[go: up one dir, main page]

WO2016018176A1 - Procédé de protection de droits de propriété intellectuelle et de dispositifs d'utilisateur - Google Patents

Procédé de protection de droits de propriété intellectuelle et de dispositifs d'utilisateur Download PDF

Info

Publication number
WO2016018176A1
WO2016018176A1 PCT/RU2015/000419 RU2015000419W WO2016018176A1 WO 2016018176 A1 WO2016018176 A1 WO 2016018176A1 RU 2015000419 W RU2015000419 W RU 2015000419W WO 2016018176 A1 WO2016018176 A1 WO 2016018176A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic
files
protection
level
electronic key
Prior art date
Application number
PCT/RU2015/000419
Other languages
English (en)
Russian (ru)
Inventor
Геннадий Леонидович ВЫЧУЖИН
Original Assignee
Геннадий Леонидович ВЫЧУЖИН
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Геннадий Леонидович ВЫЧУЖИН filed Critical Геннадий Леонидович ВЫЧУЖИН
Publication of WO2016018176A1 publication Critical patent/WO2016018176A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04HBROADCAST COMMUNICATION
    • H04H60/00Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
    • H04H60/76Arrangements characterised by transmission systems other than for broadcast, e.g. the Internet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Definitions

  • USB tokens implement a fully trusted environment only in the USB token itself, and the rest of the resources of the electronic device are provided to the attacker for use against the protection tools carried out by the same USB token or USB key.
  • the claimed invention takes control of the entire electronic device (for example, a computer) and implements a fully trusted and protected environment in the entire electronic device, and fundamentally does not allow the use of software and hardware resources
  • the technical result of the claimed method is to limit the use of the capabilities of software, hardware and software and hardware resources of an electronic device for protection
  • a server containing files is created.
  • a server containing files (hereinafter referred to as SSF for short) is intended for the content and distribution of files that are protected by law to protect intellectual property rights.
  • SSF server containing files
  • the microprocessor of an electronic device can work only if an electronic key working according to the claimed method is connected to this device.
  • the microprocessor of this device first checks whether the electronic key is connected to this electronic device. If the electronic key is not connected, the microprocessor switches the electronic device off. If the microprocessor has detected an electronic key, then it finds out
  • the microprocessor checks if the key is connected
  • the microprocessor sends the detected electronic key information-question, which must be processed in the electronic key in accordance with the specified algorithm and return back to the microprocessor. If the key answer is correct, then the microprocessor continues its work. If there is no correct answer, the microprocessor turns off the electronic device.
  • the question-algorithm is embedded in the production of the microprocessor, as well as in the electronic key, the specified algorithm for processing information-question is embedded in the production of the electronic key.
  • the microprocessor of the electronic device can simultaneously interact with only one electronic key operating according to the claimed method.
  • the electronic key contains an operating system that identifies all files and electronic computing processes present in the electronic device, including files received from the SSF.
  • the electronic key operating system (hereinafter for the sake of brevity of the OSE) is a full-fledged operating system similar, for example, to the Linux operating system (what is the Linux operating system can be found at http: // ru. wikipedia.org/wiki/Linux). OSE is placed in an electronic key during its production.
  • Each electronic key used by the claimed method is assigned a unique external identification number
  • Each electronic key used by the claimed method is assigned a unique internal identification number, stitched in a chip
  • identification number is assigned a unique algorithm
  • Data on all unique numbers and encryption and decryption algorithms of all electronic keys working according to the claimed method is stored on a server containing files (SSF), which makes them belong to those working according to the claimed method.
  • SSF server containing files
  • any file distributed from the SSF is encrypted with an encryption algorithm that matches only this electronic key, and only this electronic key can decrypt this file.
  • code labels corresponding to the extension of this file are entered into the encrypted file, in accordance with the extension of this file (what extension can be found on
  • OSEC manages, controlling in an electronic device all electronic computing processes, and files with which
  • Control consists in determining what is possible for a given file and electronic computing process by it, and what is not.
  • OSEC distinguishes files received from the SSF by code marks that are entered into the files distributed from the SSF when they are encrypted, and these marks are unique for each key. Such files
  • the OSEC assigns the status “Files of the first level of protection”.
  • OSEC treats itself as a file of the first level of protection.
  • Electronic computing processes based on files of the first level of protection OSEC assigns the status of "Electronic computing processes of the first level of protection.”
  • OSEC makes it possible for files that have been encrypted in SSF and electronic computing processes based on them to be able to crack files and electronic compression processes, decompile, debug, dump, disassemble and other actions that have the potential for infringement of intellectual property rights its capabilities regarding OSEC, as well as files and electronic computing processes of the first level of protection. OSEC implements this activity by identifying code labels for such files that have the potential for harmfulness to intellectual rights, and suppressing
  • Malware code tags are entered into files that have a malware potential when encrypted in SSF.
  • OSEC controlling an electronic device, identifies files
  • OSEC assigns the status of "Electronic Computing Processes of the Second Level of Protection” to electronic computing processes implemented on the basis of files of the second level of protection.
  • OSEC controls that files of the second level of protection
  • OSEC controls that files of the third level of protection
  • OSEC of this electronic device does not allow impact (hacking, copying, debugging, decompilation, disassembling, dumping, deleting, making changes and additions) to files and electronic computing processes of the first and second level of protection from any files and electronic computing processes of other electronic devices.
  • the analogue gap includes the circumstance presented in the last paragraph of the “Efficiency” section on the resource
  • analogue gap if music is heard with ears, then it * can be recorded with a microphone, if a book can be read, then it can also be scanned.
  • Such malicious software if it gets into an electronic device equipped with an electronic key that works according to the claimed method, it will of course be perceived by the OSE as a file of the third level of protection with corresponding restrictions in activity.
  • the claimed method includes the use of at least one server that contains files intended for protection
  • the claimed method includes the use of unlimited
  • Each electronic key used by the claimed method is assigned a unique external identification number
  • Each electronic key used by the claimed method is assigned a unique internal identification number, stitched in a chip
  • identification number is assigned a unique algorithm
  • any file distributed from the SSF is encrypted with an encryption algorithm that matches only this electronic key, and only this electronic key can decrypt this file.
  • the encrypted file in accordance with the extension of this file, is entered
  • An electronic device with a microprocessor is turned on.
  • the microprocessor of this device first checks whether the electronic key is connected to this electronic device. If the electronic key is not connected, then the microprocessor is electronic
  • the device turns off. If the microprocessor has detected an electronic key, then it will find out whether the detected electronic key corresponds to an electronic key operating according to the claimed method.
  • the microprocessor sends the detected electronic key information-question, which must be processed in an electronic key working according to the claimed method in accordance with a given algorithm and return back to the microprocessor. If the key answer is correct, then the key corresponds to the claimed method and
  • microprocessor continues its work. If there is no correct answer, the microprocessor turns off the electronic device. Moreover, according to
  • the microprocessor of the electronic device can simultaneously interact with only one electronic key operating according to the claimed method.
  • the question-algorithm is laid in the production of the microprocessor, as well as in the electronic key, the specified algorithm for processing information-question is laid in the production
  • OSEC manages, controlling in an electronic device all electronic computing processes, and files with which
  • Control consists in determining what is possible for a given file and electronic computing process by it, and what is not.
  • OSEC distinguishes files received from the SSF by code marks that are entered into the files distributed from the SSF when they are encrypted, and these marks are unique for each key. Such files
  • OSEC assigns the status “Files of the first level of protection”. OSEC treats itself as a file of the first level of protection. Electronic computing processes based on files of the first level of protection, OSEC assigns the status of "Electronic computing processes of the first level of protection.”
  • OSEC restricts the use of the capabilities of files encrypted in SSF and electronic computing processes based on them, which have the ability to crack files and electronic computing processes, decompilation, debugging, dumping,
  • OSEC implements this activity by identifying code labels of such files that have the potential for harmfulness of intellectual rights, and suppressing the impact of such files and electronic computing
  • Malware code tags are entered into files that have a malware potential when encrypted in SSF.
  • OSEC controlling an electronic device, identifies files
  • OSEC assigns the status of "Electronic Computing Processes of the Second Level of Protection” to electronic computing processes implemented on the basis of files of the second level of protection.
  • OSEC controls that files of the second level of protection
  • OSEC controls that files of the third level of protection
  • OSEC of this electronic device does not allow impact (hacking, copying, debugging, decompilation, disassembling, dumping, deleting, making changes and additions) to files and

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

L'invention concerne un procédé dont le but est de limiter l'utilisation de ressources logicielles, matérielles et logicielles-matérielles possibles d'un dispositif électronique en vue de la protection des droits de propriété intellectuelle. Ce procédé se rapporte au domaine des techniques d'information, dans le domaine de la protection des droits de propriété intellectuelle. Selon l'invention, le dispositif électronique ne fonctionne pas sans clé électronique, et la clé électronique comprend un système d'exploitation qui assure la commande du dispositif électronique, ceci en commandant dans le dispositif électronique tous les processus informatiques ainsi que les fichiers avec lesquels tous ces processus informatiques sont en interaction. La commande consiste à déterminer ce que peuvent effectuer un fichier donné et le processus logiciel, et ce qu'ils ne peuvent pas. Les fichiers faisant l'objet d'une protection selon ce procédé de protection contre une infraction aux droits de propriété intellectuelle sont stockés sur un serveur qui comprend également des données concernant toutes les clés électroniques fonctionnant selon un procédé donné. Ces fichiers sont diffusés vers des acheteurs sous forme chiffrée, et leur déchiffrage peut se faire uniquement à l'aide d'une clé électronique correspondant à un fichier donné.
PCT/RU2015/000419 2014-08-01 2015-07-06 Procédé de protection de droits de propriété intellectuelle et de dispositifs d'utilisateur WO2016018176A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
RU2014132028 2014-08-01
RU2014132028A RU2014132028A (ru) 2014-08-01 2014-08-01 Способ ограничения применения возможностей программных, аппаратных и программно-аппаратных ресурсов электронного устройства для защиты интеллектуальных прав

Publications (1)

Publication Number Publication Date
WO2016018176A1 true WO2016018176A1 (fr) 2016-02-04

Family

ID=55217919

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/RU2015/000419 WO2016018176A1 (fr) 2014-08-01 2015-07-06 Procédé de protection de droits de propriété intellectuelle et de dispositifs d'utilisateur

Country Status (2)

Country Link
RU (1) RU2014132028A (fr)
WO (1) WO2016018176A1 (fr)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2011139470A (ru) * 2011-09-28 2013-04-10 Геннадий Леонидович Вычужин Способ защиты в сфере информационных технологий интеллектуальных прав и прав собственности на приобретенные результаты интеллектуальной деятельности

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2011139470A (ru) * 2011-09-28 2013-04-10 Геннадий Леонидович Вычужин Способ защиты в сфере информационных технологий интеллектуальных прав и прав собственности на приобретенные результаты интеллектуальной деятельности

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
«ALLADIN R.D.»: "Programmno-apparatnyi kompleks autentifikatsii i khraneniia kliuchevoi informatsii polzovatelei Elektronnyi kliuch eTokep 5.", RUKOVODSTVO ADMINISTRATORA., 2008, pages 43, Retrieved from the Internet <URL:<http://fileregionuc.nso.ru/drivers/eToken/Dokumentatsiia/eToken%205%20PykovodCTBO%20Administratora%20425000.003-05PA.pdf>> [retrieved on 20150921] *
DOROZHIN A.: "DRM ili upravlenie tsifrovymi pravami.", MOBILE-REVIEW.COM, 26 December 2006 (2006-12-26), pages 1 - 19, Retrieved from the Internet <URL:http://www.mobilereview.com/print.phpfilename=/mp3/articles/drm.shtml> *
RUKOVODSTVO POLZOVATELIA., AUTENTIFIKATSIIA V WINDOWS I V PRILOZHENIIAKH S ISPOLZOVANIEM ELEKTRONNYKH KLIUCHEI., 2006, Moscow, pages 41, Retrieved from the Internet <URL:http://www.ognelis.ru/files/catalog/products/isbc/access_ra.pdf> [retrieved on 20150921] *

Also Published As

Publication number Publication date
RU2014132028A (ru) 2016-02-20

Similar Documents

Publication Publication Date Title
Nagra et al. Surreptitious software: obfuscation, watermarking, and tamperproofing for software protection
US9208334B2 (en) Content management using multiple abstraction layers
CN1327357C (zh) 用于验证的系统和方法
JP6072091B2 (ja) アプリケーション・プログラム用の安全なアクセス方法および安全なアクセス装置
KR102076878B1 (ko) 안티 멀웨어 프로세스를 보호하는 기법
US9338012B1 (en) Systems and methods for identifying code signing certificate misuse
US9047445B2 (en) Memory device and method for updating a security module
WO2002052386A2 (fr) Procede et systeme permettant de controler l&#39;integrite d&#39;un logiciel au moyen d&#39;un assistant materiel securise
US9881142B2 (en) Method and apparatus for preventing and investigating software piracy
EP2425369B1 (fr) Dispositif mémoire et procédé pour une protection adaptative de contenu
US20170061164A1 (en) Two-device scrambled display
US20160162858A1 (en) Screening architectures enabling revocation and update
KR101859823B1 (ko) 키 백업을 사용한 랜섬웨어 방지 시스템 및 방법
US20070198857A1 (en) Software execution protection using an active entity
JP2011150524A (ja) ソフトウェア実行システム
KR101164564B1 (ko) 콘텐트 및 다른 복제를 금지하기 위한 컴퓨터 인에이블링된 방법 및 장치
CN114070548A (zh) 一种基于软加密狗装置的软件版权加密保护方法
Zaidenberg et al. Trusted computing and drm
Rao et al. Malicious software and anti-virus software
EP2341459A1 (fr) Procédé et dispositif pour détecter si un fichier informatique a été copié et procédé et dispositif pour permettre cette détection
CN112805698A (zh) 呈现由多个drm保护的内容
WO2016018176A1 (fr) Procédé de protection de droits de propriété intellectuelle et de dispositifs d&#39;utilisateur
Khan et al. A Comparative Analysis of Software Protection Schemes.
JP2010244261A (ja) 情報処理装置、情報処理方法
Korhonen Piracy prevention methods in software business

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15827736

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 05/07/2017)

122 Ep: pct application non-entry in european phase

Ref document number: 15827736

Country of ref document: EP

Kind code of ref document: A1