CN100392624C - Software for limiting other software to be only used by its owner and method thereof - Google Patents

Software for limiting other software to be only used by its owner and method thereof Download PDF

Info

Publication number
CN100392624C
CN100392624C CNB998170550A CN99817055A CN100392624C CN 100392624 C CN100392624 C CN 100392624C CN B998170550 A CNB998170550 A CN B998170550A CN 99817055 A CN99817055 A CN 99817055A CN 100392624 C CN100392624 C CN 100392624C
Authority
CN
China
Prior art keywords
software
treatment facility
user
segment information
electronic transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
CNB998170550A
Other languages
Chinese (zh)
Other versions
CN1406353A (en
Inventor
谢浩强
Original Assignee
BAIWEI CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=11004946&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CN100392624(C) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by BAIWEI CO Ltd filed Critical BAIWEI CO Ltd
Priority claimed from PCT/IB1999/002026 external-priority patent/WO2001046811A1/en
Publication of CN1406353A publication Critical patent/CN1406353A/en
Application granted granted Critical
Publication of CN100392624C publication Critical patent/CN100392624C/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Abstract

The present invention relates to software for limiting other kinds of software to be only used by the owners of the use rights of the software and a method thereof, and a central program comprises an EI sub-program for providing the identity of the owner of the use right of the software for switching on a network central computer so as to obtain services or software products or similar products. In the obtaining process of the services or the software products or the similar products, safe operation is carried out on the household of the owner of the use right so as to pay for the needed sum of money, and an AS sub-program authorizes the obtained software products to be used for the computer by the precondition of the EI sub-program existing in one computer. The central program is used for managing the use of individual sub-programs hidden in the central program, and therefore, the separate copy of the AS sub-program can be avoided.

Description

Be used for the method that restricted software is used by its right to use owner only
Technical field
The present invention relates to the protection of business software, particularly about protecting these business softwares to exempt from unwarranted use or duplicating.
Background technology
Past; method for protecting software is used to protect the commercial software product such as the program of being distributed by a communication network such as telephone system; multimedia software; can a hardware need be included separate secret key and the deciphering system is installed in a user's the computing machine, in order to be examined identity by a software program that on this computing machine, moves.In the middle of what be used is hardware, rather than software is because the software reproduction facilities is present in the personal computer at large.Yet this method is the trouble of the utmost point, and all is a kind of burden for user and software vendor.
Thus, an object of the present invention is to provide a software to replace above-mentioned hardware and, to make the right to use owner of this part software this part software dare to not duplicated to other people by a kind of mental handicape.
Another object of the present invention provides a method makes a right to use owner his software dare to not duplicated to other people.
The invention summary
According to the first embodiment of the present invention, it provides a centre routine to include 1) subroutine be used to provide an encrypted identity (hereinafter referred to as the EI subroutine), 2) subroutine is used to authorize the use (hereinafter referred to as the AS subroutine) of a software product, 3) subroutine be used to examine the identity (hereinafter referred to as the AC subroutine) of user's computing machine.
Centre routine is used to manage the use that is hidden in the indivedual subroutines in it, makes the AS subroutine exempt from directly to be contacted by the external world, thereby makes it exempt to be duplicated individually.The EI subroutine is used to provide its right to use owner's identity information (an encrypted identity), be used to visit a network central computer with service of obtaining or software product or similar, in the middle of be involved on this right to use owner's the registered permanent residence and carry out a safe operation to pay required fund.It is a certain predetermined computation machine that the AC subroutine is used to examine its computing machine that runs on, by predict the hardware and the software feature of this computing machine with software mode, then with desired comparison.The AS subroutine is used to utilize the verification result of AC subroutine and can be used for this computing machine as condition precedent to authorize the software product that is obtained from aforesaid mode with " existence of EI subroutine ", and the user yes need not to pay the bill again for the software product of before having bought again.And this EI subroutine is without the protection that prevents to use without permission and can be used for a computing machine by any user.
It should be noted that within centre routine, all relevant those software products of protection exempt to be duplicated wrongly on the problem to other people by its right to use owner, have only the AS subroutine to be protected.And according to the present invention, the AS subroutine can be protected, exempt from by its right to use owner not duplicate under the authorization conditions and give other people, be based on a fact, a right to use owner can not duplicate a software exactly, promptly central software is given other people's.Because exist the EI subroutine in it, its can by one without permission user utilization with the information of identity that this right to use owner is provided, with the registered permanent residence that uses this right to use owner to obtain, such as network service or software product.Can see from the use of ATM (automatic teller machine) tape lament,, fact proved as safe as a house though it is easy to be replicated.
Second embodiment according to the present invention, centre routine only comprises the EI subroutine, and the AS subroutine becomes a stand-alone program, being used for the licensed software product is used, but Solely is when EI subroutine when being present in same the computing machine that it moved, and this point receives an encrypted identity and judges from the EI subroutine.
According to the 3rd embodiment, EI and AS subroutine equate basically, thereby right to use owner duplicates the AS subroutine to be equal to other people and duplicate the EI subroutine and give other people, thereby prevent that the AS subroutine is replicated without permission or uses.
The accompanying drawing summary
Fig. 1 is the block scheme of centre routine.
Fig. 2 is the encrypted synoptic diagram that is stored in the random-access memory (ram) of a part " B " of a program.
DESCRIPTION OF THE PREFERRED
The present invention is to protect software product, is sold by a communication network, exempt to be duplicated without permission or use, and for asking simple, the following description is the protection at these software products of the IBM personal computer that is stored in a user.Also have, the present invention will illustrate one by one according to following title:
1) centre routine
2) subroutine is used to provide an encrypted identity (EI subroutine)
3) subroutine is used to authorize the use (AS subroutine) of a software product
4) subroutine is used to examine the identity (AC subroutine) of user's computing machine
5) other embodiment
1) centre routine
According to first embodiment, it comprises a centre routine, and it is an executable program and can be caused being performed by following mode, a) imports its file name at the DOS environment as the user, b) is caused by a program in service.Fig. 1 is the block scheme of centre routine, and details are as follows for it:
A) visit a network central computer when the user wants to communicate to connect by one, he need cause centre routine to be performed earlier.Centre routine can ask the user to input a password, so that if it can operate and password and desired coincide, it will respond user's order and send one and belong to its right to use owner, it also should be exactly this user, encrypted identity give central computer.
This user inputs the requirement of password, and being has to visit central computer and to use its right to use owner's the registered permanent residence to prevent other people, is not obtaining under the situation of agreement.
Centre routine will cause the EI subroutine to be performed with the encrypted identity that a user is provided giving central computer, and details are held the back explanation.And if encrypted identity is correct, the visiting demand that central computer will the permitted user, details will be in following project 2 explanations.
B) program in a running wants to cause the AS subroutine to be performed, to authorize it can continue operation, it can prepare an input parameter earlier, and this requires and stores this input parameter in one of random-access memory (ram) predetermined storage element in order to the signal centre routine, PC DOS service call program (service call) by using one to be used for described purposes causes centre routine to be performed then.If centre routine is activated by previous described password, it will take out this input parameter in predetermined storage element, thereby can knowing, centre routine have a program of moving just requiring to obtain an authorization command and will cause the AS subroutine to be performed from the AS subroutine.Otherwise centre routine can not cause this program of moving of AS subroutine mandate to go to continue operation.Because password is to be used to activate the AS subroutine, also be used to activate the EI subroutine simultaneously, its right to use owner's meeting thereby dare to not provide other people with password is so that other people can be with his AS subroutine.
Caused the sort of situation carried out as for centre routine by the user, then this will not have an effective input parameter or not have input parameter and therefore centre routine just can be known.
2) subroutine is used to provide an encrypted identity (EI subroutine)
This subroutine uses one to be used for the IC credit card making the method for identity verification, and wherein, an encrypted identity can be produced.
When coming into operation, the EI subroutine sends a visiting demand toward central computer, and as a response, central computer can be sent a random number back to.The EI subroutine will send to central computer with a predetermined algorithm A1 encrypted random number with the result, and it will allow visit, if this result is identical by carrying out same cryptographic algorithm in this random number gained with it.It should be noted, for each user, it has other cryptographic algorithm A1 of a correspondence to be used for its identity verification, in addition, central computer can utilize the encrypted result that gets from the EI subroutine, is correct as it, as user's mandate, in order to registered permanent residence payment, to obtain network service or software product or similar purposes from a user.
3) subroutine is used to authorize the use (AS subroutine) of a software product
According to the present invention, have 2 approach to be used to authorize the use of a software product:
I) by sending encrypted order, continue to run on the computing machine, use as the aforementioned project 2 described modes that are used for identity verification to authorize it to the software program that is moving.Say that positively this software program that is moving adds its random number that is produced in the described input parameter of aforementioned project 1b, causes centre routine to be performed then.And the AS subroutine, project 1b is described as described above, when being caused carrying out by centre routine, a predetermined cryptographic algorithm A2 can be operated on this random number and its gained result is sent to the software program that this is moving.And the software program that this is moving will be accepted this encrypted order and continue operation, if this result is identical with it with the result that identical cryptographic algorithm A2 operates on this random number.
It should be noted, use this software program need allow it receive encrypted order constantly constantly.
It should be noted again, for each user, each is used for software product on its computing machine, and all to use an identical cryptographic algorithm A2 who individually belongs to this user and cryptographic algorithm A2 be when central computer will be supplied to user's computing machine with each these software product, is added in each these software product.
Ii) pass through the encrypted part or a complete encrypted software product of a software product of deciphering.
It should be noted,, then only it is partly encrypted and enough prevent unwarranted use or duplicate if this software product is a program.Yet,, encrypt its whole software product even more ideal if this software product is an audiovisual multimedia data file.
The decrypting process of part or whole software product carries out at its an interim copy that is stored on the random-access memory (ram), and this interim copy just should not exist, to prevent illegal duplicating after the user finishes the use software product.An example below is provided, and Fig. 2 is the encrypted synoptic diagram that is stored in the random-access memory (ram) of a part " B " of a program.Seen in the figure, the AS subroutine will " B partly " deciphering after, its gained result's volume will should be different with encrypted version, is stored in " decrypted B is partly ".
The AS subroutine then will " encrypted B partly " first storage element, write that new instruction " skips to decrypted B partly " and the afterbody in " decrypted B is partly " adds that instruction " skips to the C part ".Like this, the encrypted part of this software will can not be performed and decrypted part just can be performed.
As for audiovisual multi-medium data software, it will be divided into a plurality of little parts is deciphered then one by one, and each sub-fraction is shortly will just can be decrypted when producing audio visual effect by a viewing program.That is to say that this viewing program will cause the AS subroutine to be performed in the described mode of aforementioned project 1b, when it needs a little part decrypted at every turn.Best is, a just decrypted little part can be write in a previous decrypted part, and so complete decrypted software just can not be present in the random-access memory (ram).
4) subroutine is used to examine the identity (AC subroutine) of user's computing machine
If it is a certain predetermined computing machine and this computing machine no words that the AC subroutine is used to examine its computing machine that runs on, just prevent that protected software is used and the operation of AC subroutine is controlled by centre routine.
Careful says, after central program is installed in the hard disc of user's computing machine and when being performed, it can be looked into and examine an encrypted status information that stores in it, thereby it knows that this is that it is performed first and will causes an initialize routine to be launched.In initialize routine, centre routine can one project 2 is described as described above, its right to use owner's encrypted identity is sent to central computer, the AC subroutine requires an encrypted order to central computer then.Central computer can provide encrypted order, and a described mode of project 3i as described above is if this right to use owner has an effective registered permanent residence and is not to be moved to end.
After examining order, the AC subroutine can predict the hardware and software characteristic of user's computing machine, for example comprise, the identity of peripherals is such as mouse, printer, joystick, hard disc and floppy disk etc., predicting of travelling speed and for example, it is the central processing unit frequency, the function of the storage capacity of cache memory etc.; The magnetic head of hard disc (head) and for example, magnetic track (cylinder), the position of sector (sector) number and bad sector; And for example the version of operating system software and a certain software product comprise the physical location of centre routine in hard disc; The hardware identity sign indicating number of computing machine or similarly and for example; By using the generally familiar technology of those skilled in the art institute.Example has, and carries out a test procedure and activates a hardware counter and finish the required time of executive routine with the measure calculation machine by causing computing machine, can predict its travelling speed.Another example, the version of operating system can be by using a specific DOS service call program (service call) to predict.
The status information that a result who predicts and a signal centre routine have been initialised will be stored in a predetermined part of the centre routine in the hard disc by the AC subroutine with encrypted data form.After this, it is each when central program is performed, it will check this status information earlier, after it has been initialised in judgement, it can carry out a job that is required, project 1 is described as described above, in addition, it also can automatically cause the AC subroutine to be performed once to predict, each it can predict its hardware and software characteristic of the aforesaid computing machine of at least one part of operating computing machine, with the AC subroutine will be with one as the information encryption of signal and be stored in another predetermined part of centre routine, to cause the AS subroutine to move, if any part characteristic that is predicted partly is different with its previous correspondence of encrypting and storing.
In addition, the AC subroutine also can be removed encrypted status information so that another initialize routine is launched automatically, when the user causes centre routine to be performed and this another initialize routine be that another encrypted order that need obtain central computer is authorized.This encrypted order should provide free, or only collecting one, should protected software to be worth be low service fee.
This can prevent that the user after the registered permanent residence is finished, is disposed into centre routine in other people's the computing machine in cold blood.
Also have, the encrypted order that central computer provides can change into by, for example, telephone line gives the user, is imported in user's computing machine by the user then.Positively say, when requiring an encrypted order, the AC subroutine can produce a random number and the user is given in this random number reception and registration, and he then by the phone two-tone signal is imported also thereby produced to random number with telephone key-press, gives central computer with random number by the telephone line supply.After with random number encryption, central computer can be passed to the user with the result through voice operation demonstrator by same telephone line.
5) other embodiment
According to second embodiment, the AS subroutine is extracted out from centre routine and is become a stand-alone program, and it then only includes the AC subroutine as for centre routine.The AS subroutine is linked the subroutine in EI, method be by restriction AS subroutine only when the EI subroutine is present in same computing machine simultaneously, can operate.Certain says, when the AS subroutine in when operation, it can cause the EI subroutine to be performed to produce an encrypted identity, examines for it.The EI subroutine can know that this is the desired encrypted identity of AS subroutine, rather than the desired encrypted identity of user is with the visit central computer, by a described input parameter method of project 1b as described above.
In addition, the EI subroutine can be checked the data integrity of itself earlier, example such as service test and method (Checksum Method) before sending encrypted identity and giving the AS subroutine.Or, can carry out this by the AS subroutine and check work.If the result who checks has data to be modified in the EI subroutine, then in former instance, the AS subroutine can be caused and can't operate by the EI subroutine, gives the AS subroutine by not sending encrypted identity, and as for the latter, and the AS subroutine is understood and oneself caused and can't operate.
According to the 3rd embodiment, EI and AS subroutine the cryptographic algorithm A1 and the A2 that individually use, give central computer and produce the use of encrypted order in order to produce an encrypted identity respectively with the licensed software product, be same cryptographic algorithm.Therefore, duplicate its EI subroutine and give other people if right to use owner duplicates its AS subroutine to be equal to other people.In this situation, the AS subroutine made an amendment slightly can make it be equal to the EI subroutine, and central only involving, add an interface routine to receive random number from central computer, and give AS subroutine with random number, receive the result who encrypts from the AS subroutine again, the result that will encrypt gives central computer then, and these functions are common in network interface software.Or, A1 can be 2 different cryptographic algorithm with the A2 cryptographic algorithm, but the information of representing the A1 cryptographic algorithm is added in the AS subroutine and can be the user and utilizes, or when the AS subroutine is performed, can be used that this function is operable as the user to carry out corresponding encryption function by the AS subroutine.
Moreover according to another embodiment of the invention, each all is added into the right to use owner identity software product and AS subroutine, so that copy right piracy is carried out the law action.Also have, when the AS subroutine is performed, can contact each software product one by one to check the right to use owner's identity in it, method is by utilizing a certain DOS service call program (servicecall), be stored in its software product in the operating computing machine from hard disc, be loaded on random-access memory (ram).The identity that is found a right to use owner if any any software product is different with the AS subroutine, and then the AS subroutine can forbid that all are subjected to its software product of controlling to be used in this computing machine, comprises it oneself.These rights to use owner identity can be stored in the predetermined storage element of software product, with altered for anti-its, add an encrypted identity in each software product in another storage element, and " another storage element " in different software products, its each position all is different, is found and is altered to prevent it.In addition, each software product is when being performed, and whether the result that can check automatically after this encrypted identity decrypted does not have encrypted identity to conform to this, if fruit is not inconsistent, software product can not operate.This not encrypted and encrypted right to use owner's identity be when central computing machine in the time will giving user's computing machine with software product, be incorporated in the software product.Also have, for preventing that AS subroutine mistake is stored in the software product in user's computing machine with one but be not that central computer is supplied, it is a software product that controlled by it, central computer is further in the 3rd the predetermined storage element in each software product, adding information illustrates that to give the AS subroutine this software product is supplied by it, to can not operate with each software product,, realize the words that this information is altered if when it is performed.
It should be noted that above embodiment just provides by way of example, and be it is evident that, can when not departing from inventive concept, make various variations and modification those of ordinary skill in the art.

Claims (12)

1. a method is used to protect and a kind ofly can is exempted to be duplicated and use by unwarranted by the software that the user duplicates, and may further comprise the steps:
Judge that a kind of identity software is present in a kind of treatment facility;
Definite results with described judgement allows that to cause described treatment facility the user can enjoy the described use right of wanting protected software as a condition precedent;
Wherein:
Described identity software is used to produce a segment information by described treatment facility, a described segment information that is produced is used for being examined by a kind of electronic transaction device, describedly wants the responsible electronic transaction of usufructuary user's needs of protected software to operate and can carry out thereby order has;
With do not cause a described electronic transaction to be done in the described method.
2. a kind of method described in claim 1 is used to protect and a kind ofly can is exempted to be duplicated and use by unwarranted by the software that the user duplicates, and wherein may further comprise the steps further:
Examine the identity of described identity software;
If the described result who examines is sure, judges that described identity software is what exist, otherwise judge that described identity software is non-existent.
3. a kind of method described in claim 1 is used to protect and a kind ofly can is exempted to be duplicated and use by unwarranted by the software that the user duplicates; wherein said electronic transaction operation relates to the operation that has usufructuary user's registered permanent residence payment from described, to obtain a kind of service or commodity.
4. a method is used to protect and a kind ofly can is exempted to be duplicated and use by unwarranted by the software that the user duplicates, and may further comprise the steps:
Examine a kind of identity of identity software, it is stored in a kind of treatment facility;
Allow that to cause described treatment facility the user can enjoy the described use right of wanting protected software as a condition precedent with the described definite results of examining;
Wherein:
Described identity software is used to produce a segment information by described treatment facility, a described segment information that is produced is used for being examined by a kind of electronic transaction device, describedly wants the responsible electronic transaction of usufructuary user's needs of protected software to operate and can carry out thereby order has;
Do not cause a described electronic transaction to be done in the described method.
5. a method is used to examine a kind of user's of treatment facility identity, may further comprise the steps:
Obtain first segment information by described a kind of treatment facility from the user, to produce second segment information, described second segment information is in order to license a payment registered permanent residence that belongs to described user;
Based on described second segment information, investigate the validity of the described registered permanent residence by a kind of electronic transaction device;
Described a kind of treatment facility is investigated to effectively with the described registered permanent residence, with as a condition precedent, uses the function of the described a kind of treatment facility of minimum some to allow the user;
The registered permanent residence described in the wherein said method is not drawn the effective life with the described registered permanent residence of any expense and described minimum a part of function and is not had any relation.
6. a method is used to protect and a kind ofly can is exempted to be duplicated and use by unwarranted by the software that the user duplicates, and is used by people's bodyguard by limiting it, may further comprise the steps:
A kind of treatment facility is to the segment information of a kind of electronic transaction device transmission relevant for described people's bodyguard;
A described segment information is used for being investigated described people's bodyguard by described electronic transaction device and has one effectively the payment registered permanent residence and order to described electronic transaction device allow that the described payment registered permanent residence can be used;
Described treatment facility receives the result of described registered permanent residence verification from described electronic transaction device;
With the positive result of described verification,, allow that to cause described treatment facility the user can enjoy the described use right of wanting protected software as a condition precedent;
Do not cause the described registered permanent residence to have any electronic transaction to be done in the wherein said method.
7. a method is used to protect software to exempt from by unwarranted use, is used by people's bodyguard by limiting it, comprises a submethod, and described submethod may further comprise the steps:
(first) a kind of treatment facility is called first treatment facility to the segment information of a kind of electronic transaction device transmission relevant for described people's bodyguard at this;
A described segment information is used for being investigated by described electronic transaction device that described people's bodyguard has an effective registered permanent residence and order allows that the described payment registered permanent residence can be used to described electronic transaction device;
(second) described first treatment facility receives the result of described registered permanent residence verification from described electronic transaction device;
(the third) with the positive result of described verification, as a condition precedent, from described treatment facility, declaring a segment information that discerns relevant for its hardware and/or software, in the future in following (fourth) step usefulness for referencial use; Thereafter
(fourth) checks a kind of identity of treatment facility, is described first treatment facility to prove it, based at least partly the described hardware and/or a described segment information of software;
(penta),, allow that to cause described first treatment facility user can enjoy the described use right of wanting protected software as a condition precedent with described positive result of checking;
The wherein said registered permanent residence is collected an expense; Thereafter
Described submethod can be used in a kind of treatment facility, is called second treatment facility at this, gratis or collect an expense that more described expense is low from the described registered permanent residence.
8. a method is used to protect software to exempt from by unwarranted use, use by people's bodyguard by limiting it, a kind of protectiveness software is used in described method, with requirement in the running of described protectiveness software be with " a kind of identity software/system be present in a kind of treatment facility " as a condition precedent with the step (first) below in described treatment facility, carrying out, used to produce first segment information by described treatment facility with described identity software/system, described first segment information that is produced is used for being examined by a kind of electronic transaction device, thereby makes described people's bodyguard need responsible electronic transaction operation to carry out;
Described method may further comprise the steps:
(first) is by running on a kind of treatment facility that closes the described condition precedent of symbol, declare second segment information that discerns about its hardware and/or software at this described protectiveness software that is called first treatment facility from described first treatment facility, in the future in following (second) step usefulness for referencial use; Thereafter
(second) checks a kind of identity of treatment facility, is described first treatment facility to prove it, based at least partly the described hardware and/or described second segment information of software:
(the third),, allows that to cause described first treatment facility user can enjoy the described use right of wanting protected software as a condition precedent with described positive result of checking;
Relating to the user without any step in the wherein said method describedly wants that protected software will be paid the bill or causes a described electronic transaction to be done because of using.
9. a method is used to protect and a kind ofly can is exempted to be duplicated and use by unwarranted by the software that the user duplicates, and may further comprise the steps:
Obtain first segment information from a kind of user of treatment facility, described treatment facility is storing a kind of identity software;
With described first segment information that obtains is correct to be present in described treatment facility with described a kind of identity software, as condition precedent, allows that to cause described treatment facility the user can enjoy the described use right of wanting protected software;
If wherein described identity software can obtain described correct first segment information from its user, described identity software just can be activated, and order can be used to produce a segment information by described treatment facility to it, a described segment information that is produced is used for being examined by a kind of electronic transaction device, describedly wants the responsible electronic transaction of usufructuary user's needs of protected software to operate and can carry out thereby allow have;
With in described method, do not cause a described electronic transaction to be done.
10. a kind of described in claim 9 is used to protect a kind of can being exempted from by the unwarranted method of duplicating and using by the software that the user duplicates, wherein said will protected software be a kind of software, be called first software at this, be used for described treatment facility and discern about the hardware of described treatment facility and/or a segment information of software, be called second segment information at this to declare;
Wherein comprise a kind of software further, be called second software at this, when being performed, being used to check its computing machine that runs on is described treatment facility, based on described second segment information at least partly;
If with the described result that checks for sure, just described second software can be used for allowing that the user can enjoy a kind of software, be called the use right of the 3rd software at this.
11. a kind of described in claim 9 is used to protect a kind of can being exempted from by the unwarranted method of duplicating and using by the software that the user duplicates; wherein said electronic transaction operation relates to the operation that has usufructuary user's registered permanent residence payment from described; to obtain a kind of service or commodity and described first segment information is a password.
12. a kind of described in claim 9 is used to protect a kind of can being exempted from by the unwarranted method of duplicating and using by the software that the user duplicates, the wherein said software commodity that to want protected software be purchased.
CNB998170550A 1999-12-20 1999-12-20 Software for limiting other software to be only used by its owner and method thereof Ceased CN100392624C (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/IB1999/002026 WO2001046811A1 (en) 1995-12-01 1999-12-20 Software for restricting other software to be used by the rightful user only and method therefor

Publications (2)

Publication Number Publication Date
CN1406353A CN1406353A (en) 2003-03-26
CN100392624C true CN100392624C (en) 2008-06-04

Family

ID=11004946

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB998170550A Ceased CN100392624C (en) 1999-12-20 1999-12-20 Software for limiting other software to be only used by its owner and method thereof

Country Status (4)

Country Link
JP (1) JP2003523003A (en)
CN (1) CN100392624C (en)
AU (1) AU765841B2 (en)
CA (1) CA2389526A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4497450B2 (en) * 2003-12-10 2010-07-07 独立行政法人科学技術振興機構 Program authentication system
JP2011044155A (en) * 2010-09-16 2011-03-03 Keung Tse Ho Software for regulating use of other software only to valid user and method for the same
CN104580316B (en) * 2013-10-24 2019-03-22 深圳市国信互联科技有限公司 Soft ware authorization management method and system
US9276943B2 (en) * 2013-10-25 2016-03-01 International Business Machines Corporation Authorizing a change within a computer system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4757534A (en) * 1984-12-18 1988-07-12 International Business Machines Corporation Code protection using cryptography
US5889863A (en) * 1996-06-17 1999-03-30 Verifone, Inc. System, method and article of manufacture for remote virtual point of sale processing utilizing a multichannel, extensible, flexible architecture
US5889860A (en) * 1996-11-08 1999-03-30 Sunhawk Corporation, Inc. Encryption system with transaction coded decryption key

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5719938A (en) * 1994-08-01 1998-02-17 Lucent Technologies Inc. Methods for providing secure access to shared information
JP3630451B2 (en) * 1994-09-20 2005-03-16 富士通株式会社 Software usage control device
JPH11194937A (en) * 1997-12-26 1999-07-21 Orix Rentec Kk Rent control system for electronic computer program

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4757534A (en) * 1984-12-18 1988-07-12 International Business Machines Corporation Code protection using cryptography
US5889863A (en) * 1996-06-17 1999-03-30 Verifone, Inc. System, method and article of manufacture for remote virtual point of sale processing utilizing a multichannel, extensible, flexible architecture
US5889860A (en) * 1996-11-08 1999-03-30 Sunhawk Corporation, Inc. Encryption system with transaction coded decryption key

Also Published As

Publication number Publication date
CA2389526A1 (en) 2001-06-28
AU1790800A (en) 2001-07-03
AU765841B2 (en) 2003-10-02
JP2003523003A (en) 2003-07-29
CN1406353A (en) 2003-03-26

Similar Documents

Publication Publication Date Title
US4916738A (en) Remote access terminal security
US6954855B2 (en) Integrated circuit devices with steganographic authentication, and steganographic authentication methods
JP4095680B2 (en) Security management method for card type storage device and card type storage device
EP0191162B1 (en) Method of software protection
US9305173B2 (en) Portable authorization device for authorizing use of protected information and associated method
JP3486043B2 (en) Operating method of software distribution system and software system
US7818578B2 (en) Method and apparatus for uniquely and authoritatively identifying tangible objects
White et al. ABYSS: An architecture for software protection
EP0679977B1 (en) Method and apparatus enabling software trial allowing the distribution of software objects
CN101361076B (en) Mobile memory system for secure storage and delivery of media content
US4817140A (en) Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor
US5689560A (en) Method and apparatus for enabling trial period use of software products: method and apparatus for allowing a try-and-buy user interaction
EP1678569B1 (en) Digital rights management unit for a digital rights management system
EP0268139A2 (en) Manipulating rights-to-execute in connection with a software copy protection mechanism
CN101073235A (en) System & method for distributing software licenses
JP2005512234A (en) Customer-centric context-aware switching model
EP0266748B1 (en) A software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor
JP2005512234A6 (en) Customer-centric context-aware switching model
CA2393543C (en) Portable authorization device for authorizing use of protected information and associated method
JPH07123086A (en) Literary work communication control system using ic card
EP1054315B1 (en) System and program for preventing unauthorized copying of software
JPH0991133A (en) False declaration detection system
CN100392624C (en) Software for limiting other software to be only used by its owner and method thereof
EP0749078A1 (en) Certifying system and transaction system with the certification
JPH08335170A (en) Program usage tariff charging system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: XIE HAOQIANG

Free format text: FORMER OWNER: BAIWEI CO., LTD.

Effective date: 20050114

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20050114

Address after: Box 70492, Kowloon Central Post Office, Hongkong, China

Applicant after: Xie Haoqiang

Address before: Kowloon, Hongkong, China

Applicant before: Baiwei Co., Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
C35 Partial or whole invalidation of patent or utility model
IW01 Full invalidation of patent right

Decision date of declaring invalidation: 20130410

Decision number of declaring invalidation: 20428

Granted publication date: 20080604