Software fingerprinting and branding
    2.
    发明授权
    Software fingerprinting and branding 有权
    软件指纹和品牌

    公开(公告)号:US06574732B1

    公开(公告)日:2003-06-03

    申请号:US09306526

    申请日:1999-05-06

    IPC分类号: H04L900

    CPC分类号: G06F21/10 B82Y30/00

    摘要: A method and apparatus for controlling the unauthorized removal of software from a non-volatile storage medium include storing an encoded version of the software at an address of the storage medium where the address is used as data directly in the process of deriving an encoding key used to encode the software, and decoding the encoded software using a decoding key derived using the location of the software in its storage medium as data.

    摘要翻译: 一种用于控制从非易失性存储介质中未经授权地移除软件的方法和装置包括将软件的编码版本存储在存储介质的地址处,其中地址被用作数据,直接在导出使用的编码密钥的过程中 对软件进行编码,并使用在其存储介质中使用软件的位置导出的解码密钥对编码的软件进行解码作为数据。

    Software fingerprinting and branding
    3.
    发明授权
    Software fingerprinting and branding 失效
    软件指纹和品牌

    公开(公告)号:US6000030A

    公开(公告)日:1999-12-07

    申请号:US667337

    申请日:1996-06-20

    IPC分类号: G06F1/00 G06F21/00 H04L9/00

    CPC分类号: G06F21/10 B82Y30/00

    摘要: A method and apparatus for controlling the distribution of computer software products stored at a file server provide for requesting the identity of the user and the user's secret key prior to enabling access to a requested program product. The program product, upon proper verification of the user identify, is encoded using a second key which is known to the user, and preferably an identification of the user is embedded in the encoding program. Various methods are employed for tracking user access to particular programs, including storing the identify of the user either camouflaged in a commonly found program in non-volatile memory or hidden in a typically overlooked portion of non-volatile memory. In addition, the encoded program can have embedded therein one, and preferably two identifications of the user which can be used to track the program as well as to ensure that the program, when executed has not been tampered with. Upon execution of the encoded program by the user's system, the code is executed "on the fly" and no executable copy of the code is stored in non-volatile memory at any time. In the event that decoding does not result in a properly executable program, the system may need to be rebooted and/or the program may be at least partially destroyed.

    摘要翻译: 用于控制存储在文件服务器中的计算机软件产品的分发的方法和装置提供在启用对所请求的节目产品的访问之前请求用户的身份和用户的秘密密钥。 程序产品在用户识别的适当验证之后,使用用户已知的第二密钥进行编码,并且优选地,用户的标识嵌入在编码程序中。 采用各种方法来跟踪对特定程序的用户访问,包括将在普通发现的程序中伪装的用户的标识存储在非易失性存储器中或隐藏在非易失性存储器的通常被忽视的部分中。 此外,编码程序可以嵌入其中一个,最好是两个用户标识,可以用于跟踪程序,以及确保程序在被执行时没有被篡改。 在由用户的系统执行编码的程序时,代码“即时”执行,并且代码的可执行副本在任何时候都被存储在非易失性存储器中。 在解码不会导致正确执行的程序的情况下,系统可能需要重新启动和/或程序可能至少部分被破坏。