Cryptography – Cryptanalysis
Patent
1986-11-05
1989-03-28
Shaw, Gareth D.
Cryptography
Cryptanalysis
380 25, H04L 900
Patent
active
048171409
ABSTRACT:
The invention provides a software asset protection mechanism which is based on the separation of the software to be protected from the right to execute that software. Protected software can only be executed on composite computing systems in which a physically and logically secure coprocessor is associated with a host computer. The software to be protected is broken down into a protected (encrypted) portion and an (optional) unprotected or plain text portion. The software is distributed by any conventional software distribution mechanism (for example a floppy disk) including the files already identified along with an encrypted software decryption key. The coprocessor is capable of decrypting the software decryption key so it can thereafter decrypt the software, for execution purposes. However, the coprocessor will not perform these functions unless and until the user's right to execute is evidenced by presentation of a physically secure token. The physically secure token provides to the coprocessor token data in plain text form (the physical security of the plain text token data is provided by the cartridge within which token data is stored). The physical properties of that cartridge taken together with the correspondence between the token data provided by the cartridge and the encrypted token data evidence the user's right to execute. While the coprocessor can, thereafter, decrypt and execute the protected portion of the software, access to that software is denied the user by the physical and logical features of the coprocessor. Other properties of the cartridge (specifically a destructive read property) ensure that the act of transferring token data to the coprocessor obliterates that data from the cartridge so it cannot be revised. Further, the protocol for the coprocessor/cartridge exchange is arranged so that observation of even the entire exchange provides inadequate information with which to simulate or spoof the effect of an authentic, unused cartridge.
REFERENCES:
patent: 3996449 (1976-12-01), Attanasio
patent: 4104721 (1978-08-01), Markstein
patent: 4120030 (1978-10-01), Johnstone
patent: 4168396 (1979-09-01), Best
patent: 4183085 (1980-01-01), Roberts
patent: 4246638 (1981-01-01), Thomas
patent: 4278837 (1981-07-01), Best
patent: 4433207 (1984-02-01), Best
patent: 4442484 (1984-04-01), Childs, Jr.
patent: 4446519 (1984-05-01), Thomas
patent: 4458315 (1984-07-01), Uchenick
patent: 4462078 (1984-07-01), Ross
patent: 4465901 (1984-08-01), Best
patent: 4471163 (1984-09-01), Donald et al.
patent: 4471216 (1984-09-01), Herve
patent: 4513174 (1985-04-01), Herman
patent: 4523271 (1985-06-01), Levien
patent: 4525599 (1985-06-01), Curran et al.
patent: 4558176 (1985-12-01), Arnold et al.
patent: 4562305 (1985-12-01), Gaffney, Jr.
patent: 4562306 (1985-12-01), Chou
patent: 4577289 (1986-03-01), Comerford
patent: 4598288 (1986-07-01), Yarbrough
patent: 4599489 (1986-07-01), Cargile
patent: 4609777 (1986-09-01), Cargile
patent: 4609985 (1986-09-01), Dozier
patent: 4621321 (1986-11-01), Boebert et al.
patent: 4621334 (1986-11-01), Garcia
patent: 4633388 (1986-12-01), Chiu
patent: 4644493 (1987-02-01), Chandra et al.
patent: 4652990 (1987-03-01), Pailen et al.
Best, Preventing Software Piracy with Crypto-Microprocessors, IEEE, 1980.
Everett, "Padlock", Computer Bulletin, Mar. 1985, pp. 16-17 + Padlock Public Key Software Protection System.
Goldschmitt, "Thou Shall Not Dupe", Computerworld, Jan. 28, 1985.
Herzberg, "Public Protection of Software", Lecture Notes in Computer Science, vol. 218, 1986 (Proc. Crypto 85), pp. 158-178.
Kent, Protecting Externally Supplied Software in Small Computers, Phd. thesis, M.I.T., Sep. 1980.
Lipson, "Little Black Box `Blocks` Illicit Software Copying", Stamford Advocate, Sep. 14, 1986, pp. E1-E2.
Maude, "Hardware Protection Against Software Piracy", Communications of the ACM, vol. 27, No. 9, Sep. 1984, pp. 950-959.
Purdy, "A Software Protection Scheme", IEEE, 1982.
Simmons, "How to (Selectively) Broadcast a Secret", IEEE, 1985.
Winslow, "For Software Firms, Questions is How to Cope with Piracy", Wall Street Journal, Apr. 12, 1985.
Chandra Ashileshwari N.
Comerford Liam D.
White Steve R.
International Business Machines Corp.
Mills John G.
Shaw Gareth D.
LandOfFree
Software protection system using a single-key cryptosystem, a ha does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Software protection system using a single-key cryptosystem, a ha, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Software protection system using a single-key cryptosystem, a ha will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1666030