FIELD: physics, computer engineering.
SUBSTANCE: invention relates to computer engineering and specifically to protecting software and data from copying, illegal use and unauthorised distribution. According to the method of protecting software and data, an electronic key is made distributive, i.e., includes a main module and auxiliary modules. The main module is connected to a defined computer interface (e.g., USB, LPT or PCMCIA) or is embedded into a software or data storage device. Through a special driver, the protected program or data then send the main module information which is processed in accordance with a given algorithm and then returned. If the key response is correct, the program continues to operate. Otherwise it can execute any action set by the developers, e.g., switch to a demonstration mode, while blocking access to certain functions. When generating a response, the main module accesses auxiliary modules which are rigidly tied to a specific physical location (embedded into walls, floor etc) or a certain moving object.
EFFECT: high security of software and data from copying, illegal use, unauthorised distribution and access.
12 cl
Title | Year | Author | Number |
---|---|---|---|
METHOD AND DEVICE FOR PROTECTING SOFTWARE FROM UNSANCTIONED USAGE | 2006 |
|
RU2296363C1 |
METHOD OF PROTECTING SOFTWARE AND DATAWARE FROM UNAUTHORISED USE | 2011 |
|
RU2467389C1 |
METHOD OF PROTECTING SOFTWARE FROM UNAUTHORISED ACTIVATION AND COPYING | 2010 |
|
RU2470358C2 |
METHOD FOR ENSURING SAFETY OF GAME DEVICES AND A GAME DEVICE FOR ITS REALIZATION | 2006 |
|
RU2310907C1 |
METHOD FOR TRANSFERRING SOFTWARE LICENSE TO HARDWARE UNIT | 1995 |
|
RU2147790C1 |
PROTECTION MEANS | 2000 |
|
RU2260840C2 |
METHOD OF MULTIMEDIA DATA PROTECTION | 2006 |
|
RU2449494C2 |
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING SIGNATURE KEY | 2017 |
|
RU2756040C2 |
METHOD FOR COPY PROTECTION OF SOFTWARE | 1999 |
|
RU2159953C1 |
IDENTIFICATION SYSTEM FOR CERTIFICATION OF AUTHENTICITY OF ELECTRONIC DEALS AND ELECTRONIC TRANSACTIONS WITHOUT USE OF IDENTIFICATION CARDS | 1996 |
|
RU2263348C2 |
Authors
Dates
2012-11-20—Published
2011-09-23—Filed