USRE42861E1 - Method of distributing piracy protected computer software - Google Patents

Method of distributing piracy protected computer software Download PDF

Info

Publication number
USRE42861E1
USRE42861E1 US11/400,074 US40007406A USRE42861E US RE42861 E1 USRE42861 E1 US RE42861E1 US 40007406 A US40007406 A US 40007406A US RE42861 E USRE42861 E US RE42861E
Authority
US
United States
Prior art keywords
software application
smart card
computer
data
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US11/400,074
Inventor
Stephen J. Borza
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ActivCard Ireland Ltd
Original Assignee
ActivCard Ireland Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ActivCard Ireland Ltd filed Critical ActivCard Ireland Ltd
Priority to US11/400,074 priority Critical patent/USRE42861E1/en
Assigned to ACTIVCARD IRELAND LIMITED reassignment ACTIVCARD IRELAND LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DEW ENGINEERING AND DEVELOPMENT LIMITED
Application granted granted Critical
Publication of USRE42861E1 publication Critical patent/USRE42861E1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • This invention relates generally to a method for disabling execution of a software application stored within a computer absent data indicative of an authorised use of the software application and more particularly relates to a method for disabling execution of a software application using a smart card.
  • Software piracy is causing huge losses in profits for companies developing and selling computer software.
  • the sale and distribution of software designed for general use is based on the assumption that a software provider only wishes to sell a right to use the software to one person or to a select group of people.
  • the seller specifically does not wish the purchaser to distribute the software to other users or to resell the software.
  • Various methods are employed to prevent the purchaser from distributing the software.
  • the most common method of software distribution is via a storage medium. The user is often unrestricted from either copying the software from this storage medium to another one or installing the software from a same storage medium on different computers. This results in undesirable software piracy.
  • piracy protection schemes were implemented to prevent a purchaser from making a back up copy of a software application.
  • a storage medium such as a floppy disk
  • the software provider must replace the storage medium.
  • Some software providers have included a backup copy of the software application along with the original copy to lessen inconvenience when the original copy is damaged, but sometimes even these “backup” copies fail.
  • Some software providers have avoided software copy protection schemes. Instead these software providers rely on the honesty of the purchaser, the fact that the documentation is difficult to duplicate, and/or a license agreement that the purchaser is expected to honor. The license agreement makes it illicit to distribute the software. Many software providers view convenience as essential for software users and therefore are wary of software piracy protection methods that inconvenience users in any way.
  • Another method of software protection involves writing to an installation disk to indicate that installation has occurred. This limits a disk to one use. This has many of the aforementioned drawbacks and also is unworkable with CD ROM technology. Using CD ROM technology, a software provider writes a program and other information to a CD ROM which can be written to only once using special hardware for that purpose. Therefore, adding information to a CD ROM during installation is not possible.
  • a security access system that provides substantially secure access and does not require a password or access code is a biometric identification system.
  • a biometric identification system accepts unique biometric information from a user and identifies the user by matching the information against information belonging to registered users of the system.
  • One such biometric identification system is a fingerprint recognition system.
  • a biometric imaging device with a personal computer
  • a biometric imaging device In a fingerprint input transducer or sensor, the finger under investigation is usually pressed against a flat surface, such as a side of a glass plate; the ridge and valley pattern of the finger tip is sensed by a sensing means such as an interrogating light beam.
  • Various optical devices are known which employ prisms upon which a finger whose print is to be identified is placed. The prism has a first surface, a platen, upon which a finger is placed, a second surface disposed at an acute angle to the first surface through which the fingerprint is viewed and a third illumination surface through which light is directed into the prism.
  • the illumination surface is at an acute angle to the first surface, as seen for example, in U.S. Pat. Nos. 5,187,482 and 5,187,748. In other cases, the illumination surface is parallel to the first surface, as seen for example, in U.S. Pat. Nos. 5,109,427 and 5,233,404. Fingerprint identification devices of this nature are generally used to control the building-access or information-access of individuals to buildings, rooms, and devices such as computer terminals.
  • U.S. Pat. No. 4,353,056 in the name of Tsikos issued Oct. 5, 1982 discloses an alternative kind of fingerprint sensor that uses a capacitive sensing approach.
  • the described sensor has a two dimensional, row and column, array of capacitors, each comprising a pair of spaced electrodes, carried in a sensing member and covered by an insulating film.
  • the sensors rely upon deformation to the sensing member caused by a finger being placed thereon so as to vary locally the spacing between capacitor electrodes, according to the ridge/trough pattern of the fingerprint, and hence, the capacitance of the capacitors.
  • the capacitors of each column are connected in series with the columns of capacitors connected in parallel and a voltage is applied across the columns.
  • a voltage is applied to each individual capacitor in the array. Sensing in the respective two arrangements is accomplished by detecting the change of voltage distribution in the series connected capacitors or by measuring the voltage values of the individual capacitances resulting from local deformation. To achieve this, an individual connection is required from the detection circuit to each capacitor.
  • Fingerprint characterisation is well known and can involve many aspects of fingerprint analysis. The analysis of fingerprints is discussed in the following references, which are hereby incorporated by reference:
  • a system for protecting a software application from piracy comprising:
  • the peripheral device comprises a smart card reader and a smart card. More preferably, the peripheral device also comprises a biometric sensor in the form of a fingerprint imager.
  • FIG. 1a is a simplified diagram of a system according to the invention for protecting a software application from piracy using a smart card;
  • FIG. 1b is a simplified flow diagram of a method according to the invention for protecting a software application from piracy using the system described in FIG. 1a ;
  • FIG. 2a is a simplified diagram of a system according to the invention for protecting a software application from piracy storing a serial number of a processor memory of a smart card;
  • FIG. 2b is a simplified flow diagram of an installation of a software application using the system described in FIG. 2a ;
  • FIG. 2c is a simplified flow diagram of an execution of a software application using the system described in FIG. 2a ;
  • FIG. 3a is a simplified diagram of a preferred embodiment of a system according to the invention for protecting a software application from piracy comprising a smart card reader with a contact imager disposed therein;
  • FIG. 3b is a simplified flow diagram of a method according to the invention for protecting a software application from piracy using the system described in FIG. 3a ;
  • FIG: 4 a is a simplified diagram of a system according to the invention for protecting a software application from piracy comprising a smart card reader and a contact imager connected to a computer;
  • FIG. 4b is a simplified diagram of a system according to the invention for protecting a software application from piracy comprising a smart card with a contact imager;
  • FIG. 5 is a simplified flow diagram of a method according to the invention for protecting a software application from piracy using one smart card for different software applications;
  • FIG. 6 is a simplified flow diagram of a method according to the invention for protecting a software application from piracy using one smart card for different users;
  • FIG. 7a is a simplified flow diagram of a method according to the invention for protecting a software application from piracy using different versions of the software application for different users;
  • FIG.7b is a simplified diagram of a computer network for implementing the method described in FIG. 7a ;
  • FIG. 8 is a simplified flow diagram of a method according to the invention for protecting a software application from piracy storing additional data on the smart card.
  • peripheral to computer functionality such as disk drives including hard disk drives, smart card readers, scanners, keyboards, printers, imaging devices, etc. are referred to as peripheral devices.
  • the invention provides a unique method for distribution of piracy-protected software.
  • the method relies on a peripheral device such as a smart card to unlock software in order to permit execution thereof.
  • the smart card is a credit card sized electronic device comprising memory, a processor and an interface.
  • the processor provides for predetermined and/or flexible execution of software within the smart card.
  • the memory comprises RAM for use during software execution and ROM for long term storage of information.
  • some electrically erasable ROM is provided to allow for reprogramming of the smart card.
  • a smart card is a suitable storage medium for storing data related to an authorised use of a software application. The data are stored in ROM within the smart card and the ROM are only accessible to the software application.
  • each software application is customised to operate with only one unique smart card thereby restricting use of the application to systems in communication with the one unique smart card.
  • the smart card is provided with security such as a password or biometric information verification to prevent theft of the software or unauthorised use thereof.
  • security such as a password or biometric information verification to prevent theft of the software or unauthorised use thereof.
  • biometric information in the form of a fingerprint, retinal scan, palm print, voice print, etc. from a biometric information source in the form of a fingertip, eye, hand, voice, etc. is captured using a biometric information input device in the form of a contact imager, eye scanner, or a microphone.
  • Contact imager as described above, are known in the art of electronic security.
  • a fingerprint is digitised and, using a processor, the digitised fingerprint is characterised.
  • Characterisation of fingerprints is known in the art of fingerprint analysis and, in general involves extracting features in a substantially global reference frame for comparison against template features.
  • the characterised digitised biometric information is registered with stored templates to locate a template that, within a predetermined level of security in the form of a predetermined false acceptance rate, matches the characterised information. When a match is detected, the individual is identified and a corresponding action is performed. Alternatively, when identification is not necessary the individual is authenticated. Some known actions performed based on biometric authentication include system access, unlocking a door, logging access, providing personal information, billing an individual, etc.
  • FIGS. 1a and 1b a simplified diagram of a method to protect a software application from piracy according to the invention is shown.
  • a software provider during packaging customises a software application 20 to a particular smart card 40 .
  • the smart card 40 and the software application 20 are then packaged together for sale.
  • the smart card 40 and the software application 20 within the package function to provide a purchaser with operational software. Absent the smart card 40 , the software application 20 will not function.
  • the software application 20 is installed on a computer 10 to which a smart card reader 30 is connected.
  • the smart card 40 is inserted into the smart card reader 30 in order to validate an authorised use of the software.
  • the validation occurs during start up of the software application 20 or every so often during start up or normal use.
  • the validation merely verifies a presence of the smart card 40 associated with the software application 20 .
  • the user is prompted to insert the correct smart card 40 and software execution is paused until the correct smart card 40 is detected.
  • FIGS. 2a , 2 b and 2 c show a simplified diagram of another method according to the invention.
  • a serial number of a processor 15 for executing the software application 20 is written on a write once ROM of a smart card 40 which is provided together with the software.
  • the authorised use of the software application 20 is validated. The validation verifies a presence of the smart card 40 and the serial number of the processor 15 .
  • Providing secure access to the serial number of a processor is known to those of skill in the art, for example as disclosed in U.S. Pat. No. 5,790,663 issued Aug. 4, 1998 to Lee et al.
  • FIGS. 3a and 3b a preferred embodiment of a method for protecting a software application from piracy according to the invention is shown.
  • the software application 20 is installed on a computer 10 .
  • a smart card reader 50 is connected through a first port 52 via a cable 70 to the computer 10 .
  • a smart card 40 comprising a processor 42 and memory 44 is connected through a second port 54 to the smart card reader 50 .
  • a contact imager 60 is disposed within the housing of the smart card reader 50 .
  • a smart card reader with a built in contact imager for use with a personal computer is available from American Biometric Corporation® under the product name the Biomouse Plus®.
  • the software application 20 requires that data indicative of an authorised use be provided from the smart card 40 .
  • a user Upon receipt of a request for the-data indicative of an authorised use a user is prompted for fingerprint information.
  • the user provides the fingerprint information using the contact imager 60 .
  • the fingerprint information is provided to the smart card 40 .
  • the information is not accessible to the computer 10 .
  • the fingerprint information is compared with fingerprint information stored in the memory 44 of the smart card 40 using the processor 42 . If the comparison result is indicative of an authorised user of the software application, data indicative of the authorised use in the form of a key to unlock the software application is provided to the computer 10 .
  • the received data is validated.
  • Validating the data ensures that only a smart card 40 for use with the software application is used.
  • validation includes decryption of the data using a known decryption key.
  • the method according to the invention is highly advantageous compared to prior art methods from the point of view of a software provider as well as a user. It provides additional security by storing data related to user authorisation such as a password or, preferably, biometric information within a peripheral device for use in enabling and disabling software execution. Use of biometric information is preferred because it is a substantially secure form of user authorisation. Storage of data related to user authorisation enables a software provider to require user registration prior to installation of the software.
  • this method provides a software provider with a substantially secure method to control distribution of a software application and to protect it from piracy. Since a smart card is required to execute the software application, only those who purchase the smart card from the software provider have access to executable copies of the software. At the same time it provides benefits to a user by securing a software application from unauthorised use and additionally securing access to files, for example when the software application is needed to open a file.
  • a processor is disposed within the smart card reader 50 .
  • Fingerprint information is received from the contact imager 60 and compared with fingerprint information transmitted from the smart card 40 using the processor disposed within the smart card reader 50 to produce a comparison result. If the comparison result is indicative of an authorised user of the software application 20 , data indicating an authorised use of the software application are transmitted from the smart card 40 via the smart card reader 50 to the computer 10 .
  • security is further enhanced by encrypting the data indicating an authorised use of the software application 20 with asymmetric encryption using the processor 42 of the smart card 40 prior to the transfer to the computer 10 .
  • Using the processor 42 of the smart card 40 for encryption provides a secure communication link for transferring the data and allows alterations to the encryption key for each data transfer, thus preventing tampering with the data.
  • the smart card reader 30 and the contact imager 60 are included in a computer pointing device such as a mouse.
  • the smart card reader 50 and the contact imager 60 are disposed within a keyboard connected to the computer 10 .
  • the smart card reader 50 is included in a track pad, wherein the pointing device of the track pad is used as a capacitive contact imager to provide fingerprint information.
  • FIG. 4a shows another system for implementing the method according to the invention.
  • a smart card reader 30 is connected to computer 10 .
  • a contact imager 80 is connected to the computer 10 .
  • biometric information received at the contact imager 80 is transferred from the contact imager 80 via the computer 10 to smart card 40 . Transferring the biometric information via the computer 10 enhances the risk of interference by a third party while the data is within the computer 10 .
  • the system shown in FIG. 4b comprises a smart card 45 comprising a capacitive contact imager 46 .
  • the smart card 45 is connected to a computer 10 via a smart card reader 30 .
  • the biometric information is captured and compared absent provision of the biometric data to the computer.
  • a major drawback of this system is the high cost manufacturing a capacitive contact imager, thus making the smart card expensive.
  • FIG. 5 shows another embodiment of a method according to the invention, wherein one smart card is used for securing a plurality of software applications.
  • data related to the software application and biometric information relating to a user of the software are provided to a smart card along with a request for data indicative of an authorised use of the software application.
  • the biometric information is compared with biometric information stored within the smart card. If the comparison is indicative of an authorised user of the software application, data indicating an authorised use of the software application is selected based on the data provided to the smart card from a plurality of data indicating an authorised use for different software applications.
  • This method enables a user to execute several software applications of a same software provider using only one smart card. It is highly advantageous for simultaneous execution of several software applications.Simultaneous execution of applications is supported by many common computer operating systems.
  • FIG. 6 a method according to the invention is shown, wherein biometric information of a plurality of users is stored on one smart card.
  • the method is similar to those set out above except that upon receipt of the biometric information, it is compared with the stored biometric information of the plurality of users. If the biometric information is indicative of an authorised user of the software application from the plurality of authorised users, data indicating an authorised use are provided to the computer.
  • This method is highly advantageous when a plurality of users have access to a same computer, for example employees working at a same computer at different times during a day or system administrators in a corporation who wish to have access to all applications on all computers.
  • a same smart card is left inserted in a smart card reader connected to the computer permitting execution of the software application to authorised employees.
  • FIG. 7a shows yet another embodiment of a method according to the invention.
  • Different versions of a software application require different data indicating an authorised use of the software application.
  • Each user is provided with a smart card having data indicative of an authorised use stored in memory.
  • the data relates to a specific version of the software application.
  • data indicating an authorised use is provided by a user of the software.
  • the data is in the form of biometric information of the user.
  • data indicating an authorised use is provided to a computer in execution of the software application.
  • the data once received is used to determine a version of the software application for execution. Alternatively, if the provided data do not indicate an authorised use of a current version of the software application further execution of the version is disabled.
  • FIG. 7b a simplified diagram of a computer network 700 is shown.
  • a plurality of workstations 704 each comprising a personal computer, are connected by cables 706 to a server 702 .
  • the workstations 704 are computer systems for use by users.
  • the server 702 is for providing central file storage, network applications, and more powerful processors for processor intensive tasks. Some common network applications include email, Intranet, employee phone list, etc. Other network peripherals comprise printers, scanners, etc. (not shown).
  • a system administrator maintains the computer network and authorises individual users thereof. Networks are well known in the art of computer systems and computer network architectures. They are installed in many businesses world-wide.
  • the method shown in FIG. 7a is highly advantageous for use with a computer network.
  • Different versions of a software application 720 are stored on the server 702 .
  • a user is permitted to use a predetermined version of the software.
  • data indicative of an authorised use of a particular version are provided from the workstation 704 to the server 702 .
  • the indicated version is selected and provided to the workstation 704 for execution.
  • the indicated version of the application is executed on the server 702 .
  • provision of data indicating an authorised use of the version is required and execution of the software application is interrupted when not provided. Therefore, according to this embodiment limited use of a software application according to employee work profile is permitted.
  • additional data comprising time varying data, are stored in the form of an indication of a maximum number of executions of a software application and a number indicating a current count of performed executions.
  • the two numbers are compared and if the number of performed executions is equal to the maximum number of executions further execution of the software application is disabled.
  • This method allows a software provider to rent a software application.
  • a user renting a software application is provided with the software and a smart card.
  • the smart card comprises data indicating the maximum number of executions.
  • the software provider sends a new smart card or transfers a file to be stored on the smart card.
  • the software is rented for a time period.
  • a time signal provided by a processor in execution of the software application is compared with time data stored in memory.
  • the time data is provided by a timing circuit within the smart card in order to prevent clock tampering.
  • some of the additional data and some commands for execution on a processor are programmable by an authorised user.
  • a system administrator programs smart cards for use by employees of a company with a time limitation in order to prevent the employees from using the software application outside their work hours.
  • prompting a user is realised in different ways depending on design criteria.
  • One embodiment is to prompt the user for biometric information only during the installation of the software and to require a presence of a smart card during execution.
  • This embodiment protects a software application from piracy and increases user convenience by prompting only once for biometric information but it allows execution of the software application to any user in possession of the smart card.
  • Other methods include prompting a user for biometric information at the start-up of the software application and/or during the execution of the software application. Prompting during the execution of the software application is performed according to one of the following methods: one prompt at the beginning of software execution, several prompts at intervals during the use of the software application, and after breaks in use of the software application.
  • Prompting the user several times during execution of a software application creates user inconvenience but may be desirable, for example in computer networks, to prevent unauthorised use of a software application on a workstation within the network.
  • biometric data collection i.e. the user is identified by collecting biometric information such as voice recognition, facial recognition, keystroke intervals etc., avoids the inconvenience of a plurality of pauses in software application execution and prompts during the pauses which increase user convenience.
  • a user sends biometric information to a software provider.
  • the software provider then customises the software application by packaging the biometric information in a smart card and sends the software application together with the smart card to the user.
  • the software application is executed only in presence of the smart card and the biometric information provided by the user.
  • a software provider sells the software application together with a smart card, the smart card comprising write once ROM.
  • the user is prompted to store the biometric information in the smart card before completing same.
  • the smart card comprises rewritable ROM
  • the software application is transferable. It is evident to those of skill in the art, that because the smart card is needed to execute the software application, a number of executable copies of a software application is effectively limited to a number of interworking smart cards.
  • a software provider distributes a software application together with a smart card for a trial period and provides a user after registration with a registration file which is stored in the smart card.

Abstract

A method and a system for disabling execution of a software application stored within a computer absent data indicative of an authorized use of the software application are disclosed. At start up or during execution of a software application a user is prompted for user authorization information. Using a processor within a smart card the received user authorization information is compared with user authorization information stored in memory of the smart card to produce a comparison result. If the comparison result is indicative of an authorized user of the software application, then data indicative of the authorized use of the software application is provided from the smart card to the computer. Upon receipt of the data indicative of the authorized use of the software application execution of the software application is continued. When the data is not data indicative of the authorized use of the software application further execution of the software application is disabled. For example, biometric information in the form of a fingerprint may be used for user authorization.

Description

FIELD OF THE INVENTION
This invention relates generally to a method for disabling execution of a software application stored within a computer absent data indicative of an authorised use of the software application and more particularly relates to a method for disabling execution of a software application using a smart card.
BACKGROUND OF THE INVENTION
Software piracy is causing huge losses in profits for companies developing and selling computer software. The sale and distribution of software designed for general use is based on the assumption that a software provider only wishes to sell a right to use the software to one person or to a select group of people. The seller specifically does not wish the purchaser to distribute the software to other users or to resell the software. Various methods are employed to prevent the purchaser from distributing the software. The most common method of software distribution is via a storage medium. The user is often unrestricted from either copying the software from this storage medium to another one or installing the software from a same storage medium on different computers. This results in undesirable software piracy.
In the past, piracy protection schemes were implemented to prevent a purchaser from making a back up copy of a software application. When a storage medium, such as a floppy disk, that is copy protected becomes damaged, the software provider must replace the storage medium. Some software providers have included a backup copy of the software application along with the original copy to lessen inconvenience when the original copy is damaged, but sometimes even these “backup” copies fail.
Some software providers have avoided software copy protection schemes. Instead these software providers rely on the honesty of the purchaser, the fact that the documentation is difficult to duplicate, and/or a license agreement that the purchaser is expected to honour. The license agreement makes it illicit to distribute the software. Many software providers view convenience as essential for software users and therefore are wary of software piracy protection methods that inconvenience users in any way.
Another method of software protection involves writing to an installation disk to indicate that installation has occurred. This limits a disk to one use. This has many of the aforementioned drawbacks and also is unworkable with CD ROM technology. Using CD ROM technology, a software provider writes a program and other information to a CD ROM which can be written to only once using special hardware for that purpose. Therefore, adding information to a CD ROM during installation is not possible.
With the increasing use of digital communications such as the Internet, computer software is now commonly distributed using these means. In this case, the aforementioned methods of preventing undesired proliferation of pirated software can not be applied; users require some form of backup and this backup is easily distributed to other users. Also, interception of software by unauthorised third parties is a significant risk to software providers.
Computer security is fast becoming an important issue. With the proliferation of computers and computer networks into all aspects of business and daily life—financial, medical, education, government, and communications—the concern over secure file access is growing. Using passwords is a common method of providing security. Password protection is employed for computer network security, automatic teller machines, telephone banking, calling cards, and telephone answering services. These systems generally require knowledge of an entry code that has been selected by a user or has been configured in advance. Examples of commonly used security codes for preventing software piracy include information from a user's manual and a serial number. Unfortunately for use in copy protection, security codes are unworkable since the software is easily transferred with the security code.
A security access system that provides substantially secure access and does not require a password or access code is a biometric identification system. A biometric identification system accepts unique biometric information from a user and identifies the user by matching the information against information belonging to registered users of the system. One such biometric identification system is a fingerprint recognition system.
The use of a biometric imaging device with a personal computer is becoming widespread. In a fingerprint input transducer or sensor, the finger under investigation is usually pressed against a flat surface, such as a side of a glass plate; the ridge and valley pattern of the finger tip is sensed by a sensing means such as an interrogating light beam. Various optical devices are known which employ prisms upon which a finger whose print is to be identified is placed. The prism has a first surface, a platen, upon which a finger is placed, a second surface disposed at an acute angle to the first surface through which the fingerprint is viewed and a third illumination surface through which light is directed into the prism. In some cases, the illumination surface is at an acute angle to the first surface, as seen for example, in U.S. Pat. Nos. 5,187,482 and 5,187,748. In other cases, the illumination surface is parallel to the first surface, as seen for example, in U.S. Pat. Nos. 5,109,427 and 5,233,404. Fingerprint identification devices of this nature are generally used to control the building-access or information-access of individuals to buildings, rooms, and devices such as computer terminals.
U.S. Pat. No. 4,353,056 in the name of Tsikos issued Oct. 5, 1982, discloses an alternative kind of fingerprint sensor that uses a capacitive sensing approach. The described sensor has a two dimensional, row and column, array of capacitors, each comprising a pair of spaced electrodes, carried in a sensing member and covered by an insulating film. The sensors rely upon deformation to the sensing member caused by a finger being placed thereon so as to vary locally the spacing between capacitor electrodes, according to the ridge/trough pattern of the fingerprint, and hence, the capacitance of the capacitors. In one arrangement, the capacitors of each column are connected in series with the columns of capacitors connected in parallel and a voltage is applied across the columns. In another arrangement, a voltage is applied to each individual capacitor in the array. Sensing in the respective two arrangements is accomplished by detecting the change of voltage distribution in the series connected capacitors or by measuring the voltage values of the individual capacitances resulting from local deformation. To achieve this, an individual connection is required from the detection circuit to each capacitor.
Before the advent of computers and imaging devices, research was conducted into fingerprint characterisation and identification. Today, much of the research focus in biometrics has been directed toward improving the input transducer and the quality of the biometric input data. Fingerprint characterisation is well known and can involve many aspects of fingerprint analysis. The analysis of fingerprints is discussed in the following references, which are hereby incorporated by reference:
  • Xiao Qinghan and Bian Zhaoqi,: An approach to Fingerprint Identification By Using the Attributes of Feature Lines of Fingerprint,” IEEE Pattern Recognition, pp 663, 1986; C. B. Shelman, “Fingerprint Classification—Theory and Application,” Proc. 76 Carnahan Conference on Electronic Crime Countermeasures, 1976;
  • Feri Pernus, Stanko Kovacic, and Ludvik Gyergyek, “Minutaie Based Fingerprint Registration,” IEEE Pattern Recognition, pp 1380, 1980;
  • J. A. Ratkovic, F. W. Blackwell, and H. H. Bailey, “Concepts for a Next Generation Automated Fingerprint System,” Proc. 78 Carnahan Conference on Electronic Crime Countermeasures, 1978;
  • K. Millard, “An approach to the Automatic Retrieval of Latent Fingerprints,” Proc. 75 Carnahan Conference on Electronic Crime Countermeasures, 1975;
  • Moayer and K. S. Fu, “A Syntactic Approach to Fingerprint Pattern Recognition,” Memo Np. 73-18, Purdue University, School of Electrical Engineering, 1973;
  • Wegstein, An Automated Fingerprint Identification System, NBS special publication, U.S. Department of Commerce/National Bureau of Standards, ISSN 0083-1883; no. 500-89, 1982;
  • Moenssens, Andre A., Fingerprint Techniques, Chilton Book Co., 1971; and, Wegstein and J. F. Rafferty, The LX39 Latent Fingerprint Matcher, NBS special publication, U.S. Department of Commerce/National Bureau of Standards; no. 500-36, 1978.
OBJECT OF THE INVENTION
It is an object of this invention to disable execution of a software application stored within a computer absent data indicative of an authorised use of the software application using a smart card.
STATEMENT OF THE INVENTION
In accordance with the invention there is provided a method for protecting a software application from piracy comprising the steps of:
  • providing data indicative of an authorised use of the software application;
  • executing a first portion of the software application;
  • receiving user authorisation information;
  • using a processor within a peripheral device, comparing the received user authorisation information with user authorisation information stored in memory of the peripheral device to produce a comparison result and, if the comparison result is indicative of the authorised user of the software application, providing data from the peripheral device to the computer, the data indicative of the authorised use of the software application on the computer; and,
  • executing a second portion of the software application only upon receipt of the data indicative of the authorised use of the software application.
In accordance with the invention there is also provided a method for protecting a software application from piracy comprising the steps of:
  • providing data indicative of an authorised use of the software application;
  • executing a first portion of the software application using a first processor;
  • receiving user authorisation information from an input device disposed within a first housing;
  • transmitting the user authorisation information to a second processor within a second housing, the second housing comprising memory, wherein the user authorisation information is unavailable to the first processor; using the second processor, comparing the received user authorisation information with user authorisation information stored in memory to produce a comparison result and, if the comparison result is indicative of the authorised user of the software application, providing data from the second processor to the first processor, the data indicative of the authorised use of the software application on the first processor; and,
  • executing a second portion of the software application only upon receipt of the data indicative of the authorised use of the software application.
In accordance with another aspect of the invention there is provided a system for protecting a software application from piracy comprising:
  • a software application for execution on a computer, the software application including executable commands for preventing execution of a portion of the software application absent data indicative of an authorised use of the software application; and
  • a peripheral device including:
  • a housing;
  • a port for interfacing the peripheral device to the computer; memory within the housing, the memory for storing user authorisation information indicative of an authorised user of the software application; and,
  • a processor within the housing for receiving authorisation information provided by a user, for comparing received authorisation information with the user authorisation information stored in the memory to produce a comparison result and, if the comparison result is indicative of an authorised user of the software application, providing data from the device to the computer, the data indicative of an authorised use of the software application on the computer,
  • wherein the software application execution is at least partially prevented until the data indicative of the authorised use of the software application is received.
Preferably the peripheral device comprises a smart card reader and a smart card. More preferably, the peripheral device also comprises a biometric sensor in the form of a fingerprint imager.
BRIEF DESCRIPTION OF THE DRAWINGS
An exemplary embodiment of the invention will now be described in conjunction with the attached drawings, in which:
FIG. 1a is a simplified diagram of a system according to the invention for protecting a software application from piracy using a smart card;
FIG. 1b is a simplified flow diagram of a method according to the invention for protecting a software application from piracy using the system described in FIG. 1a;
FIG. 2a is a simplified diagram of a system according to the invention for protecting a software application from piracy storing a serial number of a processor memory of a smart card;
FIG. 2b is a simplified flow diagram of an installation of a software application using the system described in FIG. 2a;
FIG. 2c is a simplified flow diagram of an execution of a software application using the system described in FIG. 2a;
FIG. 3a is a simplified diagram of a preferred embodiment of a system according to the invention for protecting a software application from piracy comprising a smart card reader with a contact imager disposed therein;
FIG. 3b is a simplified flow diagram of a method according to the invention for protecting a software application from piracy using the system described in FIG. 3a;
FIG: 4a is a simplified diagram of a system according to the invention for protecting a software application from piracy comprising a smart card reader and a contact imager connected to a computer;
FIG. 4b is a simplified diagram of a system according to the invention for protecting a software application from piracy comprising a smart card with a contact imager;
FIG. 5 is a simplified flow diagram of a method according to the invention for protecting a software application from piracy using one smart card for different software applications;
FIG. 6 is a simplified flow diagram of a method according to the invention for protecting a software application from piracy using one smart card for different users;
FIG. 7a is a simplified flow diagram of a method according to the invention for protecting a software application from piracy using different versions of the software application for different users;
FIG.7b is a simplified diagram of a computer network for implementing the method described in FIG. 7a; and,
FIG. 8 is a simplified flow diagram of a method according to the invention for protecting a software application from piracy storing additional data on the smart card.
DETAILED DESCRIPTION
With the advent of personal computers, software piracy—copying software in which copyright exists—proliferated. With the implementation of graphical user interfaces, copying software has become a matter of dragging files from an original diskette to a blank diskette. In fact, software piracy is so prolific that it is estimated that more than one half of software in use today is pirated. Obviously, it is in the best interests of software providers to reduce software piracy.
In the specification and claims that follow all items peripheral to computer functionality such as disk drives including hard disk drives, smart card readers, scanners, keyboards, printers, imaging devices, etc. are referred to as peripheral devices.
The invention provides a unique method for distribution of piracy-protected software. The method relies on a peripheral device such as a smart card to unlock software in order to permit execution thereof. The smart card is a credit card sized electronic device comprising memory, a processor and an interface. The processor provides for predetermined and/or flexible execution of software within the smart card. The memory comprises RAM for use during software execution and ROM for long term storage of information. Preferably, some electrically erasable ROM is provided to allow for reprogramming of the smart card. A smart card is a suitable storage medium for storing data related to an authorised use of a software application. The data are stored in ROM within the smart card and the ROM are only accessible to the software application. Such a smart card is immutable and therefore, prevents software piracy. As such, only an individual with the smart card for a particular software package may execute the software. In an embodiment, each software application is customised to operate with only one unique smart card thereby restricting use of the application to systems in communication with the one unique smart card.
In a further embodiment, the smart card is provided with security such as a password or biometric information verification to prevent theft of the software or unauthorised use thereof. Though the method according to the invention is described with reference to fingerprint registration, it is applicable to other biometric information and methods of user authentication using that biometric information. An individual's biometric information in the form of a fingerprint, retinal scan, palm print, voice print, etc. from a biometric information source in the form of a fingertip, eye, hand, voice, etc. is captured using a biometric information input device in the form of a contact imager, eye scanner, or a microphone. Contact imager, as described above, are known in the art of electronic security. Using a contact imager, a fingerprint is digitised and, using a processor, the digitised fingerprint is characterised. Characterisation of fingerprints is known in the art of fingerprint analysis and, in general involves extracting features in a substantially global reference frame for comparison against template features.
The characterised digitised biometric information is registered with stored templates to locate a template that, within a predetermined level of security in the form of a predetermined false acceptance rate, matches the characterised information. When a match is detected, the individual is identified and a corresponding action is performed. Alternatively, when identification is not necessary the individual is authenticated. Some known actions performed based on biometric authentication include system access, unlocking a door, logging access, providing personal information, billing an individual, etc. Referring to FIGS. 1a and 1b, a simplified diagram of a method to protect a software application from piracy according to the invention is shown. A software provider during packaging customises a software application 20 to a particular smart card 40. The smart card 40 and the software application 20 are then packaged together for sale. The smart card 40 and the software application 20 within the package function to provide a purchaser with operational software. Absent the smart card 40, the software application 20 will not function.
Such a software package is not easily pirated. Either the software instructions requiring the presence of the smart card are removed, or the smart card is duplicated. Neither of these is easily accomplished. Therefore, simple drag and drop piracy is prevented greatly reducing the amount of piracy. Further, pirated copies are more easily detected for enforcement of copyright in software.
The software application 20 is installed on a computer 10 to which a smart card reader 30 is connected. In order to execute the software application 20 the smart card 40 is inserted into the smart card reader 30 in order to validate an authorised use of the software. The validation occurs during start up of the software application 20 or every so often during start up or normal use. The validation merely verifies a presence of the smart card 40 associated with the software application 20. When the correct smart card 40 is not present, the user is prompted to insert the correct smart card 40 and software execution is paused until the correct smart card 40 is detected.
FIGS. 2a, 2b and 2c show a simplified diagram of another method according to the invention. During installation of a software application 20 a serial number of a processor 15 for executing the software application 20 is written on a write once ROM of a smart card 40 which is provided together with the software. During an initialisation of the software application 20 or at intervals during execution of the software application 20 the authorised use of the software application 20 is validated. The validation verifies a presence of the smart card 40 and the serial number of the processor 15. Providing secure access to the serial number of a processor is known to those of skill in the art, for example as disclosed in U.S. Pat. No. 5,790,663 issued Aug. 4, 1998 to Lee et al. Writing a serial number of a processor on a write once ROM of a smart card limits the execution of a software application to one processor. In case a user wants to resell the software application or wants to change the processor for executing the software application he would contact a software provider for a new smart card. Therefore, this method provides a software provider with the ability to control distribution of a software application by limiting the execution of the software application to one processor, while allowing a user to resell software or change the processor on which the software is executed. The difficulties involved in removing instructions requiring a presence of the smart card or the inherent difficulties of copying the smart card substantially prevent piracy of the software application. Writing a serial number of a processor into a software application upon installation is disclosed in U.S. Pat. No. 5,790,663. Unfortunately, this still allows copying and distribution of a software application prior to installation because the piracy protection—the serial number—is yet to be stored within the application.
Referring to FIGS. 3a and 3b, a preferred embodiment of a method for protecting a software application from piracy according to the invention is shown. The software application 20 is installed on a computer 10. A smart card reader 50 is connected through a first port 52 via a cable 70 to the computer 10. A smart card 40 comprising a processor 42 and memory 44 is connected through a second port 54 to the smart card reader 50. Furthermore, a contact imager 60 is disposed within the housing of the smart card reader 50. For example, a smart card reader with a built in contact imager for use with a personal computer is available from American Biometric Corporation® under the product name the Biomouse Plus®. During execution, the software application 20 requires that data indicative of an authorised use be provided from the smart card 40. Upon receipt of a request for the-data indicative of an authorised use a user is prompted for fingerprint information. The user provides the fingerprint information using the contact imager 60. The fingerprint information is provided to the smart card 40. Preferably, the information is not accessible to the computer 10. The fingerprint information is compared with fingerprint information stored in the memory 44 of the smart card 40 using the processor 42. If the comparison result is indicative of an authorised user of the software application, data indicative of the authorised use in the form of a key to unlock the software application is provided to the computer 10. Using a processor 15 of the computer, the received data is validated. Validating the data ensures that only a smart card 40 for use with the software application is used. Optionally, validation includes decryption of the data using a known decryption key. The method according to the invention is highly advantageous compared to prior art methods from the point of view of a software provider as well as a user. It provides additional security by storing data related to user authorisation such as a password or, preferably, biometric information within a peripheral device for use in enabling and disabling software execution. Use of biometric information is preferred because it is a substantially secure form of user authorisation. Storage of data related to user authorisation enables a software provider to require user registration prior to installation of the software. Therefore, this method provides a software provider with a substantially secure method to control distribution of a software application and to protect it from piracy. Since a smart card is required to execute the software application, only those who purchase the smart card from the software provider have access to executable copies of the software. At the same time it provides benefits to a user by securing a software application from unauthorised use and additionally securing access to files, for example when the software application is needed to open a file.
Optionally, a processor is disposed within the smart card reader 50. Fingerprint information is received from the contact imager 60 and compared with fingerprint information transmitted from the smart card 40 using the processor disposed within the smart card reader 50 to produce a comparison result. If the comparison result is indicative of an authorised user of the software application 20, data indicating an authorised use of the software application are transmitted from the smart card 40 via the smart card reader 50 to the computer 10.
Alternatively, security is further enhanced by encrypting the data indicating an authorised use of the software application 20 with asymmetric encryption using the processor 42 of the smart card 40 prior to the transfer to the computer 10. Using the processor 42 of the smart card 40 for encryption provides a secure communication link for transferring the data and allows alterations to the encryption key for each data transfer, thus preventing tampering with the data.
In another embodiment according to the invention the smart card reader 30 and the contact imager 60 are included in a computer pointing device such as a mouse.
Optionally, the smart card reader 50 and the contact imager 60 are disposed within a keyboard connected to the computer 10.
Further optionally, the smart card reader 50 is included in a track pad, wherein the pointing device of the track pad is used as a capacitive contact imager to provide fingerprint information.
FIG. 4a shows another system for implementing the method according to the invention. A smart card reader 30 is connected to computer 10. Furthermore, a contact imager 80 is connected to the computer 10. Using this system for implementing a method according to the invention, biometric information received at the contact imager 80 is transferred from the contact imager 80 via the computer 10 to smart card 40. Transferring the biometric information via the computer 10 enhances the risk of interference by a third party while the data is within the computer 10.
The system shown in FIG. 4b comprises a smart card 45 comprising a capacitive contact imager 46. The smart card 45 is connected to a computer 10 via a smart card reader 30. The biometric information is captured and compared absent provision of the biometric data to the computer. A major drawback of this system is the high cost manufacturing a capacitive contact imager, thus making the smart card expensive.
FIG. 5 shows another embodiment of a method according to the invention, wherein one smart card is used for securing a plurality of software applications. During execution of a software application, data related to the software application and biometric information relating to a user of the software are provided to a smart card along with a request for data indicative of an authorised use of the software application. After receipt of the request, the biometric information and the data, the biometric information is compared with biometric information stored within the smart card. If the comparison is indicative of an authorised user of the software application, data indicating an authorised use of the software application is selected based on the data provided to the smart card from a plurality of data indicating an authorised use for different software applications. This method enables a user to execute several software applications of a same software provider using only one smart card. It is highly advantageous for simultaneous execution of several software applications.Simultaneous execution of applications is supported by many common computer operating systems.
In FIG. 6 a method according to the invention is shown, wherein biometric information of a plurality of users is stored on one smart card. The method is similar to those set out above except that upon receipt of the biometric information, it is compared with the stored biometric information of the plurality of users. If the biometric information is indicative of an authorised user of the software application from the plurality of authorised users, data indicating an authorised use are provided to the computer. This method is highly advantageous when a plurality of users have access to a same computer, for example employees working at a same computer at different times during a day or system administrators in a corporation who wish to have access to all applications on all computers. A same smart card is left inserted in a smart card reader connected to the computer permitting execution of the software application to authorised employees.
FIG. 7a shows yet another embodiment of a method according to the invention. Different versions of a software application require different data indicating an authorised use of the software application. Each user is provided with a smart card having data indicative of an authorised use stored in memory. The data relates to a specific version of the software application. At start up and at intervals during execution of the software application, data indicating an authorised use is provided by a user of the software. The data is in the form of biometric information of the user. After receipt and comparison of the biometric information, data indicating an authorised use is provided to a computer in execution of the software application. The data, once received is used to determine a version of the software application for execution. Alternatively, if the provided data do not indicate an authorised use of a current version of the software application further execution of the version is disabled.
Referring to FIG. 7b, a simplified diagram of a computer network 700 is shown. A plurality of workstations 704, each comprising a personal computer, are connected by cables 706 to a server 702. The workstations 704 are computer systems for use by users. The server 702 is for providing central file storage, network applications, and more powerful processors for processor intensive tasks. Some common network applications include email, Intranet, employee phone list, etc. Other network peripherals comprise printers, scanners, etc. (not shown). A system administrator maintains the computer network and authorises individual users thereof. Networks are well known in the art of computer systems and computer network architectures. They are installed in many businesses world-wide.
The method shown in FIG. 7a is highly advantageous for use with a computer network. Different versions of a software application 720 are stored on the server 702. A user is permitted to use a predetermined version of the software. During start up of the software application, data indicative of an authorised use of a particular version are provided from the workstation 704 to the server 702. According to the provided data the indicated version is selected and provided to the workstation 704 for execution. Alternatively, the indicated version of the application is executed on the server 702. At intervals during execution of the software application, provision of data indicating an authorised use of the version is required and execution of the software application is interrupted when not provided. Therefore, according to this embodiment limited use of a software application according to employee work profile is permitted. In another embodiment of a method according to the invention shown in FIG. 8 additional data, comprising time varying data, are stored in the form of an indication of a maximum number of executions of a software application and a number indicating a current count of performed executions. At start up the two numbers are compared and if the number of performed executions is equal to the maximum number of executions further execution of the software application is disabled. This method allows a software provider to rent a software application. A user renting a software application is provided with the software and a smart card. The smart card comprises data indicating the maximum number of executions. If the maximum number is reached and the user wants to continue renting the software application the software provider sends a new smart card or transfers a file to be stored on the smart card.-Alternatively, the software is rented for a time period. In this case a time signal provided by a processor in execution of the software application is compared with time data stored in memory. Of course, it is preferred that the time data is provided by a timing circuit within the smart card in order to prevent clock tampering.
Alternatively, some of the additional data and some commands for execution on a processor are programmable by an authorised user. For example, a system administrator programs smart cards for use by employees of a company with a time limitation in order to prevent the employees from using the software application outside their work hours.
It is evident to those of skill in the art that prompting a user is realised in different ways depending on design criteria. One embodiment is to prompt the user for biometric information only during the installation of the software and to require a presence of a smart card during execution. This embodiment protects a software application from piracy and increases user convenience by prompting only once for biometric information but it allows execution of the software application to any user in possession of the smart card. Other methods include prompting a user for biometric information at the start-up of the software application and/or during the execution of the software application. Prompting during the execution of the software application is performed according to one of the following methods: one prompt at the beginning of software execution, several prompts at intervals during the use of the software application, and after breaks in use of the software application. Prompting the user several times during execution of a software application creates user inconvenience but may be desirable, for example in computer networks, to prevent unauthorised use of a software application on a workstation within the network. When user authorisation information in the form of biometric information is to be provided frequently, transparent biometric data collection, i.e. the user is identified by collecting biometric information such as voice recognition, facial recognition, keystroke intervals etc., avoids the inconvenience of a plurality of pauses in software application execution and prompts during the pauses which increase user convenience.
As is evident to those of skill in the art, there are numerous methods to distribute a piracy protected software application according to the invention. For example a user sends biometric information to a software provider. The software provider then customises the software application by packaging the biometric information in a smart card and sends the software application together with the smart card to the user. The software application is executed only in presence of the smart card and the biometric information provided by the user. In another method a software provider sells the software application together with a smart card, the smart card comprising write once ROM. Upon installation, the user is prompted to store the biometric information in the smart card before completing same. Of course, when the smart card comprises rewritable ROM, the software application is transferable. It is evident to those of skill in the art, that because the smart card is needed to execute the software application, a number of executable copies of a software application is effectively limited to a number of interworking smart cards.
Alternatively, a software provider distributes a software application together with a smart card for a trial period and provides a user after registration with a registration file which is stored in the smart card.
Numerous other embodiments may be envisaged without departing from the spirit and scope of the invention.

Claims (44)

1. A method for protecting a software application from piracy, comprising the steps of:
providingstoring data indicative of an authorised use of the software application;
executing a first portion of the software application;
receiving user authorisation information;
using a processor within a peripheral device, comparing the received user authorisation information with user authorisation information stored in memory of the peripheral device to produce a comparison result and, if the comparison result is indicative of the authorised user of the software application, providing data from the peripheral device to the computer, the data indicative of the authorised use of the software application on the computer;
executing a second portion of the software application only upon receipt of the data indicative of the authorised use of the software application;
transmitting data related to the software application to the peripheral device; and, comparing the received data with data stored in memory of the peripheral device using the processor of the peripheral device;
and wherein the step of providing data from the peripheral device comprises the step of:
selecting the data indicative of the authorised use of the software application on the computer according to the data related to the software application, the data selected from a plurality of instances of data, each instance of data indicative of the authorised use of a different software application.
2. A method for protecting a software application from piracy, comprising the steps of:
providingstoring data indicative of an authorised use of the software application;
executing a first portion of the software application;
receiving user authorisation information;
using a processor within a peripheral device, comparing the received user authorisation information with user authorisation information stored in memory of the peripheral device to produce a comparison result and, if the comparison result is indicative of the authorised user of the software application, providing data from the peripheral device to the computer, the data being indicative of the authorised use of the software application on the computer;
executing a second portion of the software application only upon receipt of the data indicative of the authorised use of the software application;
wherein the step of comparing the received user authorisation information with the user authorisation information stored in memory of the peripheral device to produce a comparison result comprises the step of:
comparing the provided user authorisation information with a plurality of instances of user authorisation information stored in memory.
3. A method for protecting a software application from piracy as defined in The method of claim 2, wherein the step of providing data from the peripheral device further comprises the step of:
selecting data indicative of the authorised use of the software application from a plurality of instances of data, the selection based on the user authorisation information provided.
4. A method for protecting a software application from piracy as defined in The method of claim 3, further comprising the step of:
selecting a version of the software application based on the data indicative of the authorised use of the software application received from the peripheral device.
5. A method for protecting a software application from piracy, comprising the steps of:
providingstoring data indicative of an authorised use of the software application;
executing a first portion of the software application;
receiving user authorisation information;
using a processor within a peripheral device, comparing the received user authorisation information with user authorisation information stored in memory of the peripheral device to produce a comparison result and, if the comparison result is indicative of the authorised user of the software application, providing data from the peripheral device to the computer, the data being indicative of the authorised use of the software application on the computer;
executing a second portion of the software application only upon receipt of the data indicative of the authorised use of the software application;
storing a first instance of data in memory of the peripheral device;
storing a second instance of data in memory of the peripheral device; and,
using the processor of the peripheral device, comparing the second instance of data with the first instance of data to produce a comparison result, and if the comparison result is indicative of an authorised use of the software application, providing data indicative of the authorised use of the software application and calculateing a new second instance of data to replace the second instance of data.
6. The method of claim 5 wherein the providing data from the peripheral device comprises selecting data indicative of the authorized use of the software application from a plurality of instances of data, the selection based on the user authorisation information provided.
7. The method of claim 6, further comprising selecting a version of the software application based on the data indicative of the authorized use of the software application received from the peripheral device.
8. The method of claim 1, further comprising selecting a version of the software application based on the data indicative of the authorized use of the software application received from the peripheral device.
9. A system for protecting a software application from piracy comprising:
a computer including a processor configured to unlock and execute a locked software application and an input device configured to accept user authorization information indicative of an authorized use of the software application; and
a peripheral device including a memory and a processor, the peripheral device being configured to receive the user authorisation information and the processor being configured to compare the received user authorization information with user authorization information stored in the memory to produce a comparison result and, if the comparison result is indicative of the authorized user of the software application, the peripheral device is configured to provide data to the computer, the data being indicative of the authorized use of the software application on the computer;
wherein the computer is configured to unlock the software application for execution upon receipt of the data indicative of the authorized use of the software application.
10. The system of claim 9 wherein the peripheral device comprises a smart card and the software application is configured to operate with a single smart card.
11. The system of claim 10 wherein the memory of the peripheral device includes a serial number of a processor authorized to execute the software application and the computer is configured to unlock the software application only if the serial number in the memory of the peripheral device matches the serial number of the processor of the computer.
12. The system of claim 9 wherein the peripheral device comprises a smart card that is secured with a password or biometric information and may not be accessed unless the computer provides a password or biometric information identifying the user.
13. The system of claim 9 wherein the peripheral device comprises a smart card, and wherein the computer is configured to periodically check for the presence of the smart card and to pause execution of the software until the smart card is detected and the data indicative of the authorized use of the software application is received.
14. The system of claim 9, further comprising a contact imager for scanning a fingerprint of a user, the contact imager providing biometric data representative of the user's fingerprint to the peripheral device for comparison with biometric data stored in the memory of the peripheral device, wherein the data indicative of the authorized use of the software application is provided to the computer if the user's biometric data matches the biometric data stored in the memory of the peripheral device.
15. The system of claim 9 wherein the software application is encrypted and the data indicative of the authorized use of the software application comprises a decryption key for decrypting the encrypted software application.
16. The system of claim 9 wherein the peripheral device comprises a smart card containing biometric data of a user authorized to execute the software application stored in the memory of the smart card, and wherein the system further comprises:
a smart card reader comprising a memory including biometric data of the user of the computer and a processor configured to compare the biometric data from the smart card to biometric data stored in the memory of the smart card reader, wherein the data indicative of the authorized use of the software application is provided to the computer if the biometric data stored in the memory of the smart card reader matches the biometric data stored in the memory of the smart card.
17. The system of claim 9 wherein the data indicative of the authorized use of the software application is encrypted by the peripheral device using asymmetric encryption prior to transfer to the computer.
18. The system of claim 9 wherein the peripheral device comprises a smart card, and wherein the system further comprises a computer pointing device including a smart card reader and a contact imager.
19. The system of claim 9 wherein the peripheral device comprises a smart card and the input device comprises a keyboard including a smart card reader and a contact imager.
20. The system of claim 9 wherein the peripheral device comprises a smart card, and wherein the system further comprises a track pad having a pointing device including a capacitive contact imager to provide fingerprint information.
21. The system of claim 9 wherein the peripheral device comprises a smart card having a capacitive contact imager.
22. The system of claim 9 wherein the memory of the peripheral device includes user authorization information of a plurality of users, and wherein the data indicative of the authorized use of the software application is provided to the computer if the received user authorization information matches the user authorization information of at least one of the plurality of users.
23. The system of claim 9 wherein the memory of the peripheral device includes user authorization information relating to a specific version of the software application, and wherein the data indicative of the authorized use of the software application indicates which version of the software application the computer is authorized to unlock for execution.
24. The system of claim 23 wherein the computer comprises a server, and wherein the memory of the server includes different versions of the software application.
25. The system of claim 9 wherein during execution of the unlocked software application the computer periodically requests the input of user authorization information for continued execution of the software application.
26. The system of claim 9 wherein the peripheral device comprises a smart card, and wherein the memory of the smart card comprises data indicating a maximum number of executions of the software application permitted by the computer, and further wherein a number indicating a current count of the executions of the software application is compared to the maximum number of executions of the software application permitted by the computer and further execution of the software application is disabled if the number equals the maximum number.
27. The system of claim 9 wherein the peripheral device comprises a smart card, and wherein the memory of the smart card comprises data indicating a time period for which execution of the software application by the computer is permitted, and further wherein a time signal provided by the processor of the computer is compared to the time period stored in the memory of the smart card and further execution of the software application is disabled if the comparison indicates that the time period has expired.
28. The system of claim 9 wherein the peripheral device comprises a smart card, and wherein the memory of the smart card contains the biometric data of the user.
29. The system of claim 9 wherein the peripheral device comprises a smart card, and wherein the memory of the smart card comprises a write once ROM in which the user stores the user's biometric data upon installation of the software application in the computer.
30. A system for protecting software applications from piracy, the system comprising:
a computer including a processor configured to unlock and execute a plurality of locked software applications and an input device configured to accept user authorization information indicative of an authorized use of one or more of the software applications; and
a peripheral device including a memory and a processor, wherein the peripheral device is in communication with the computer and configured to receive the user authorization information and identification of the one or more software applications for which authorization is requested, and wherein the processor is configured to compare the received user authorization information with user authorization information stored in the memory to produce a comparison result and, if the comparison result is indicative of the authorized user of the one or more software applications for which authorization is requested, the peripheral device is further configured to provide data to the computer, the data being indicative of the authorized use of the one or more of the software applications on the computer,
wherein the computer is configured to unlock the one or more software applications for execution upon receipt of the data indicative of the authorized use of the one or more software applications.
31. A system for protecting a software application from piracy comprising:
a locked software application configured to be unlocked only by an authorized user; and
a smart card including a memory having user authorization information indicating an authorized user of the software application,
wherein during execution of the locked software application in a computer, the computer is configured to unlock the locked software application if user authorization information provided by the user matches the authorized user information stored in the smart card, and
wherein the smart card further comprises a processor configured to compare the received user authorization information with user authorization information stored in the memory to produce a comparison result and, if the comparison result is indicative of the authorized user of the software application, data indicative of the authorized use of the software application is provided to the computer to unlock the software application for execution.
32. The system of claim 31 wherein the software application is configured to operate with a single smart card.
33. The system of claim 31 wherein the smart card is secured with a password or biometric information and may not be accessed unless the computer provides a password or biometric information identifying the user.
34. The system of claim 31 wherein the memory of the smart card includes a serial number of a processor authorized to execute the software application, and wherein the computer is configured to unlock the software application only if the serial number in the memory of the smart card matches the serial number of a processor of the computer.
35. The system of claim 31 wherein the memory of the smart card includes biometric data that is compared to biometric data representative of the user's fingerprint, and wherein the data indicative of the authorized use of the software application is provided to the computer if the user's biometric data matches the biometric data stored in the memory of the peripheral device.
36. The system of claim 31 wherein the software application is encrypted, and wherein the data indicative of the authorized use of the software application is a decryption key for decrypting the encrypted software application.
37. The system of claim 31 wherein the data indicative of the authorized use of the software application is encrypted by the smart card using asymmetric encryption prior to transfer to the computer.
38. The system of claim 31 wherein the smart card includes a capacitive contact imager.
39. The system of claim 31 wherein the memory of the smart card includes user authorization information of a plurality of users, and wherein the data indicative of the authorized use of the software application is provided to the computer if the received user authorization information matches the user authorization information of at least one of the plurality of users.
40. The system of claim 31 wherein the memory of the smart card includes user authorization information relating to a specific version of the software application, and wherein the data indicative of the authorized use of the software application indicates which version of the software application the computer is authorized to unlock for execution.
41. The system of claim 31 wherein the memory of the smart card comprises data indicating a maximum number of executions of the software application permitted by the computer, wherein a number indicating a current count of the executions of the software application is compared to the maximum number of execution of the software application permitted by the computer and further execution of the software application is disabled if the number equals the maximum number.
42. The system of claim 31 wherein the memory of the smart card comprises data indicating a time period for which execution of the software application by the computer is permitted, and wherein a time signal provided by a processor of the computer is compared to the time period stored in the memory of the smart card and further execution of the software application is disabled if the comparison indicates that the time period has expired.
43. The system of claim 31 wherein the memory of the smart card contains the biometric data of the user.
44. The system of claim 31 wherein the memory of the smart card comprises a write once ROM in which the user stores the user's biometric data upon installation of the software application in the computer.
US11/400,074 1999-03-29 2006-04-07 Method of distributing piracy protected computer software Expired - Lifetime USRE42861E1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/400,074 USRE42861E1 (en) 1999-03-29 2006-04-07 Method of distributing piracy protected computer software

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/277,827 US6721891B1 (en) 1999-03-29 1999-03-29 Method of distributing piracy protected computer software
US11/400,074 USRE42861E1 (en) 1999-03-29 2006-04-07 Method of distributing piracy protected computer software

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/277,827 Reissue US6721891B1 (en) 1999-03-29 1999-03-29 Method of distributing piracy protected computer software

Publications (1)

Publication Number Publication Date
USRE42861E1 true USRE42861E1 (en) 2011-10-18

Family

ID=32042973

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/277,827 Ceased US6721891B1 (en) 1999-03-29 1999-03-29 Method of distributing piracy protected computer software
US11/400,074 Expired - Lifetime USRE42861E1 (en) 1999-03-29 2006-04-07 Method of distributing piracy protected computer software

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/277,827 Ceased US6721891B1 (en) 1999-03-29 1999-03-29 Method of distributing piracy protected computer software

Country Status (1)

Country Link
US (2) US6721891B1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150033307A1 (en) * 2013-07-24 2015-01-29 Koji Ishikura Information processing apparatus and information processing system
US20190065716A1 (en) * 2016-03-03 2019-02-28 Zwipe As Attack resistant biometric authorised device

Families Citing this family (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997025798A1 (en) * 1996-01-11 1997-07-17 Mrj, Inc. System for controlling access and distribution of digital property
JP3951464B2 (en) * 1998-07-28 2007-08-01 株式会社日立製作所 Digital signal processor
EP1237091A4 (en) * 1999-12-10 2006-08-23 Fujitsu Ltd Personal authentication system and portable electronic device having personal authentication function using body information
US7134016B1 (en) * 2000-11-14 2006-11-07 Harris Scott C Software system with a biometric dongle function
JP2002236667A (en) * 2001-02-09 2002-08-23 Sony Corp Authentication method, authentication system, authentication device, and module for authentication
US20020188736A1 (en) * 2001-06-11 2002-12-12 Nokia Corporation System and method for controlling terminal application usage through subscriber-application association
US7346783B1 (en) * 2001-10-19 2008-03-18 At&T Corp. Network security device and method
US7783901B2 (en) * 2001-12-05 2010-08-24 At&T Intellectual Property Ii, L.P. Network security device and method
KR100453220B1 (en) * 2001-12-05 2004-10-15 한국전자통신연구원 Apparatus and method for authenticating user by using a fingerprint feature
DE50104035D1 (en) * 2001-12-10 2004-11-11 Aladdin Knowledge Systems Gmbh Procedure for executing a program on a computer
AUPR966001A0 (en) * 2001-12-20 2002-01-24 Canon Information Systems Research Australia Pty Ltd A microprocessor card defining a custom user interface
JP2003263623A (en) * 2002-03-11 2003-09-19 Seiko Epson Corp Recording medium and reader/writer for recording medium and method for using recording medium
US20030217280A1 (en) * 2002-05-17 2003-11-20 Keaton Thomas S. Software watermarking for anti-tamper protection
US20040010470A1 (en) * 2002-07-09 2004-01-15 Mills Charles A. Anti-piracy system for software and digital entertainment
CN1276363C (en) * 2002-11-13 2006-09-20 深圳市朗科科技有限公司 Method of actualizing safety data storage and algorithm storage in virtue of semiconductor memory device
US8121955B2 (en) 2003-01-16 2012-02-21 Oracle America, Inc. Signing program data payload sequence in program loading
US7281244B2 (en) * 2003-01-16 2007-10-09 Sun Microsystems, Inc. Using a digital fingerprint to commit loaded data in a device
US7484095B2 (en) * 2003-01-16 2009-01-27 Sun Microsystems, Inc. System for communicating program data between a first device and a second device
JP2005338959A (en) * 2004-05-24 2005-12-08 Sony Corp Information processor, execution decision method, and computer program
US20100208950A1 (en) * 2009-02-17 2010-08-19 Silvester Kelan C Biometric identification data protection
US8533791B2 (en) * 2004-07-15 2013-09-10 Anakam, Inc. System and method for second factor authentication services
US20100100967A1 (en) * 2004-07-15 2010-04-22 Douglas James E Secure collaborative environment
US7676834B2 (en) * 2004-07-15 2010-03-09 Anakam L.L.C. System and method for blocking unauthorized network log in using stolen password
US8528078B2 (en) * 2004-07-15 2013-09-03 Anakam, Inc. System and method for blocking unauthorized network log in using stolen password
US8296562B2 (en) * 2004-07-15 2012-10-23 Anakam, Inc. Out of band system and method for authentication
EP1766839B1 (en) * 2004-07-15 2013-03-06 Anakam, Inc. System and method for blocking unauthorized network log in using stolen password
US20060293891A1 (en) * 2005-06-22 2006-12-28 Jan Pathuel Biometric control systems and associated methods of use
US20080040615A1 (en) * 2006-06-30 2008-02-14 Electronic Plastics, Llc Biometric embedded device
TW200805111A (en) * 2006-07-14 2008-01-16 Asustek Comp Inc Method for controlling the function of application software and computer readable recording medium for storing program thereof
US20080097924A1 (en) * 2006-10-20 2008-04-24 Electronic Plastics, Llc Decentralized secure transaction system
KR101350479B1 (en) * 2007-02-12 2014-01-16 삼성전자주식회사 Method for implementing drm function and additional function using drm device and system thereof
JP4989324B2 (en) * 2007-06-13 2012-08-01 任天堂株式会社 Information processing system, information processing apparatus, information processing program
EP2192519B1 (en) * 2008-12-01 2015-02-25 BlackBerry Limited System and method of providing biometric quick launch
US20100138914A1 (en) * 2008-12-01 2010-06-03 Research In Motion Limited System and method of providing biometric quick launch
US9223948B2 (en) 2011-11-01 2015-12-29 Blackberry Limited Combined passcode and activity launch modifier
US20140344942A1 (en) * 2013-05-17 2014-11-20 Veritrix, Inc. Methods for Activating End-User Software Licenses
CN104751037B (en) * 2015-04-10 2018-06-12 无锡海斯凯尔医学技术有限公司 Use control method, system and the medical treatment detection device of medical treatment detection device
CN105243311B (en) * 2015-10-19 2017-02-22 广东欧珀移动通信有限公司 Fingerprint information safe calling method, fingerprint information safe calling device and mobile terminal
CN109241714A (en) * 2016-01-06 2019-01-18 阿里巴巴集团控股有限公司 A kind of information image display methods and device

Citations (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4658093A (en) 1983-07-11 1987-04-14 Hellman Martin E Software distribution system
US4683553A (en) 1982-03-18 1987-07-28 Cii Honeywell Bull (Societe Anonyme) Method and device for protecting software delivered to a user by a supplier
US4791565A (en) 1984-06-20 1988-12-13 Effective Security Systems, Inc. Apparatus for controlling the use of computer software
US5260999A (en) 1991-06-28 1993-11-09 Digital Equipment Corporation Filters in license management system
US5495411A (en) 1993-12-22 1996-02-27 Ananda; Mohan Secure software rental system using continuous asynchronous password verification
US5509070A (en) 1992-12-15 1996-04-16 Softlock Services Inc. Method for encouraging purchase of executable and non-executable software
US5566327A (en) * 1994-07-08 1996-10-15 Sehr; Richard P. Computerized theme park information management system utilizing partitioned smart cards and biometric verification
US5615061A (en) 1994-09-29 1997-03-25 Singh; Jitendra K. Method of preventng software piracy by uniquely identifying the specific magnetic storage device the software is stored on
US5625690A (en) 1993-11-15 1997-04-29 Lucent Technologies Inc. Software pay per use system
US5692917A (en) 1991-04-29 1997-12-02 Trw Inc. Computer hardware insert device for software authorization
US5745879A (en) 1991-05-08 1998-04-28 Digital Equipment Corporation Method and system for managing execution of licensed programs
US5754646A (en) 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
US5757907A (en) 1994-04-25 1998-05-26 International Business Machines Corporation Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-dependent identification
US5790668A (en) 1995-12-19 1998-08-04 Mytec Technologies Inc. Method and apparatus for securely handling data in a database of biometrics and associated data
US5790663A (en) 1996-03-28 1998-08-04 Advanced Micro Devices, Inc. Method and apparatus for software access to a microprocessor serial number
US5796824A (en) 1992-03-16 1998-08-18 Fujitsu Limited Storage medium for preventing an irregular use by a third party
US5841868A (en) 1993-09-21 1998-11-24 Helbig, Sr.; Walter Allen Trusted computer system
US5848231A (en) 1996-02-12 1998-12-08 Teitelbaum; Neil System configuration contingent upon secure input
US5893910A (en) 1996-01-04 1999-04-13 Softguard Enterprises Inc. Method and apparatus for establishing the legitimacy of use of a block of digitally represented information
US5923884A (en) * 1996-08-30 1999-07-13 Gemplus S.C.A. System and method for loading applications onto a smart card
US5933498A (en) 1996-01-11 1999-08-03 Mrj, Inc. System for controlling access and distribution of digital property
US6044471A (en) * 1998-06-04 2000-03-28 Z4 Technologies, Inc. Method and apparatus for securing software to reduce unauthorized use
US6067621A (en) * 1996-10-05 2000-05-23 Samsung Electronics Co., Ltd. User authentication system for authenticating an authorized user of an IC card
US6087955A (en) 1996-11-07 2000-07-11 Litronic, Inc. Apparatus and method for providing an authentication system
US6134659A (en) * 1998-01-07 2000-10-17 Sprong; Katherine A. Controlled usage software
US20030149877A1 (en) * 2002-01-03 2003-08-07 Winbond Electronics Corporation Smart card with keypro function
US6655585B2 (en) * 1998-05-11 2003-12-02 Citicorp Development Center, Inc. System and method of biometric smart card user authentication
US20050091507A1 (en) * 2003-10-22 2005-04-28 Samsung Electronics Co., Ltd. Method and apparatus for managing digital rights using portable storage device
US20050139685A1 (en) * 2003-12-30 2005-06-30 Douglas Kozlay Design & method for manufacturing low-cost smartcards with embedded fingerprint authentication system modules
US20050144446A1 (en) * 2003-12-25 2005-06-30 Canon Kabushiki Kaisha Authentication method, program for implementing the method, and storage medium storing the program
US20050216763A1 (en) * 2004-03-29 2005-09-29 Samsung Electronics Co., Ltd. Method and apparatus for playing back content based on digital rights management between portable storage and device, and portable storage for the same
US20050216739A1 (en) * 2004-03-22 2005-09-29 Samsung Electronics Co., Ltd. Portable storage device and method of managing files in the portable storage device
US7366918B2 (en) * 1996-03-11 2008-04-29 Microsoft Corporation Configuring and managing resources on a multi-purpose integrated circuit card using a personal computer
US7552340B2 (en) * 2002-07-31 2009-06-23 Trek 2000 International Ltd. Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks

Patent Citations (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4683553A (en) 1982-03-18 1987-07-28 Cii Honeywell Bull (Societe Anonyme) Method and device for protecting software delivered to a user by a supplier
US4658093A (en) 1983-07-11 1987-04-14 Hellman Martin E Software distribution system
US4791565A (en) 1984-06-20 1988-12-13 Effective Security Systems, Inc. Apparatus for controlling the use of computer software
US5692917A (en) 1991-04-29 1997-12-02 Trw Inc. Computer hardware insert device for software authorization
US5745879A (en) 1991-05-08 1998-04-28 Digital Equipment Corporation Method and system for managing execution of licensed programs
US5260999A (en) 1991-06-28 1993-11-09 Digital Equipment Corporation Filters in license management system
US5796824A (en) 1992-03-16 1998-08-18 Fujitsu Limited Storage medium for preventing an irregular use by a third party
US5509070A (en) 1992-12-15 1996-04-16 Softlock Services Inc. Method for encouraging purchase of executable and non-executable software
US5841868A (en) 1993-09-21 1998-11-24 Helbig, Sr.; Walter Allen Trusted computer system
US5625690A (en) 1993-11-15 1997-04-29 Lucent Technologies Inc. Software pay per use system
US5495411A (en) 1993-12-22 1996-02-27 Ananda; Mohan Secure software rental system using continuous asynchronous password verification
US5757907A (en) 1994-04-25 1998-05-26 International Business Machines Corporation Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-dependent identification
US5566327A (en) * 1994-07-08 1996-10-15 Sehr; Richard P. Computerized theme park information management system utilizing partitioned smart cards and biometric verification
US5615061A (en) 1994-09-29 1997-03-25 Singh; Jitendra K. Method of preventng software piracy by uniquely identifying the specific magnetic storage device the software is stored on
US5754646A (en) 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
US5790668A (en) 1995-12-19 1998-08-04 Mytec Technologies Inc. Method and apparatus for securely handling data in a database of biometrics and associated data
US5893910A (en) 1996-01-04 1999-04-13 Softguard Enterprises Inc. Method and apparatus for establishing the legitimacy of use of a block of digitally represented information
US5933498A (en) 1996-01-11 1999-08-03 Mrj, Inc. System for controlling access and distribution of digital property
US6314409B2 (en) 1996-01-11 2001-11-06 Veridian Information Solutions System for controlling access and distribution of digital property
US5848231A (en) 1996-02-12 1998-12-08 Teitelbaum; Neil System configuration contingent upon secure input
US7366918B2 (en) * 1996-03-11 2008-04-29 Microsoft Corporation Configuring and managing resources on a multi-purpose integrated circuit card using a personal computer
US5790663A (en) 1996-03-28 1998-08-04 Advanced Micro Devices, Inc. Method and apparatus for software access to a microprocessor serial number
US5923884A (en) * 1996-08-30 1999-07-13 Gemplus S.C.A. System and method for loading applications onto a smart card
US6067621A (en) * 1996-10-05 2000-05-23 Samsung Electronics Co., Ltd. User authentication system for authenticating an authorized user of an IC card
US6087955A (en) 1996-11-07 2000-07-11 Litronic, Inc. Apparatus and method for providing an authentication system
US6134659A (en) * 1998-01-07 2000-10-17 Sprong; Katherine A. Controlled usage software
US6655585B2 (en) * 1998-05-11 2003-12-02 Citicorp Development Center, Inc. System and method of biometric smart card user authentication
US6044471A (en) * 1998-06-04 2000-03-28 Z4 Technologies, Inc. Method and apparatus for securing software to reduce unauthorized use
US20030149877A1 (en) * 2002-01-03 2003-08-07 Winbond Electronics Corporation Smart card with keypro function
US7552340B2 (en) * 2002-07-31 2009-06-23 Trek 2000 International Ltd. Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks
US20050091507A1 (en) * 2003-10-22 2005-04-28 Samsung Electronics Co., Ltd. Method and apparatus for managing digital rights using portable storage device
US20050144446A1 (en) * 2003-12-25 2005-06-30 Canon Kabushiki Kaisha Authentication method, program for implementing the method, and storage medium storing the program
US20050139685A1 (en) * 2003-12-30 2005-06-30 Douglas Kozlay Design & method for manufacturing low-cost smartcards with embedded fingerprint authentication system modules
US20050216739A1 (en) * 2004-03-22 2005-09-29 Samsung Electronics Co., Ltd. Portable storage device and method of managing files in the portable storage device
US20050216763A1 (en) * 2004-03-29 2005-09-29 Samsung Electronics Co., Ltd. Method and apparatus for playing back content based on digital rights management between portable storage and device, and portable storage for the same

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Harvey, Mike. "Why veins could replace fingerprints and retinas as most secure form of ID." Times Online Nov. 11, 2008, 2 pages .
Harvey, Mike. "Why veins could replace fingerprints and retinas as most secure form of ID." Times Online Nov. 11, 2008, 2 pages <http://technology.timesonline.co.uk/tol/news/tech—and—web/articles5129384.ece>.
Sanderson, "Distributed file systems: stepping stone to distributed computing," LAN Technology, May 1991, 7(5), 41-50.

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150033307A1 (en) * 2013-07-24 2015-01-29 Koji Ishikura Information processing apparatus and information processing system
US9369453B2 (en) * 2013-07-24 2016-06-14 Ricoh Company, Ltd. Information processing apparatus and information processing system
US20190065716A1 (en) * 2016-03-03 2019-02-28 Zwipe As Attack resistant biometric authorised device

Also Published As

Publication number Publication date
US6721891B1 (en) 2004-04-13

Similar Documents

Publication Publication Date Title
USRE42861E1 (en) Method of distributing piracy protected computer software
US7673333B2 (en) Flexible method of security data backup
US6052468A (en) Method of securing a cryptographic key
US7191466B1 (en) Flexible system and method of user authentication for password based system
US7137008B1 (en) Flexible method of user authentication
US6122737A (en) Method for using fingerprints to distribute information over a network
US7962417B2 (en) System and method for distributing protected information
US7134016B1 (en) Software system with a biometric dongle function
US20120032782A1 (en) System for restricted biometric access for a secure global online and electronic environment
US20040117636A1 (en) System, method and apparatus for secure two-tier backup and retrieval of authentication information
US20080005578A1 (en) System and method for traceless biometric identification
US20110314285A1 (en) Registration method of biologic information, application method of using template and authentication method in biometric authentication
WO2003062969A1 (en) Flexible method of user authentication
GB2331825A (en) Personal identification authentication using fingerprints
CN101523365A (en) Rights management in a cloud
JPH1139483A (en) Fingerprint authentication card, memory card, authentication system, authentication device and portable equipment
JP2006525577A (en) Smart authentication card
EP1160648A2 (en) Restriction method for utilization of computer file with use of biometrical information, method of logging in computer system and recording medium
EP1468347B1 (en) Flexible method of user authentication for password based system
FR3063162A1 (en) BIOMETRIC SYSTEM FOR CONTROLLING DYNAMIC ACCESS
CA2287013A1 (en) Method of distributing piracy protected computer software
CA2317211A1 (en) Flexible method of security data backup
US20020147921A1 (en) Method and system for migrating dynamic master templates in a biometric verification system
JP2008027177A (en) Split information processing apparatus, program and method
WO1999005816A1 (en) System and method for authenticating signatures

Legal Events

Date Code Title Description
AS Assignment

Owner name: ACTIVCARD IRELAND LIMITED, IRELAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:DEW ENGINEERING AND DEVELOPMENT LIMITED;REEL/FRAME:025977/0055

Effective date: 20020830

CC Certificate of correction
CC Certificate of correction
FPAY Fee payment

Year of fee payment: 12