep. 1984, pp. 950-959.
Purdy, "A Software Protection Scheme", IEEE, 1982.
Simmons, "How to (Selectively) Broadcast a Secret", IEEE, 1985.
Winslow, "For Software Firms, Questions is How to Cope with Piracy", Wall Street Journal, Apr. 12, 1985.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Software protection system using a single-key cryptosystem, a ha does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Software protection system using a single-key cryptosystem, a ha, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Software protection system using a single-key cryptosystem, a ha will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1666030

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.