METHOD OF PROTECTING SOFTWARE AND DATA FROM COPYING, ILLEGAL USE, UNAUTHORISED DISTRIBUTION AND ACCESS USING DISTRIBUTED ELECTRONIC KEY Russian patent published in 2012 - IPC G06F21/24 

Abstract RU 2467391 C1

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to computer engineering and specifically to protecting software and data from copying, illegal use and unauthorised distribution. According to the method of protecting software and data, an electronic key is made distributive, i.e., includes a main module and auxiliary modules. The main module is connected to a defined computer interface (e.g., USB, LPT or PCMCIA) or is embedded into a software or data storage device. Through a special driver, the protected program or data then send the main module information which is processed in accordance with a given algorithm and then returned. If the key response is correct, the program continues to operate. Otherwise it can execute any action set by the developers, e.g., switch to a demonstration mode, while blocking access to certain functions. When generating a response, the main module accesses auxiliary modules which are rigidly tied to a specific physical location (embedded into walls, floor etc) or a certain moving object.

EFFECT: high security of software and data from copying, illegal use, unauthorised distribution and access.

12 cl

Similar patents RU2467391C1

Title Year Author Number
METHOD AND DEVICE FOR PROTECTING SOFTWARE FROM UNSANCTIONED USAGE 2006
  • Gorjunov Dmitrij Igorevich
RU2296363C1
METHOD OF PROTECTING SOFTWARE AND DATAWARE FROM UNAUTHORISED USE 2011
  • Krasnopevtsev Anton Andreevich
RU2467389C1
METHOD OF PROTECTING SOFTWARE FROM UNAUTHORISED ACTIVATION AND COPYING 2010
  • Svirin Il'Ja Sergeevich
  • Silin Pavel Aleksandrovich
RU2470358C2
METHOD FOR ENSURING SAFETY OF GAME DEVICES AND A GAME DEVICE FOR ITS REALIZATION 2006
  • Falvej Grehkhem M.
  • Koller Kristian
  • Koperski Gregor
  • Tjukhler Gerkhard
RU2310907C1
METHOD FOR TRANSFERRING SOFTWARE LICENSE TO HARDWARE UNIT 1995
  • Derek L.Dehvis
RU2147790C1
PROTECTION MEANS 2000
  • Martinsson Roj
  • Andler Oskar
RU2260840C2
METHOD OF MULTIMEDIA DATA PROTECTION 2006
  • Grimen Gisle
  • Menkh Kristian
RU2449494C2
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING SIGNATURE KEY 2017
  • Novak, Mark, F.
RU2756040C2
METHOD FOR COPY PROTECTION OF SOFTWARE 1999
  • Kislitsyn A.S.
  • Pruzhinin A.V.
  • Tolstenev Ju.V.
  • Andrianov V.V.
  • Barabash O.E.
  • Bochkarev V.L.
  • Bochkarev S.L.
  • Egorov V.Ju.
  • Itkin R.V.
  • Kaminskij V.G.
  • Kuzin V.V.
  • Puchkov V.G.
  • Sapegin L.N.
RU2159953C1
IDENTIFICATION SYSTEM FOR CERTIFICATION OF AUTHENTICITY OF ELECTRONIC DEALS AND ELECTRONIC TRANSACTIONS WITHOUT USE OF IDENTIFICATION CARDS 1996
  • Khoffman Ned
  • Peha Dehvid F.
  • Li Dzhonatan A.
RU2263348C2

RU 2 467 391 C1

Authors

Bel'Tov Andrej Georgievich

Zhukov Igor' Jur'Evich

Mikhajlov Dmitrij Mikhajlovich

Dates

2012-11-20Published

2011-09-23Filed