WO2001033317A1 - Assuring data integrity via a secure counter - Google Patents
Assuring data integrity via a secure counter Download PDFInfo
- Publication number
- WO2001033317A1 WO2001033317A1 PCT/EP2000/010285 EP0010285W WO0133317A1 WO 2001033317 A1 WO2001033317 A1 WO 2001033317A1 EP 0010285 W EP0010285 W EP 0010285W WO 0133317 A1 WO0133317 A1 WO 0133317A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access
- data
- protected data
- usage parameter
- parameter
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
- G06F3/0622—Securing storage systems in relation to access
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Definitions
- This invention relates to the field of data security, and in particular to means for determining the integrity of data that changes with time.
- some data may have limits imposed for the number of times the data may be accessed, or the number of days that the data may be accessed.
- a "try-before-you-buy" software application will typically control the number of times the application can be used.
- a video playback system may be configured to control the number of times a recorded program is accessed, based on a purchased limited use license. To effect such a system, a usage parameter must be maintained. If this usage parameter is merely stored at a memory location, the access security system can be overcome by merely writing a new value to the memory location as required.
- a more sophisticated system may embed the usage parameter into an item that is bound to the limited-access material in a secure manner.
- European patent EP0906700 "Method and system for transferring content information and supplemental information related thereto", issued 7 April 1999 to Johan
- P.M.G. Linnartz et al presents a technique for the protection of copyright material via the use of a watermark "ticket" that controls the number of times the protected material may be rendered, and is incorporated by reference herein.
- a common technique for overcoming a limited-access security systems is a "replay attack", wherein a copy of the usage parameter is recorded before its expiration is expired, and this recording is used to replay, or re-access, the material beyond the authorized access limits.
- the usage parameter is bound to the data being protected, such as via a watermark-based security system, the content material and all bound parameters are recorded, for subsequent replacement, or "replay", as an authorized version of the material.
- a financial database may contain internal checks that facilitate a determination of counterfeit entries.
- a replay attack can be affected by obtaining a copy of a valid entry, such as a record or set of records showing a large balance in an account, then repeatedly substituting this record or set of records after withdrawing funds from the account.
- This object and others are achieved by providing a system that includes a secure means of storing a usage parameter that is associated with each usage of the database, and a binding parameter that binds the usage parameter to the data that is being protected.
- the usage parameter is incremented and the binding parameter is updated, based on this new usage parameter.
- the stored binding parameter is compared to a value corresponding to the binding of the current value of the usage parameter with the data. If either the current value of the usage parameter differs from the usage parameter that was used to produce the binding parameter, or the current data differs from the data that was used to produce the binding parameter, the new binding value will not correspond to the stored binding parameter, and access is denied.
- the usage parameter is a value that is contained in a sequential counter. In this manner, a sequential access to the protected data can be enforced, thereby precluding a replay attack. Note that the data being protected may be data that is used to control access to other protected material, thereby expanding the scope of security protection to this other protected material.
- Fig. 1 illustrates an example block diagram of an access-control security system in accordance with this invention.
- Fig. 2 illustrates an example block diagram of an alternative access-control security system in accordance with this invention.
- Fig. 3 illustrates an example flow diagram for an access-control security system in accordance with this invention.
- Fig. 1 illustrates an example block diagram of an access-control security system 100 that controls access to the contents of a database 150.
- An access controller 120 receives an access request 101, and grants the request only if the database 150 is authenticated as being current.
- a secure module 110 contains a counter 111 that maintains a usage parameter 111' that is incremented with each access to the controlled database 150.
- this usage parameter 111 ' is bound to the database 150, preferably by computing a hash value 131 corresponding to the data base 150 and the usage parameter 111', via a hash generator 130.
- a counter 111 is presented herein as a paradigm for a device that provides a substantially unique value with each access to the database.
- a random number generator or other 'unique value generator' can be used in lieu of the counter 111 to uniquely identify each access to the database 150.
- the number of times that the protected database 150 is access can also be determined, and usage-limiting rules can be enforced, as discussed further below.
- the hash generator 130 provides a one-way computation of a hash value based on a set of input values, such that knowledge of the hash value provides no information regarding the value of any of the set of input values. Most significantly, it is computationally infeasible to determine a set of input values that will produce a specified hash value 131. A change of any item in the database 150 or the usage parameter 111' data item will produce a different hash value 131. That is, each access to the database 150 in accordance with this invention generates a unique hash value 131 whose value depends upon the usage parameter 111' and the contents of the data base 150. In some applications, the contents of the database is fixed; for example, a CD or DVD recording of entertainment material.
- the database is modifiable. If the database can be modified, a preferred embodiment of this invention uses the database to store the usage parameter 111', thereby eliminating the need to provide an access counter 111 in the secure module 110. Storing the usage parameter 111 ' in the database 150 also eases the hash generation task at 130, because hash routines are commonly available that compute a hash value corresponding to a data file.
- the access count device 111 is illustrated in the figures as being contained in the secure module 110, as the more general solution (independent of whether the database 150 is modifiable).
- the usage parameter 111 ' is illustrated as being associated with the database 150, via the dashed block, indicating that the usage parameter 111' is used in computing the hash 131, regardless of whether the usage parameter 111' is stored in the database 150 directly, or in an access count device 111 within the secure module 110.
- the unique hash value 131, or a parameter based on this unique hash value 131 is stored in the secure module, as an authentication code 112.
- the usage parameter 111' is changed, a new hash value 131 is computed, and a new authentication code 112 is stored, replacing the prior authentication code.
- a hash 131 of the current database 150 and usage parameter 111 ' is computed, and compared to the stored authentication code 112. If the usage parameter 111' is not included within the database 150, the current value of the access counter 111 is used to compute the new hash value 131.
- the hash 131 of this substitute database will not match the stored authentication code 112, and access is denied. If the current database 150 is the latest version of the database, the hash 131 will match the stored authentication code 112, and access will be granted.
- this invention provides a secure system and method for determining whether a current copy of a database corresponds to the latest version of a database. In addition to preventing successful replay attacks, this invention also protects against unauthorized modifications to the database. Conventional security techniques may be included in the access control 120 to assure that only authorized users are permitted to modify the database, including the use of passwords, cryptographic keys, access cards, smart cards, and the like. If the database is modified by a system other than one with access to the secure module 110, a new authentication code 112 will not be generated for this modified database, and therefore an attempt to substitute this modified database for the latest authorized database will fail.
- each transaction is gated by an access controller 120 having access to the secure module 110; any substituted records in the database 150 will result in an access denial, as discussed above. Additional access controls may also be employed. If the database 150 has a limit to the number of times it may be accessed, corresponding, for example, to a limited use license, the usage parameter 111 ' is used to determine whether the number of accesses is within the limit. If the usage parameter 111' indicates that the limit has been reached, access is denied.
- Fig. 2 illustrates an example block diagram of an alternative access-control security system 200 in accordance with this invention.
- system 100 of Fig. 1 it is assumed that the usage parameter 111 ' is bound directly to the contents of the database 150.
- the usage parameter 111 ' is bound indirectly to the contents of a plurality of databases 250a, 250b.
- a hash value 230a, 230b is computed and stored in the database 150 for each of the plurality of databases 250a, 250b.
- a hash value 131 is computed based on the contents of the database 150 and the usage parameter 111', and stored as the authentication code 112, as discussed above.
- the access controller 120 authenticates each dataset 250a, 250b by comparing a hash of its contents to the stored value in the current database 150, and authenticates the current database 150 by comparing its hash value 131 to the stored authentication code 112.
- a usage record 251 is included within the corresponding database 250a, 250b, and the value of this usage record 251 is thereby included in the determination of the hash value 230a, 230b that is stored in the database 150.
- Fig. 3 illustrates an example flow diagram for an access-control security system in accordance with this invention.
- an access request is received.
- a hash of the database and usage parameter is computed, at 320, and compared to an authentication code that is stored in a secure location, at 330. If, at 335, the hash does not correspond to the stored authentication code, access is denied, at 340. If, at 335, the hash corresponds to the stored authentication code, the usage parameter is incremented, at 350. As noted above, this usage parameter may be stored in the associated database, or in the secure location that contains the authentication code, at 360. After incrementing, or otherwise modifying, the usage parameter, access to the database is granted, at 370.
- a hash of the database, with the usage parameter is computed, at 380, and stored as the new authentication code in the secure location, at 390.
- Alternative flows will be evident to one of ordinary art. For example, in the illustrated flow of Fig. 3, a discontinuity of flow 360-390 will result in a stored usage parameter that does not correspond to the stored authentication code.
- Techniques common in the art can be used to assure a synchronization between the usage parameter and authentication code is maintained. For example, each time the usage parameter or database is changed, a corresponding authentication code can be generated and stored in a temporary location, and a recovery routine can be provided to recover the latest versions of the database, usage parameter, and authentication code in the event of a discontinuity of flow in the sequence of Fig. 3.
- a solid-state memory module with smart card functionality may comprise the secure module 110.
- the secure module 110 may be embodied as an encoding that only 'compliant devices' are able to read or write, a compliant device being one that is manufactured by manufacturers who agree to abide by certain rules and standards established for protecting recorded material.
- the encoding may include the use of cryptographic keys that are secret to the complying manufacturers, or may include the use of special purpose hardware devices for reading and writing the secured information.
- the secure module, the database, and the access controller may each be embodied as discrete components.
- the secure module may be a smart card
- the database may be a file on a remote computer, or at a site on the Internet
- the access controller may be an embedded program in a processor of a playback device.
- the security of the secure module may be provided via the use of encryption keys and the like, and therefore the entire system can be embodied as a software application.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Automation & Control Theory (AREA)
- Mathematical Physics (AREA)
- Databases & Information Systems (AREA)
- Human Computer Interaction (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020017008315A KR20010100011A (en) | 1999-10-29 | 2000-10-18 | Assuring data integrity via a secure counter |
JP2001535142A JP2003513388A (en) | 1999-10-29 | 2000-10-18 | System and method for ensuring data reliability with a secured counter |
EP00972806A EP1141808A1 (en) | 1999-10-29 | 2000-10-18 | Assuring data integrity via a secure counter |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16250399P | 1999-10-29 | 1999-10-29 | |
US60/162,503 | 1999-10-29 | ||
US63672400A | 2000-08-11 | 2000-08-11 | |
US09/636,724 | 2000-08-11 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001033317A1 true WO2001033317A1 (en) | 2001-05-10 |
Family
ID=26858817
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2000/010285 WO2001033317A1 (en) | 1999-10-29 | 2000-10-18 | Assuring data integrity via a secure counter |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP1141808A1 (en) |
JP (1) | JP2003513388A (en) |
KR (1) | KR20010100011A (en) |
WO (1) | WO2001033317A1 (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002015184A1 (en) * | 2000-08-16 | 2002-02-21 | Koninklijke Philips Electronics N.V. | Method and device for controlling distribution and use of digital works |
WO2003024099A2 (en) * | 2001-09-10 | 2003-03-20 | Koninklijke Philips Electronics N.V. | Method and device for providing conditional access |
WO2004015579A1 (en) * | 2002-07-31 | 2004-02-19 | Trek 2000 International Ltd. | Method and apparatus of storage anti-piracy key encryption (sake) device to control data access for networks |
WO2006022667A1 (en) | 2004-08-02 | 2006-03-02 | International Business Machines | Method for guaranteeing freshness of results for queries against a non-secure data store |
EP1644882A2 (en) * | 2003-07-14 | 2006-04-12 | Aladdin Knowledge Systems | A method for indicating the integrity of use-information of a computer program |
KR100617321B1 (en) | 2004-12-14 | 2006-08-30 | 한국전자통신연구원 | Method and Apparatus for Protection to Link Security Attack |
WO2007062941A2 (en) * | 2005-12-01 | 2007-06-07 | Telefonaktiebolaget Lm Ericsson (Publ) | Secure and replay protected memory storage |
EP1850256A1 (en) * | 2006-04-24 | 2007-10-31 | Telefonaktiebolaget LM Ericsson (publ) | Authorisation of the installation of a software version |
EP1962219A2 (en) * | 2007-02-23 | 2008-08-27 | Samsung Electronics Co., Ltd. | Apparatus and method for managing digital rights management contents in portable terminal |
WO2009063406A2 (en) * | 2007-11-14 | 2009-05-22 | Nxp B.V. | Electronic system and method of operating an electronic system |
US7650470B2 (en) | 2001-06-28 | 2010-01-19 | Trek 2000 International, Ltd. | Method and devices for data transfer |
US7809958B2 (en) | 2003-03-21 | 2010-10-05 | International Business Machines Corporation | Method for guaranteeing freshness of results for queries against a non-secure data store |
WO2010120645A2 (en) * | 2009-04-13 | 2010-10-21 | Rovi Solutions Corporation | Method and apparatus for secure configuration of electronic devices |
US8296582B2 (en) | 1999-03-15 | 2012-10-23 | Koninklijke Philips Electronics N.V. | Method and system for providing copy-protection on a storage medium and storage medium for use in such a system |
US8364981B2 (en) | 2001-05-22 | 2013-01-29 | Koninklijke Philips Electronics N.V. | Record carrier for storing a digital work |
DE102015216082A1 (en) * | 2015-08-24 | 2017-03-02 | Siemens Aktiengesellschaft | Method and memory module for secure writes and / or reads on the memory module |
US10943230B2 (en) * | 2016-12-30 | 2021-03-09 | Idemia France | Method for monitoring usage patterns and electronic device capable of implementing such a method |
CN112527213A (en) * | 2019-09-19 | 2021-03-19 | 富士施乐株式会社 | Information processing device and recording medium for program thereof |
US11475106B2 (en) | 2010-10-19 | 2022-10-18 | Apple Inc. | Application usage policy enforcement |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2906380B1 (en) * | 2006-09-27 | 2008-12-19 | Trusted Logic Sa | SYSTEM AND METHOD FOR SECURING DATA. |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4658093A (en) * | 1983-07-11 | 1987-04-14 | Hellman Martin E | Software distribution system |
EP0845733A2 (en) * | 1996-11-27 | 1998-06-03 | Sun Microsystems, Inc. | Implementing digital signatures for data streams and data archives |
EP0881561A2 (en) * | 1992-11-13 | 1998-12-02 | Hewlett-Packard Company | Encrypting software programs |
-
2000
- 2000-10-18 WO PCT/EP2000/010285 patent/WO2001033317A1/en not_active Application Discontinuation
- 2000-10-18 JP JP2001535142A patent/JP2003513388A/en active Pending
- 2000-10-18 EP EP00972806A patent/EP1141808A1/en not_active Ceased
- 2000-10-18 KR KR1020017008315A patent/KR20010100011A/en not_active Application Discontinuation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4658093A (en) * | 1983-07-11 | 1987-04-14 | Hellman Martin E | Software distribution system |
EP0881561A2 (en) * | 1992-11-13 | 1998-12-02 | Hewlett-Packard Company | Encrypting software programs |
EP0845733A2 (en) * | 1996-11-27 | 1998-06-03 | Sun Microsystems, Inc. | Implementing digital signatures for data streams and data archives |
Cited By (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8296582B2 (en) | 1999-03-15 | 2012-10-23 | Koninklijke Philips Electronics N.V. | Method and system for providing copy-protection on a storage medium and storage medium for use in such a system |
WO2002015184A1 (en) * | 2000-08-16 | 2002-02-21 | Koninklijke Philips Electronics N.V. | Method and device for controlling distribution and use of digital works |
US8364981B2 (en) | 2001-05-22 | 2013-01-29 | Koninklijke Philips Electronics N.V. | Record carrier for storing a digital work |
US7650470B2 (en) | 2001-06-28 | 2010-01-19 | Trek 2000 International, Ltd. | Method and devices for data transfer |
WO2003024099A2 (en) * | 2001-09-10 | 2003-03-20 | Koninklijke Philips Electronics N.V. | Method and device for providing conditional access |
WO2003024099A3 (en) * | 2001-09-10 | 2003-11-20 | Koninkl Philips Electronics Nv | Method and device for providing conditional access |
AU2003217139B8 (en) * | 2002-07-31 | 2006-05-18 | Trek 2000 International Ltd. | Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks |
GB2397923B (en) * | 2002-07-31 | 2005-04-06 | Trek 2000 Int Ltd | Method and apparatus of storage anti-piracy key encryption (sake) device to control data access for networks |
AU2003217139B2 (en) * | 2002-07-31 | 2006-04-27 | Trek 2000 International Ltd. | Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks |
WO2004015579A1 (en) * | 2002-07-31 | 2004-02-19 | Trek 2000 International Ltd. | Method and apparatus of storage anti-piracy key encryption (sake) device to control data access for networks |
GB2397923A (en) * | 2002-07-31 | 2004-08-04 | Trek 2000 Int Ltd | Method and apparatus of storage anti-piracy key encryption (sake) device to control data access for networks |
US7809958B2 (en) | 2003-03-21 | 2010-10-05 | International Business Machines Corporation | Method for guaranteeing freshness of results for queries against a non-secure data store |
EP1644882A4 (en) * | 2003-07-14 | 2010-06-02 | Aladdin Knowledge Systems | A method for indicating the integrity of use-information of a computer program |
EP1644882A2 (en) * | 2003-07-14 | 2006-04-12 | Aladdin Knowledge Systems | A method for indicating the integrity of use-information of a computer program |
WO2006022667A1 (en) | 2004-08-02 | 2006-03-02 | International Business Machines | Method for guaranteeing freshness of results for queries against a non-secure data store |
EP1782203A1 (en) * | 2004-08-02 | 2007-05-09 | International Business Machines | Method for guaranteeing freshness of results for queries against a non-secure data store |
EP1782203A4 (en) * | 2004-08-02 | 2009-05-13 | Ibm | Method for guaranteeing freshness of results for queries against a non-secure data store |
KR100617321B1 (en) | 2004-12-14 | 2006-08-30 | 한국전자통신연구원 | Method and Apparatus for Protection to Link Security Attack |
US7681050B2 (en) | 2005-12-01 | 2010-03-16 | Telefonaktiebolaget L M Ericsson (Publ) | Secure and replay protected memory storage |
WO2007062941A3 (en) * | 2005-12-01 | 2007-07-26 | Ericsson Telefon Ab L M | Secure and replay protected memory storage |
WO2007062941A2 (en) * | 2005-12-01 | 2007-06-07 | Telefonaktiebolaget Lm Ericsson (Publ) | Secure and replay protected memory storage |
WO2007121903A1 (en) * | 2006-04-24 | 2007-11-01 | Telefonaktiebolaget L M Ericsson (Publ) | Authorisation of the installation of a software version |
EP1850256A1 (en) * | 2006-04-24 | 2007-10-31 | Telefonaktiebolaget LM Ericsson (publ) | Authorisation of the installation of a software version |
US8752205B2 (en) | 2007-02-23 | 2014-06-10 | Samsung Electronics Co., Ltd | Apparatus and method for managing digital rights management contents in portable terminal |
EP1962219A2 (en) * | 2007-02-23 | 2008-08-27 | Samsung Electronics Co., Ltd. | Apparatus and method for managing digital rights management contents in portable terminal |
EP1962219A3 (en) * | 2007-02-23 | 2010-03-03 | Samsung Electronics Co., Ltd. | Apparatus and method for managing digital rights management contents in portable terminal |
US8581692B2 (en) | 2007-11-14 | 2013-11-12 | Nxp B.V. | Electronic system and method of operating an electronic system |
WO2009063406A2 (en) * | 2007-11-14 | 2009-05-22 | Nxp B.V. | Electronic system and method of operating an electronic system |
WO2009063406A3 (en) * | 2007-11-14 | 2010-04-22 | Nxp B.V. | Electronic system and method of operating an electronic system |
WO2010120645A2 (en) * | 2009-04-13 | 2010-10-21 | Rovi Solutions Corporation | Method and apparatus for secure configuration of electronic devices |
WO2010120645A3 (en) * | 2009-04-13 | 2011-01-13 | Rovi Solutions Corporation | Method and apparatus for secure configuration of electronic devices |
US11475106B2 (en) | 2010-10-19 | 2022-10-18 | Apple Inc. | Application usage policy enforcement |
DE102015216082A1 (en) * | 2015-08-24 | 2017-03-02 | Siemens Aktiengesellschaft | Method and memory module for secure writes and / or reads on the memory module |
US10353830B2 (en) | 2015-08-24 | 2019-07-16 | Siemens Aktiengesellschaft | Method and memory module for security-protected write processes and/or read processes on the memory module |
US10943230B2 (en) * | 2016-12-30 | 2021-03-09 | Idemia France | Method for monitoring usage patterns and electronic device capable of implementing such a method |
CN112527213A (en) * | 2019-09-19 | 2021-03-19 | 富士施乐株式会社 | Information processing device and recording medium for program thereof |
Also Published As
Publication number | Publication date |
---|---|
EP1141808A1 (en) | 2001-10-10 |
JP2003513388A (en) | 2003-04-08 |
KR20010100011A (en) | 2001-11-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2001033317A1 (en) | Assuring data integrity via a secure counter | |
EP0895148B1 (en) | Software rental system and method for renting software | |
AU767286B2 (en) | Methods and apparatus for protecting information | |
CA2242596C (en) | System for controlling access and distribution of digital property | |
US8997243B2 (en) | Temporal proximity to verify physical proximity | |
EP0302710A2 (en) | A method of controlling the use of computer programs | |
US8769675B2 (en) | Clock roll forward detection | |
EP2264640B1 (en) | Feature specific keys for executable code | |
JPH06324858A (en) | Software use amount managing system and storage medium with software used amount managing function | |
EP1335365A2 (en) | Data storage apparatus and method | |
US20090144563A1 (en) | Method of detecting data tampering on a storage system | |
US20060015860A1 (en) | System and method for storing attributes in a file for processing an operating system | |
US20080275917A1 (en) | Itso Fvc2 Application Monitor | |
US20060155652A1 (en) | Expiring encryption | |
WO1998053384A1 (en) | Method and apparatus for activating programs/features in a computer | |
JP2006107305A (en) | Data storage device | |
JP2001154577A (en) | Device and method for electronically storing original document property and computer-readable recording medium with recorded program for the method to be executed by computer | |
JP2006190011A (en) | Radio ic chip, decoding system using the same, program to be used for the same, recording medium with the program recorded thereon, decoding method, and installation method of program | |
WO1999035582A1 (en) | A computer software activation system and a method of authenticating computer software | |
JP2001344074A (en) | Device for reading data and method for controlling its operation | |
JPH0438523A (en) | Program execution permitting system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): JP KR |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2000972806 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 2001 535142 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020017008315 Country of ref document: KR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWP | Wipo information: published in national office |
Ref document number: 2000972806 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1020017008315 Country of ref document: KR |
|
WWR | Wipo information: refused in national office |
Ref document number: 2000972806 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000972806 Country of ref document: EP |