WO2003023577A1 - Method and device for protecting information against unauthorised use - Google Patents
Method and device for protecting information against unauthorised use Download PDFInfo
- Publication number
- WO2003023577A1 WO2003023577A1 PCT/RU2001/000476 RU0100476W WO03023577A1 WO 2003023577 A1 WO2003023577 A1 WO 2003023577A1 RU 0100476 W RU0100476 W RU 0100476W WO 03023577 A1 WO03023577 A1 WO 03023577A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- named
- paragraph
- seller
- information
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 238000012217 deletion Methods 0.000 claims 4
- 230000037430 deletion Effects 0.000 claims 4
- 230000002889 sympathetic effect Effects 0.000 claims 1
- 241000735234 Ligustrum Species 0.000 abstract 1
- 230000003321 amplification Effects 0.000 description 2
- 238000003199 nucleic acid amplification method Methods 0.000 description 2
- 230000006378 damage Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
Definitions
- E ⁇ i se ⁇ iynye n ⁇ me ⁇ a, vv ⁇ dimye ⁇ lz ⁇ va ⁇ elem ⁇ i us ⁇ an ⁇ v ⁇ e or is ⁇ lz ⁇ vanii ⁇ g ⁇ ammn ⁇ g ⁇ ⁇ bes ⁇ echeniya further ⁇ bychn ⁇ s ⁇ avnivayu ⁇ sya with e ⁇ al ⁇ n ⁇ m, ⁇ y lib ⁇ yavlyae ⁇ sya u ⁇ azann ⁇ y in ⁇ g ⁇ amme ⁇ ns ⁇ an ⁇ y, lib ⁇ ⁇ un ⁇ tsiey ⁇ y ⁇ ⁇ lz ⁇ va ⁇ ele and / or a ⁇ a ⁇ a ⁇ u ⁇ e eg ⁇
- the company which is assembled by the organizer of the system for the generation of a new ⁇ ⁇ a.
- the serial number serves as the key for the development of the encrypted code of the device or its parts.
- E ⁇ ⁇ a ⁇ zhe neud ⁇ bn ⁇ and ⁇ lz ⁇ va ⁇ elyam, ⁇ ye ⁇ sle replacement chas ⁇ ey ⁇ m ⁇ yu ⁇ e ⁇ a not m ⁇ gu ⁇ is ⁇ lz ⁇ va ⁇ ⁇ i ⁇ b ⁇ e ⁇ onn ⁇ e ⁇ anee ⁇ g ⁇ ammn ⁇ e ⁇ bes ⁇ echenie, ⁇ a not s ⁇ bscha ⁇ n ⁇ vuyu ⁇ n ⁇ igu ⁇ atsiyu ⁇ m ⁇ yu ⁇ e ⁇ a eg ⁇ ⁇ izv ⁇ di ⁇ elyu not ⁇ lucha ⁇ in ⁇ ve ⁇ n ⁇ vy n ⁇ me ⁇ .
- P ⁇ i e ⁇ m ⁇ s ⁇ ao ⁇ sya v ⁇ zm ⁇ zhn ⁇ s ⁇ is ⁇ lyuchi ⁇ of ⁇ da ⁇ g ⁇ ammy ⁇ ve ⁇ u ⁇ aviln ⁇ s ⁇ i se ⁇ iyn ⁇ g ⁇ n ⁇ me ⁇ a (if not ⁇ n is ⁇ lzue ⁇ sya ⁇ a ⁇ ⁇ lyuch for ⁇ asshi ⁇ v ⁇ i ⁇ da).
- FIRM 1 generates a process of generating and executing a system protected by a remote device.
- FIGU 2 gives you a way to populate a framework, which is protected by a new application, and is set up by a new application, which is set up by a new application by a new developer.
- FIG. 5 7 CURRENT ISSUES OF LIES
- the equipment of the device to set the mark is not the same as the one used by the company, and the same patterns will be used by the company and will be the same as the ones that are used by the developers.
- ⁇ IGU ⁇ 1 ⁇ azyvae ⁇ ⁇ dn ⁇ of v ⁇ l ⁇ scheny sis ⁇ emy zaschi ⁇ y ⁇ g ⁇ amm ⁇ nesan ⁇ tsi ⁇ ni ⁇ vann ⁇ g ⁇ is ⁇ lz ⁇ vaniya
- ⁇ lz ⁇ va ⁇ el 101 wanting ⁇ i ⁇ b ⁇ es ⁇ i ⁇ iyu ⁇ g ⁇ ammy 105, 100 ⁇ avlyae ⁇ dis ⁇ ibyu ⁇ u sv ⁇ y ⁇ y ⁇ y ⁇ lyuch 107 (v ⁇ zm ⁇ zhn ⁇ in s ⁇ s ⁇ ave se ⁇ i ⁇ i ⁇ a ⁇ a).
- P ⁇ i is ⁇ lnenii zaschischonn ⁇ y ⁇ g ⁇ ammy 108 ⁇ sle extraction from ⁇ amya ⁇ i 103 ⁇ na ⁇ asshi ⁇ vyvae ⁇ sya with ⁇ imeneniem asimme ⁇ ichn ⁇ g ⁇ alg ⁇ i ⁇ ma 104 s ⁇ ve ⁇ s ⁇ vuyuscheg ⁇ alg ⁇ i ⁇ mu 102 ⁇ i e ⁇ m is ⁇ lzue ⁇ sya se ⁇ e ⁇ ny ⁇ lyuch ⁇ lz ⁇ va ⁇ elya 110 ⁇ a ⁇ ny ⁇ lyuchu 107.
- P ⁇ luchennaya in ⁇ ezul ⁇ a ⁇ e ⁇ asshi ⁇ vannaya ⁇ iya ⁇ g ⁇ ammy 109 ⁇ zhdes ⁇ vennaya 8 p 105, is being used to enforce the 106 driver's operation in the process.
- PICTURE 2 creates an activated, protected, 108 module, which builds a module 201 to open a remote key driver on a device.
- ⁇ gda in ⁇ tsesse is ⁇ lneniya ⁇ g ⁇ ammy v ⁇ zni ⁇ ae ⁇ ne ⁇ b ⁇ dim ⁇ s ⁇ ⁇ e ⁇ eda ⁇ u ⁇ avlenie in ⁇ a ⁇ y uchas ⁇
- FIGURE 4 illustrate the operation of process 403 by means of a 405 unit for development from the memory of 402 informa- tion by means of the systems and the forces of the forces of the forces of the forces of the forces of the forces of the forces of the forces of the forces of the forces of the forces of the forces of the forces of the forces of the 402 memory of the 404
- the program which is encrypted by the wrench by the driver of the computer 401, is stored in the memory card 402, and is stored in the program, and by the method of the card, and by the method of the card, and by the method of the card and by the method of the card, and by the method of the card, and by the method of the card, and by the method of the card, and by the method of the card, and by the method of the card, and by the method of the card, and by the method of the card, and by the method of the card and the party,
- P ⁇ i is ⁇ lnenii ⁇ g ⁇ ammy her zashi ⁇ vanny is ⁇ lnyaemy ⁇ d zag ⁇ uzhae ⁇ sya in ⁇ tsess ⁇ of ⁇ amya ⁇ i bl ⁇ m vyb ⁇ i ⁇ mand 404 ⁇ y ⁇ e ⁇ edao ⁇ zashi ⁇ vannye ⁇ dy ⁇ dlezhaschi ⁇ vy ⁇ lneniyu ⁇ mand in bl ⁇ ⁇ asshi ⁇ v ⁇ i 405.
- E ⁇ bl ⁇ is ⁇ lzuya
- the compute modeled key of the key 407 the system is compiled by the commands of the command, which is shown and used for executing block 406, 10 responsible for the performance of these commands. That is, the access to it, to its own computer, which can be done by him alone, without reading it, because it cannot be read.
- ⁇ a ⁇ e ⁇ g ⁇ anichenie m ⁇ zhe ⁇ by ⁇ is ⁇ lz ⁇ van ⁇ for ⁇ ed ⁇ v ⁇ ascheniya u ⁇ ech ⁇ i ⁇ asshi ⁇ vann ⁇ y in ⁇ matsii in case ⁇ gda ⁇ g ⁇ amma (na ⁇ ime ⁇ in ⁇ ezul ⁇ a ⁇ e ⁇ shib ⁇ i, svyazann ⁇ y with ⁇ e ⁇ e ⁇ lneniem bu ⁇ e ⁇ a) is ⁇ lzue ⁇ sya for ch ⁇ eniya sv ⁇ eg ⁇ ⁇ asshi ⁇ vann ⁇ g ⁇ ⁇ da and further za ⁇ isi eg ⁇ in ⁇ a ⁇ uyu-lib ⁇ ⁇ amya ⁇ in ⁇ asshi ⁇ vann ⁇ m form.
- e ⁇ y targets ⁇ tsess ⁇ e m ⁇ zhe ⁇ by ⁇ ⁇ edusm ⁇ en More ⁇ din ⁇ egis ⁇ for ⁇ aneniya ⁇ lyucha simme ⁇ ichn ⁇ g ⁇ ⁇ i ⁇ alg ⁇ i ⁇ ma 506 ⁇ uda e ⁇ ⁇ lyuch za ⁇ isyvae ⁇ sya ⁇ sle ⁇ asshi ⁇ vaniya eg ⁇ with is ⁇ lz ⁇ vaniem asimme ⁇ ichn ⁇ g ⁇ ⁇ i ⁇ alg ⁇ i ⁇ ma 505, and still ⁇ din bl ⁇ Amplification 507, an auxiliary amplification is protected by information using a symmetrical rational and rational trading system and a key 506 from a registrar.
- ⁇ IGU ⁇ 5 ⁇ azyvae ⁇ further us ⁇ ve ⁇ shens ⁇ v ⁇ vanie ⁇ edlagaem ⁇ y me ⁇ di ⁇ i zaschi ⁇ y with ucho ⁇ m ⁇ g ⁇ , ch ⁇ ⁇ tsedu ⁇ y simme ⁇ ichn ⁇ y ⁇ i ⁇ g ⁇ a ⁇ ii, ⁇ a ⁇ ⁇ avil ⁇ , vy ⁇ lnyayu ⁇ sya susches ⁇ venn ⁇ bys ⁇ ee than ⁇ tsedu ⁇ y asimme ⁇ ichn ⁇ y ⁇ i ⁇ g ⁇ a ⁇ ii.
- the key 501 is used for a symmetric algorithm.
- the program 105 will be encrypted (step 502).
- the key 501 will also be encrypted, and the asymmetric function will be used (step 503). Key to the name of the world
- the operator 101 using the protected device 108 first builds the keyboard using the security key 110, which creates the keyboard with a key that has the key 107 key, and the same key, and the keyboard has 107 keys.
- the key 506, received at this stage, will be each time the key 501, with the general-purpose partner.
- the key 506 is used to amplify the code of the device (step 507). It is received by the executing unit 106, which is assembled with the unit 105 and utilized by the operating unit of the com- puter.
- This system is easy to rip and not in case of protection of information of any kind (such as, name, audio or video recording), and not just one of the players.
- the enhancement will be made by the use of the system, using the data (or, by way of composing the audio or video) or reproducing the system or sounding the video or video recording) or reproducing the system.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
- Nitrogen And Oxygen Or Sulfur-Condensed Heterocyclic Ring Systems (AREA)
Description
Claims
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002473122A CA2473122A1 (en) | 2001-11-12 | 2001-11-12 | Method and device for protecting information against unauthorised use |
JP2003527568A JP2005512170A (ja) | 2001-11-12 | 2001-11-12 | 不正使用に対する情報保護の方法および装置 |
EP01989063A EP1471405A4 (en) | 2001-11-12 | 2001-11-12 | METHOD AND SYSTEM FOR PROTECTING INFORMATION AGAINST UNAUTHORIZED USE |
US10/495,507 US20040255136A1 (en) | 2001-11-12 | 2001-11-12 | Method and device for protecting information against unauthorised use |
PCT/RU2001/000476 WO2003023577A1 (en) | 2001-11-12 | 2001-11-12 | Method and device for protecting information against unauthorised use |
KR10-2004-7007235A KR20040058278A (ko) | 2001-11-12 | 2001-11-12 | 비인가된 사용에 대한 정보의 보호방법 및 보호장치 |
CNA018237819A CN1559026A (zh) | 2001-11-12 | 2001-11-12 | 防止非法使用信息的方法和装置 |
EA200400683A EA006661B1 (ru) | 2001-11-12 | 2001-11-12 | Способ и система защиты информации от несанкционированного использования |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/RU2001/000476 WO2003023577A1 (en) | 2001-11-12 | 2001-11-12 | Method and device for protecting information against unauthorised use |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003023577A1 true WO2003023577A1 (en) | 2003-03-20 |
Family
ID=20129665
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/RU2001/000476 WO2003023577A1 (en) | 2001-11-12 | 2001-11-12 | Method and device for protecting information against unauthorised use |
Country Status (8)
Country | Link |
---|---|
US (1) | US20040255136A1 (ru) |
EP (1) | EP1471405A4 (ru) |
JP (1) | JP2005512170A (ru) |
KR (1) | KR20040058278A (ru) |
CN (1) | CN1559026A (ru) |
CA (1) | CA2473122A1 (ru) |
EA (1) | EA006661B1 (ru) |
WO (1) | WO2003023577A1 (ru) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006155393A (ja) * | 2004-11-30 | 2006-06-15 | Toshiba Corp | サーバ融通装置、サーバ融通方法およびサーバ融通プログラム |
CN100353276C (zh) * | 2004-06-24 | 2007-12-05 | 株式会社东芝 | 微处理器 |
CN100354787C (zh) * | 2004-06-24 | 2007-12-12 | 株式会社东芝 | 微处理器 |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10127558A1 (de) * | 2001-06-06 | 2002-12-12 | Philips Corp Intellectual Pty | Verfahren zur Verarbeitung einer Text-, Gestik-, Mimik- und/oder Verhaltensbeschreibung mit Überprüfung der Benutzungsberechtigung von Sprach-, Gestik-, Mimik- und/oder Verhaltensprofilen zur Synthese |
US7706777B2 (en) * | 2003-09-23 | 2010-04-27 | Broadcom Corporation | Secure user interface in a shared resource environment |
CN101978647A (zh) * | 2008-01-31 | 2011-02-16 | 耶德托公司 | 保护智能卡 |
US8365988B1 (en) * | 2008-04-11 | 2013-02-05 | United Services Automobile Association (Usaa) | Dynamic credit card security code via mobile device |
DE102010037784B4 (de) * | 2010-09-27 | 2014-07-31 | Kobil Systems Gmbh | Verfahren zur Erhöhung der Sicherheit von sicherheitsrelevanten Online Diensten |
US20120331303A1 (en) * | 2011-06-23 | 2012-12-27 | Andersson Jonathan E | Method and system for preventing execution of malware |
US8769310B2 (en) | 2011-10-21 | 2014-07-01 | International Business Machines Corporation | Encrypting data objects to back-up |
KR101111889B1 (ko) * | 2011-11-10 | 2012-02-14 | 이정남 | 문서의 암호화 및 복호화 방법 |
GB201607476D0 (en) * | 2016-04-29 | 2016-06-15 | Eitc Holdings Ltd | Operating system for blockchain IOT devices |
JP2019149763A (ja) * | 2018-02-28 | 2019-09-05 | オムロン株式会社 | データの処理方法、制御システム、制御装置 |
WO2022044281A1 (ja) * | 2020-08-28 | 2022-03-03 | 日本電信電話株式会社 | 処理装置、処理方法およびプログラム |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0537738B1 (en) * | 1991-10-17 | 1996-09-25 | Software Security, Inc. | Method of protecting computer software from unauthorized execution using multiple keys |
WO2000030319A1 (en) * | 1998-11-13 | 2000-05-25 | Iomega Corporation | System for keying protected electronic data to particular media to prevent unauthorized copying using asymmetric encryption and a unique identifier of the media |
RU2154855C2 (ru) * | 1998-08-17 | 2000-08-20 | Пензенский научно-исследовательский электротехнический институт | Способ обработки данных |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4405829A (en) * | 1977-12-14 | 1983-09-20 | Massachusetts Institute Of Technology | Cryptographic communications system and method |
EP0175487A3 (en) * | 1984-08-23 | 1989-03-08 | Btg International Limited | Software protection device |
FR2634917A1 (fr) * | 1988-08-01 | 1990-02-02 | Pionchon Philippe | Procede et dispositif de protection d'un logiciel, en particulier contre les copies non autorisees |
US5684875A (en) * | 1994-10-21 | 1997-11-04 | Ellenberger; Hans | Method and apparatus for detecting a computer virus on a computer |
JPH08263438A (ja) * | 1994-11-23 | 1996-10-11 | Xerox Corp | ディジタルワークの配給及び使用制御システム並びにディジタルワークへのアクセス制御方法 |
JPH08305558A (ja) * | 1995-04-27 | 1996-11-22 | Casio Comput Co Ltd | 暗号化プログラム演算装置 |
NO302388B1 (no) * | 1995-07-13 | 1998-02-23 | Sigurd Sigbjoernsen | Fremgangsmåte og anordning for å beskytte programvare mot bruk uten tillatelse |
US5826011A (en) * | 1995-12-26 | 1998-10-20 | Rainbow Technologies, Inc. | Method of metering and protecting computer software |
DE69823206T2 (de) * | 1997-07-25 | 2004-08-19 | Affymetrix, Inc. (a Delaware Corp.), Santa Clara | Verfahren zur herstellung einer bio-informatik-datenbank |
US6134659A (en) * | 1998-01-07 | 2000-10-17 | Sprong; Katherine A. | Controlled usage software |
US6226618B1 (en) * | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
US7228437B2 (en) * | 1998-08-13 | 2007-06-05 | International Business Machines Corporation | Method and system for securing local database file of local content stored on end-user system |
US7225333B2 (en) * | 1999-03-27 | 2007-05-29 | Microsoft Corporation | Secure processor architecture for use with a digital rights management (DRM) system on a computing device |
US6988199B2 (en) * | 2000-07-07 | 2006-01-17 | Message Secure | Secure and reliable document delivery |
WO2001008345A1 (en) * | 1999-07-22 | 2001-02-01 | Open Security Solutions, Llc | A computer system and process for accessing an encrypted and self-decrypting digital information product |
US6598161B1 (en) * | 1999-08-09 | 2003-07-22 | International Business Machines Corporation | Methods, systems and computer program products for multi-level encryption |
US6775772B1 (en) * | 1999-10-12 | 2004-08-10 | International Business Machines Corporation | Piggy-backed key exchange protocol for providing secure low-overhead browser connections from a client to a server using a trusted third party |
JP2001209583A (ja) * | 2000-01-26 | 2001-08-03 | Sony Corp | データ記録再生器およびセーブデータ処理方法、並びにプログラム提供媒体 |
US6983374B2 (en) * | 2000-02-14 | 2006-01-03 | Kabushiki Kaisha Toshiba | Tamper resistant microprocessor |
US20020059144A1 (en) * | 2000-04-28 | 2002-05-16 | Meffert Gregory J. | Secured content delivery system and method |
US20020029283A1 (en) * | 2000-08-18 | 2002-03-07 | Yummy Interactive, Inc. | Rich client application delivery |
US6884171B2 (en) * | 2000-09-18 | 2005-04-26 | Nintendo Co., Ltd. | Video game distribution network |
TW548983B (en) * | 2000-10-26 | 2003-08-21 | Gen Instrument Corp | Initial viewing period for scalable authorization of streaming multimedia content |
JP4153653B2 (ja) * | 2000-10-31 | 2008-09-24 | 株式会社東芝 | マイクロプロセッサおよびデータ保護方法 |
US6978376B2 (en) * | 2000-12-15 | 2005-12-20 | Authentica, Inc. | Information security architecture for encrypting documents for remote access while maintaining access control |
US20030037261A1 (en) * | 2001-03-26 | 2003-02-20 | Ilumin Corporation | Secured content delivery system and method |
-
2001
- 2001-11-12 KR KR10-2004-7007235A patent/KR20040058278A/ko not_active Application Discontinuation
- 2001-11-12 WO PCT/RU2001/000476 patent/WO2003023577A1/ru active Application Filing
- 2001-11-12 US US10/495,507 patent/US20040255136A1/en not_active Abandoned
- 2001-11-12 EP EP01989063A patent/EP1471405A4/en not_active Withdrawn
- 2001-11-12 JP JP2003527568A patent/JP2005512170A/ja active Pending
- 2001-11-12 CN CNA018237819A patent/CN1559026A/zh active Pending
- 2001-11-12 EA EA200400683A patent/EA006661B1/ru not_active IP Right Cessation
- 2001-11-12 CA CA002473122A patent/CA2473122A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0537738B1 (en) * | 1991-10-17 | 1996-09-25 | Software Security, Inc. | Method of protecting computer software from unauthorized execution using multiple keys |
RU2154855C2 (ru) * | 1998-08-17 | 2000-08-20 | Пензенский научно-исследовательский электротехнический институт | Способ обработки данных |
WO2000030319A1 (en) * | 1998-11-13 | 2000-05-25 | Iomega Corporation | System for keying protected electronic data to particular media to prevent unauthorized copying using asymmetric encryption and a unique identifier of the media |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100353276C (zh) * | 2004-06-24 | 2007-12-05 | 株式会社东芝 | 微处理器 |
CN100354787C (zh) * | 2004-06-24 | 2007-12-12 | 株式会社东芝 | 微处理器 |
JP2006155393A (ja) * | 2004-11-30 | 2006-06-15 | Toshiba Corp | サーバ融通装置、サーバ融通方法およびサーバ融通プログラム |
Also Published As
Publication number | Publication date |
---|---|
EP1471405A1 (en) | 2004-10-27 |
EP1471405A4 (en) | 2010-01-13 |
CA2473122A1 (en) | 2003-03-20 |
EA006661B1 (ru) | 2006-02-24 |
JP2005512170A (ja) | 2005-04-28 |
US20040255136A1 (en) | 2004-12-16 |
KR20040058278A (ko) | 2004-07-03 |
CN1559026A (zh) | 2004-12-29 |
EA200400683A1 (ru) | 2004-12-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2003023577A1 (en) | Method and device for protecting information against unauthorised use | |
CN105426708B (zh) | 一种Android***的应用程序的加固方法 | |
AU709381B2 (en) | Ciphering and deciphering of multimedia data | |
US7146644B2 (en) | Data security system and method responsive to electronic attacks | |
US7374484B2 (en) | Lottery ticket security method | |
US7721344B2 (en) | Data security system and method | |
US5625690A (en) | Software pay per use system | |
CN100417064C (zh) | 信息处理***和信息处理方法 | |
US7529938B2 (en) | Method, apparatus and system for performing authentication according to challenge-response protocol using scrambled access information | |
US20200175138A1 (en) | Computer-implemented method, a system, and computer programs for digital files management and preservation in digital licenses | |
JPH0793148A (ja) | ソフトウエア配布システム | |
CN104067286B (zh) | 无效托管密钥的检测 | |
CN1322431C (zh) | 基于对称密钥加密保存和检索数据 | |
Hamdan et al. | AH4S: an algorithm of text in text steganography using the structure of omega network | |
Sadowsky et al. | Information technology security handbook | |
Cobb | Cryptography for dummies | |
JP2007140869A (ja) | 電子情報管理方法、電子情報管理システム、コンピュータプログラム | |
CN106534223A (zh) | 基于密钥算法和日志审计的Openstack访问控制方法 | |
JP2001290707A (ja) | データ処理方法、データ処理プログラムを格納したコンピュータ読取可能な記憶媒体、およびデータ処理装置 | |
CN115514470B (zh) | 一种社区矫正数据安全性的存储方法及*** | |
Muñoz-Arteaga et al. | A methodology for designing information security feedback based on User Interface Patterns | |
JP4151923B2 (ja) | 携帯可能情報記憶媒体を使用した情報管理システム | |
CN112771509A (zh) | 信息处理装置、信息处理方法和程序 | |
Podolak | Crisis management series: Creating crisis management teams | |
CN113726515A (zh) | 一种基于ukey的密钥处理方法、存储介质及电子设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BY BZ CA CH CN CO CR CU CZ DE DM DZ EC EE ES FI GB GD GE GH HR HU ID IL IN IS JP KE KG KP KR LC LK LR LS LT LU LV MA MD MG MN MW MX MZ NO NZ OM PH PL PT RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZA |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ UG ZW AM AZ BY KG KZ MD TJ TM AT BE CH CY DE DK ES FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW MR NE SN TD TG AE AG AL AM AT AZ BA BB BG BR BY BZ CA CH CN CO CR CZ DE DK DM DZ EC EE ES FI GB GD GE GM HR HU ID IL IN IS JP KE KG KP KR KZ LK LR LS LT LU LV MA MD MG MK MN MX MZ NO NZ OM PH PL PT RO RU SD SE SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZW GH GM KE LS MW MZ SD SL SZ TZ ZW AM AZ BY KG KZ MD RU TJ |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 20018237819 Country of ref document: CN Ref document number: 2003527568 Country of ref document: JP Ref document number: 10495507 Country of ref document: US Ref document number: 1020047007235 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2001989063 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200400683 Country of ref document: EA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2473122 Country of ref document: CA |
|
WWP | Wipo information: published in national office |
Ref document number: 2001989063 Country of ref document: EP |