WO2016018176A1 - Procédé de protection de droits de propriété intellectuelle et de dispositifs d'utilisateur - Google Patents
Procédé de protection de droits de propriété intellectuelle et de dispositifs d'utilisateur Download PDFInfo
- Publication number
- WO2016018176A1 WO2016018176A1 PCT/RU2015/000419 RU2015000419W WO2016018176A1 WO 2016018176 A1 WO2016018176 A1 WO 2016018176A1 RU 2015000419 W RU2015000419 W RU 2015000419W WO 2016018176 A1 WO2016018176 A1 WO 2016018176A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- electronic
- files
- protection
- level
- electronic key
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04H—BROADCAST COMMUNICATION
- H04H60/00—Arrangements for broadcast applications with a direct linking to broadcast information or broadcast space-time; Broadcast-related systems
- H04H60/76—Arrangements characterised by transmission systems other than for broadcast, e.g. the Internet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
Definitions
- USB tokens implement a fully trusted environment only in the USB token itself, and the rest of the resources of the electronic device are provided to the attacker for use against the protection tools carried out by the same USB token or USB key.
- the claimed invention takes control of the entire electronic device (for example, a computer) and implements a fully trusted and protected environment in the entire electronic device, and fundamentally does not allow the use of software and hardware resources
- the technical result of the claimed method is to limit the use of the capabilities of software, hardware and software and hardware resources of an electronic device for protection
- a server containing files is created.
- a server containing files (hereinafter referred to as SSF for short) is intended for the content and distribution of files that are protected by law to protect intellectual property rights.
- SSF server containing files
- the microprocessor of an electronic device can work only if an electronic key working according to the claimed method is connected to this device.
- the microprocessor of this device first checks whether the electronic key is connected to this electronic device. If the electronic key is not connected, the microprocessor switches the electronic device off. If the microprocessor has detected an electronic key, then it finds out
- the microprocessor checks if the key is connected
- the microprocessor sends the detected electronic key information-question, which must be processed in the electronic key in accordance with the specified algorithm and return back to the microprocessor. If the key answer is correct, then the microprocessor continues its work. If there is no correct answer, the microprocessor turns off the electronic device.
- the question-algorithm is embedded in the production of the microprocessor, as well as in the electronic key, the specified algorithm for processing information-question is embedded in the production of the electronic key.
- the microprocessor of the electronic device can simultaneously interact with only one electronic key operating according to the claimed method.
- the electronic key contains an operating system that identifies all files and electronic computing processes present in the electronic device, including files received from the SSF.
- the electronic key operating system (hereinafter for the sake of brevity of the OSE) is a full-fledged operating system similar, for example, to the Linux operating system (what is the Linux operating system can be found at http: // ru. wikipedia.org/wiki/Linux). OSE is placed in an electronic key during its production.
- Each electronic key used by the claimed method is assigned a unique external identification number
- Each electronic key used by the claimed method is assigned a unique internal identification number, stitched in a chip
- identification number is assigned a unique algorithm
- Data on all unique numbers and encryption and decryption algorithms of all electronic keys working according to the claimed method is stored on a server containing files (SSF), which makes them belong to those working according to the claimed method.
- SSF server containing files
- any file distributed from the SSF is encrypted with an encryption algorithm that matches only this electronic key, and only this electronic key can decrypt this file.
- code labels corresponding to the extension of this file are entered into the encrypted file, in accordance with the extension of this file (what extension can be found on
- OSEC manages, controlling in an electronic device all electronic computing processes, and files with which
- Control consists in determining what is possible for a given file and electronic computing process by it, and what is not.
- OSEC distinguishes files received from the SSF by code marks that are entered into the files distributed from the SSF when they are encrypted, and these marks are unique for each key. Such files
- the OSEC assigns the status “Files of the first level of protection”.
- OSEC treats itself as a file of the first level of protection.
- Electronic computing processes based on files of the first level of protection OSEC assigns the status of "Electronic computing processes of the first level of protection.”
- OSEC makes it possible for files that have been encrypted in SSF and electronic computing processes based on them to be able to crack files and electronic compression processes, decompile, debug, dump, disassemble and other actions that have the potential for infringement of intellectual property rights its capabilities regarding OSEC, as well as files and electronic computing processes of the first level of protection. OSEC implements this activity by identifying code labels for such files that have the potential for harmfulness to intellectual rights, and suppressing
- Malware code tags are entered into files that have a malware potential when encrypted in SSF.
- OSEC controlling an electronic device, identifies files
- OSEC assigns the status of "Electronic Computing Processes of the Second Level of Protection” to electronic computing processes implemented on the basis of files of the second level of protection.
- OSEC controls that files of the second level of protection
- OSEC controls that files of the third level of protection
- OSEC of this electronic device does not allow impact (hacking, copying, debugging, decompilation, disassembling, dumping, deleting, making changes and additions) to files and electronic computing processes of the first and second level of protection from any files and electronic computing processes of other electronic devices.
- the analogue gap includes the circumstance presented in the last paragraph of the “Efficiency” section on the resource
- analogue gap if music is heard with ears, then it * can be recorded with a microphone, if a book can be read, then it can also be scanned.
- Such malicious software if it gets into an electronic device equipped with an electronic key that works according to the claimed method, it will of course be perceived by the OSE as a file of the third level of protection with corresponding restrictions in activity.
- the claimed method includes the use of at least one server that contains files intended for protection
- the claimed method includes the use of unlimited
- Each electronic key used by the claimed method is assigned a unique external identification number
- Each electronic key used by the claimed method is assigned a unique internal identification number, stitched in a chip
- identification number is assigned a unique algorithm
- any file distributed from the SSF is encrypted with an encryption algorithm that matches only this electronic key, and only this electronic key can decrypt this file.
- the encrypted file in accordance with the extension of this file, is entered
- An electronic device with a microprocessor is turned on.
- the microprocessor of this device first checks whether the electronic key is connected to this electronic device. If the electronic key is not connected, then the microprocessor is electronic
- the device turns off. If the microprocessor has detected an electronic key, then it will find out whether the detected electronic key corresponds to an electronic key operating according to the claimed method.
- the microprocessor sends the detected electronic key information-question, which must be processed in an electronic key working according to the claimed method in accordance with a given algorithm and return back to the microprocessor. If the key answer is correct, then the key corresponds to the claimed method and
- microprocessor continues its work. If there is no correct answer, the microprocessor turns off the electronic device. Moreover, according to
- the microprocessor of the electronic device can simultaneously interact with only one electronic key operating according to the claimed method.
- the question-algorithm is laid in the production of the microprocessor, as well as in the electronic key, the specified algorithm for processing information-question is laid in the production
- OSEC manages, controlling in an electronic device all electronic computing processes, and files with which
- Control consists in determining what is possible for a given file and electronic computing process by it, and what is not.
- OSEC distinguishes files received from the SSF by code marks that are entered into the files distributed from the SSF when they are encrypted, and these marks are unique for each key. Such files
- OSEC assigns the status “Files of the first level of protection”. OSEC treats itself as a file of the first level of protection. Electronic computing processes based on files of the first level of protection, OSEC assigns the status of "Electronic computing processes of the first level of protection.”
- OSEC restricts the use of the capabilities of files encrypted in SSF and electronic computing processes based on them, which have the ability to crack files and electronic computing processes, decompilation, debugging, dumping,
- OSEC implements this activity by identifying code labels of such files that have the potential for harmfulness of intellectual rights, and suppressing the impact of such files and electronic computing
- Malware code tags are entered into files that have a malware potential when encrypted in SSF.
- OSEC controlling an electronic device, identifies files
- OSEC assigns the status of "Electronic Computing Processes of the Second Level of Protection” to electronic computing processes implemented on the basis of files of the second level of protection.
- OSEC controls that files of the second level of protection
- OSEC controls that files of the third level of protection
- OSEC of this electronic device does not allow impact (hacking, copying, debugging, decompilation, disassembling, dumping, deleting, making changes and additions) to files and
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
L'invention concerne un procédé dont le but est de limiter l'utilisation de ressources logicielles, matérielles et logicielles-matérielles possibles d'un dispositif électronique en vue de la protection des droits de propriété intellectuelle. Ce procédé se rapporte au domaine des techniques d'information, dans le domaine de la protection des droits de propriété intellectuelle. Selon l'invention, le dispositif électronique ne fonctionne pas sans clé électronique, et la clé électronique comprend un système d'exploitation qui assure la commande du dispositif électronique, ceci en commandant dans le dispositif électronique tous les processus informatiques ainsi que les fichiers avec lesquels tous ces processus informatiques sont en interaction. La commande consiste à déterminer ce que peuvent effectuer un fichier donné et le processus logiciel, et ce qu'ils ne peuvent pas. Les fichiers faisant l'objet d'une protection selon ce procédé de protection contre une infraction aux droits de propriété intellectuelle sont stockés sur un serveur qui comprend également des données concernant toutes les clés électroniques fonctionnant selon un procédé donné. Ces fichiers sont diffusés vers des acheteurs sous forme chiffrée, et leur déchiffrage peut se faire uniquement à l'aide d'une clé électronique correspondant à un fichier donné.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
RU2014132028 | 2014-08-01 | ||
RU2014132028A RU2014132028A (ru) | 2014-08-01 | 2014-08-01 | Способ ограничения применения возможностей программных, аппаратных и программно-аппаратных ресурсов электронного устройства для защиты интеллектуальных прав |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016018176A1 true WO2016018176A1 (fr) | 2016-02-04 |
Family
ID=55217919
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/RU2015/000419 WO2016018176A1 (fr) | 2014-08-01 | 2015-07-06 | Procédé de protection de droits de propriété intellectuelle et de dispositifs d'utilisateur |
Country Status (2)
Country | Link |
---|---|
RU (1) | RU2014132028A (fr) |
WO (1) | WO2016018176A1 (fr) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2011139470A (ru) * | 2011-09-28 | 2013-04-10 | Геннадий Леонидович Вычужин | Способ защиты в сфере информационных технологий интеллектуальных прав и прав собственности на приобретенные результаты интеллектуальной деятельности |
-
2014
- 2014-08-01 RU RU2014132028A patent/RU2014132028A/ru not_active Application Discontinuation
-
2015
- 2015-07-06 WO PCT/RU2015/000419 patent/WO2016018176A1/fr active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2011139470A (ru) * | 2011-09-28 | 2013-04-10 | Геннадий Леонидович Вычужин | Способ защиты в сфере информационных технологий интеллектуальных прав и прав собственности на приобретенные результаты интеллектуальной деятельности |
Non-Patent Citations (3)
Title |
---|
«ALLADIN R.D.»: "Programmno-apparatnyi kompleks autentifikatsii i khraneniia kliuchevoi informatsii polzovatelei Elektronnyi kliuch eTokep 5.", RUKOVODSTVO ADMINISTRATORA., 2008, pages 43, Retrieved from the Internet <URL:<http://fileregionuc.nso.ru/drivers/eToken/Dokumentatsiia/eToken%205%20PykovodCTBO%20Administratora%20425000.003-05PA.pdf>> [retrieved on 20150921] * |
DOROZHIN A.: "DRM ili upravlenie tsifrovymi pravami.", MOBILE-REVIEW.COM, 26 December 2006 (2006-12-26), pages 1 - 19, Retrieved from the Internet <URL:http://www.mobilereview.com/print.phpfilename=/mp3/articles/drm.shtml> * |
RUKOVODSTVO POLZOVATELIA., AUTENTIFIKATSIIA V WINDOWS I V PRILOZHENIIAKH S ISPOLZOVANIEM ELEKTRONNYKH KLIUCHEI., 2006, Moscow, pages 41, Retrieved from the Internet <URL:http://www.ognelis.ru/files/catalog/products/isbc/access_ra.pdf> [retrieved on 20150921] * |
Also Published As
Publication number | Publication date |
---|---|
RU2014132028A (ru) | 2016-02-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nagra et al. | Surreptitious software: obfuscation, watermarking, and tamperproofing for software protection | |
US9208334B2 (en) | Content management using multiple abstraction layers | |
CN1327357C (zh) | 用于验证的系统和方法 | |
JP6072091B2 (ja) | アプリケーション・プログラム用の安全なアクセス方法および安全なアクセス装置 | |
KR102076878B1 (ko) | 안티 멀웨어 프로세스를 보호하는 기법 | |
US9338012B1 (en) | Systems and methods for identifying code signing certificate misuse | |
US9047445B2 (en) | Memory device and method for updating a security module | |
WO2002052386A2 (fr) | Procede et systeme permettant de controler l'integrite d'un logiciel au moyen d'un assistant materiel securise | |
US9881142B2 (en) | Method and apparatus for preventing and investigating software piracy | |
EP2425369B1 (fr) | Dispositif mémoire et procédé pour une protection adaptative de contenu | |
US20170061164A1 (en) | Two-device scrambled display | |
US20160162858A1 (en) | Screening architectures enabling revocation and update | |
KR101859823B1 (ko) | 키 백업을 사용한 랜섬웨어 방지 시스템 및 방법 | |
US20070198857A1 (en) | Software execution protection using an active entity | |
JP2011150524A (ja) | ソフトウェア実行システム | |
KR101164564B1 (ko) | 콘텐트 및 다른 복제를 금지하기 위한 컴퓨터 인에이블링된 방법 및 장치 | |
CN114070548A (zh) | 一种基于软加密狗装置的软件版权加密保护方法 | |
Zaidenberg et al. | Trusted computing and drm | |
Rao et al. | Malicious software and anti-virus software | |
EP2341459A1 (fr) | Procédé et dispositif pour détecter si un fichier informatique a été copié et procédé et dispositif pour permettre cette détection | |
CN112805698A (zh) | 呈现由多个drm保护的内容 | |
WO2016018176A1 (fr) | Procédé de protection de droits de propriété intellectuelle et de dispositifs d'utilisateur | |
Khan et al. | A Comparative Analysis of Software Protection Schemes. | |
JP2010244261A (ja) | 情報処理装置、情報処理方法 | |
Korhonen | Piracy prevention methods in software business |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15827736 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 05/07/2017) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15827736 Country of ref document: EP Kind code of ref document: A1 |