Processing

Please wait...

Settings

Settings

Goto Application

1. WO2007088384 - SOFTWARE PRODUCT AUTHENTICATION

Publication Number WO/2007/088384
Publication Date 09.08.2007
International Application No. PCT/GB2007/000373
International Filing Date 02.02.2007
IPC
G06F 21/12 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
12Protecting executable software
G06F 21/51 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
51at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
G06F 21/64 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
64Protecting data integrity, e.g. using checksums, certificates or signatures
CPC
G06F 21/121
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
12Protecting executable software
121Restricting unauthorised execution of programs
G06F 21/125
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
12Protecting executable software
121Restricting unauthorised execution of programs
125by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
G06F 21/51
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
51at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
G06F 21/64
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
64Protecting data integrity, e.g. using checksums, certificates or signatures
Applicants
  • BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY [GB]/[GB] (AllExceptUS)
  • MARTIN, Thomas [IE]/[GB] (UsOnly)
Inventors
  • MARTIN, Thomas
Agents
  • NASH, Roger William
Priority Data
06250592.003.02.2006EP
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) SOFTWARE PRODUCT AUTHENTICATION
(FR) AUTHENTIFICATION DE PRODUITS LOGICIELS
Abstract
(EN)
The present application discloses a method and a system for authenticating software products. Computer software is often sold with a unique validation number. In order to register the product a user has to connect to a remote server and he is then asked to enter the validation number. The disadvantage of this is that it can take time, and further the verification can be delayed or entirely prevented due to network problems. The invention solves this problem by supplying a validator (219) with the software product so that the user can register and validate the software product off-line. In order to achieve this the validation number comprises an index and a validation code, which is the index signed with the software producer's private key. A corresponding public key (203) is distributed to the user and the user can then operate on the validation code and index using the validator (219) and the public key (203) to validate the validation code as one generated from the applied index and the private key.
(FR)
La présente invention concerne un procédé et un système d'authentification de produits logiciels. Un logiciel informatique est souvent vendu avec un numéro de validation unique. Afin d'enregistrer le produit, un utilisateur doit se connecter à un serveur à distance et on lui demande ensuite d'entrer le numéro de validation. Le désavantage de cette méthode est qu'elle prend du temps et la validation peut être ensuite retardée ou totalement empêchée par des problèmes de réseau. Pour remédier à cela, on fournit un validateur (219) avec le produit logiciel de sorte que l'utilisateur puisse enregistrer et valider le produit logiciel hors ligne. Pour réaliser cette opération, le numéro de validation comprend un index et un code de validation qui est l'index signé par la clé privée du fabricant du logiciel. Une clé publique correspondante (203) est distribuée à l'utilisateur et ce dernier peut ensuite agir sur le code de validation et l'index à l'aide du validateur (219) et de la clé publique (203) pour valider le code de validation comme un code généré à partir de l'index et de la clé privée utilisés.
Also published as
Latest bibliographic data on file with the International Bureau