WO1998042099A1 - New methods for protecting vital information/commercial products from illegal usage/reproduction - Google Patents
New methods for protecting vital information/commercial products from illegal usage/reproduction Download PDFInfo
- Publication number
- WO1998042099A1 WO1998042099A1 PCT/JP1997/000807 JP9700807W WO9842099A1 WO 1998042099 A1 WO1998042099 A1 WO 1998042099A1 JP 9700807 W JP9700807 W JP 9700807W WO 9842099 A1 WO9842099 A1 WO 9842099A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- contents
- software products
- rom
- reproduction
- information
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 230000004075 alteration Effects 0.000 claims 1
- 238000010079 rubber tapping Methods 0.000 abstract description 2
- 150000002500 ions Chemical class 0.000 description 3
- 230000006835 compression Effects 0.000 description 2
- 238000007906 compression Methods 0.000 description 2
- -1 protec ion Chemical class 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/355—Personalisation of cards for use
- G06Q20/3552—Downloading or loading of personalisation data
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- This invention relates to new methods for protecting vital information
- vital information such as password, PIN, or credit
- card number is transferred over a network with no encryption (as is) or with
- CD-ROM e.g.
- Such pubI ished encryption methods include: CryptographicApparatus and
- this inven ion uses any theoretical ly undecipherable encoding method based on the fractal theory to work around the possibility of being
- the present invention uses any theoretical ly undecipherable encoding
- the present invention is provided as a software program such as a DLL.
- vital information such as password, PIN, or credit card number
- transferred over a network can be protected by using the same encoding method
- vital information wi 11 be encoded along with other known information such as
- a network can be protected from i I legal usage (I ike as freeware) or i I legal
- the generation of media-unique information may be
- TRACKOO.CDA when music or images are written on CD-ROM
- An example fol lows (1) ' Manufacturer ' rites media-unique information on CD-ROM with the present
- the present invention of applying the fractal encoding methods for
- usage/reproduction can be appI ied to user authentication, electronic banking,
- network e.g., Internet. It can also be appI ied to authentication of contents
- CD-ROM such as music and images.
Abstract
New methods using any encoding method based on the fractal theory, proved to be theoretically undecipherable, for protecting vital information only known to concerned parties such as password, PIN, or credit card number transferred over a network from being cracked by wire-tapping or some other means, or software products or contents (music, images, etc.) distributed across a network or written on CD-ROM from illegal usage or illegal reproduction (piracy). This invention is materialized as a software program such as a DLL (dynamic link library), and may be implemented as a firmware.
Description
Description
NEW METHODS FOR PROTECTING VITAL INFORMATION / COMMERCIAL PRODUCTS FROM
ILLEGAL USAGE / REPRODUCTION
Technical Field
This invention relates to new methods for protecting vital information
only known to concerned parties such as password, PIN, or credit card number
transferred over a network from being cracked by wire-tapping or some other
means, or software products or contents (music, images, etc) distributed
across a network or written on CD-ROM from illegal usage or illegal
reproduction (piracy).
Background
In the prior art, vital information such as password, PIN, or credit
card number is transferred over a network with no encryption (as is) or with
one of published or proprietary encryption techniques, with key(s) (public
key and private key; the former is known to anybody, and the latter is known
to each of concerned parties only), or without keys (such as in proprietary
one-time password generator), which are considered to be mathematical ly very
difficult to crack (i.e., taking a great amount of time to find the original
information). This is also true for software products or contents (music,
images, etc) transferred across a network or written on CD-ROM (e.g.
protection is carried out through a CD key printed on a label of each CD-
ROM or no protec ion is provided at al I) or other conventional media. Most
of regular commercial software products and contents CD-ROMs are
protection-free to allow the pirate business.
Such pubI ished encryption methods include: CryptographicApparatus and
Method (U.S. Patent No.4,200,770), Publ ic Key Cryptographic Apparatus and
Method (4,218,582), Exponentation Cryptographic Apparatus and Method
(4,424,414), Cryprographic Communica ions System and Method (4,405,829), and
Method for Identifying Subscribers and for Generating and Verifying
Electronic Signatures in a Data Exchange System (4,995,082).
However, the prior art as such requires a great amount of computation
in encryption and decryption and may be subject to being cracked in some cases.
In addition, in order to improve security, the number of bits in a key must
be increased, which wouId further Iengthen thecomputation time and compI icate
the logic to implement the algorithm.
The information already known to concerned parties such as password,
PIN, or creadit card number need not be deciphered if the both parties use
the same encoding method.
Also, software products or contents can be protected from i I legal usage
or illegal reproduction by attaching special information which is only
enciphered for the same reason as above when both manufactured and used.
Hence, this inven ion uses any theoretical ly undecipherable encoding
method based on the fractal theory to work around the possibility of being
cracked, whi le al lowing concerned parties to share vital information or to
use software products or contents, with drastical ly shorter computation time
and much simpler logic to implement the algorithm.
Disclosure of Invention
The present invention uses any theoretical ly undecipherable encoding
method based on the fractal theory. In general , any. of such methods is used
mainly for image compression (because they were invented for such purpose),
which are proved not to be completely decoded (there is no way to restore
complete original images; Ref. Fracta/ /mage Compress ion Theory And
Application Editor Yuval Fisher, published by Springer-Verlag, 1994). In
the present invention, this nature of the fractal encoding is applied to
protecting vital/commercial information from illegal usage or illegal
reproduction, whereby only concerned parties, who are permitted to know or
use vital information, or software products or contents, can apply the same
method to encode the same information to get the same result (there is no
decoding process involved), whi le providing no clues to this information to
thosenot concerned, unless of course they happen to know thevital information
by some other means I ike a simple guessing, eavesdropping, overlooking, or
threatening any of which is beyond the scope of the present invention.
THIS TYPE OF APPLICATION OF THE FRACTAL ENCODING METHODS TO THE
PROTECTION OF VITAL INFORMATION/COMMERCIAL PRODUCTS IS TOTALLY NEW ANDUNIQUE
TO THE PRESENT INVENTION.
Best Mode of Carrying Out the Invention
The present invention is provided as a software program such as a DLL.
It may also be implemented as a firmware. Several embodiments of the present
invention are disclosed herein.
First, vital information such as password, PIN, or credit card number
transferred over a network can be protected by using the same encoding method
based on fractal theory on both ends (sender and recipient). In this case,
vital information wi 11 be encoded along with other known information such as
a timestamp or a certain predefined one-time data to avoid anybody else's using
the encoded information as aval id transaction. This invention is useful for
user authen ica ion, electronic banking, and electronic commerce. An example
fo11ows:
(1) 'Center' sends 'Enter Password:'+timestamp to 'Terminal'.
(2) 'Terminal' returns Password+timestamp encoded with the present invention.
(3) 'Center' encodes stored password+timestamp and checks if the received
encoded password+timestamp matches this encoded password+timestamp with the
present invention.
(6) If they match, password proves correct. Otherwise, password proves
incorrect.
Secondly, commercial software products or contents distributed across
a network can be protected from i I legal usage (I ike as freeware) or i I legal
reproduction (piracy) by a recipient, by using this encoding method to
generate media-unique information on the media where products or contents are
installed (downloaded). The generation of media-unique information may be
achieved upon registration or I icense provision (without it, the products or
contents should be disabled). An example follows:
(1) 'User' downloads software products or contents from 'Center' or 'Home
Page', which are disabled when downloaded.
(2) Then 'User' requests registration or I icense for the products or contents.
(3) At this timing, media-unique information is generated with the present
invention, such as a DLL supplied by manufacturer.
(4) Now, software products or contents are enabled.
Thirdly, by using this method to write additional media-unique
information, say as TRACKOO.CDA, when music or images are written on CD-ROM,
only legal Iy obtained me iacan be used w i le prohibiting i I legal reproduction
to be made. (Actually, reproduction can be made, but since media-unique
information is differnt from CD-ROM to CD-ROM, copied information will be
considered inval id by players which would implement the present invention.)
In this case, the standard pertaining to the CD-ROM format and the devices
to play the contents on CD-ROM may be affected. An example fol lows:
(1) 'Manufacturer' rites media-unique information on CD-ROM with the present
invention as TRACKOO.CDA along with the contents.
(2) 'User"s player checks if TRACKOO.CDA contains valid information.
(3) If so, the contents (music, images, etc) can be played (legal CD-ROM).
Otherwise, the contents can not be played (illegal CD-ROM).
Industrial Applicability
The present invention of applying the fractal encoding methods for
protecting vital information/commercial products from illegal
usage/reproduction can be appI ied to user authentication, electronic banking,
electronic commerce, and software products/contents distribution over a
network, e.g., Internet. It can also be appI ied to authentication of contents
written on CD-ROM such as music and images.
Claims
1. A new method for protecting vi taI information such as password,
PIN, or credit card number transferred over a network by using any fractal
theory-based undecipherable encoding method on both ends (sender and
recipient).
2. A new method for prohibiting i I legal reproduction of software
products or contents distributed over a network by using any fractal
theory-based undecipherable encoding method on recipient side to write
media-unique information on the media where software products or contents are
instaI led (downloaded) upon registration or I icense provision. This encoding
method wi 11 be provided by sel lers of software products or contents along with
software products or contents when downloaded.
3. A new method for prohibiting i I legal reproduction of contents
on CD-ROM such as music or images by using any fractal theory-based
undecipherabIe encoding method to write media-unique information on the media
upon production. This wi 11 involve the alteration to the standard pertaining
to the CD-ROM format and the devices to play the contents on CD-ROM to handle
this additional information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP1997/000807 WO1998042099A1 (en) | 1997-03-14 | 1997-03-14 | New methods for protecting vital information/commercial products from illegal usage/reproduction |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP1997/000807 WO1998042099A1 (en) | 1997-03-14 | 1997-03-14 | New methods for protecting vital information/commercial products from illegal usage/reproduction |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1998042099A1 true WO1998042099A1 (en) | 1998-09-24 |
Family
ID=14180214
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP1997/000807 WO1998042099A1 (en) | 1997-03-14 | 1997-03-14 | New methods for protecting vital information/commercial products from illegal usage/reproduction |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO1998042099A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
NL1015702C2 (en) * | 2000-07-13 | 2002-01-15 | Dia Services B V | System for registering a writable medium, system for authenticating a writable medium, as well as servers and client system for such systems. |
US7266693B1 (en) * | 2007-02-13 | 2007-09-04 | U.S. Bancorp Licensing, Inc. | Validated mutual authentication |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0561685A2 (en) * | 1992-03-16 | 1993-09-22 | Fujitsu Limited | An electronic data protection system |
FR2732810A1 (en) * | 1995-04-04 | 1996-10-11 | Flinois Jean | Serial number application device for optical disc |
-
1997
- 1997-03-14 WO PCT/JP1997/000807 patent/WO1998042099A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0561685A2 (en) * | 1992-03-16 | 1993-09-22 | Fujitsu Limited | An electronic data protection system |
FR2732810A1 (en) * | 1995-04-04 | 1996-10-11 | Flinois Jean | Serial number application device for optical disc |
Non-Patent Citations (2)
Title |
---|
DAVERN P ET AL: "Fractal-based image steganography", INFORMATION HIDING. FIRST INTERNATIONAL WORKSHOP PROCEEDINGS, INFORMATION HIDING FIRST INTERNATIONAL WORKSHOP, CAMBRIDGE, UK, 30 MAY-1 JUNE 1996, ISBN 3-540-61996-8, 1996, BERLIN, GERMANY, SPRINGER-VERLAG, GERMANY, pages 279 - 294, XP002048612 * |
YOSHIOKA M: "MOWARE AND SUPERDISTRIBUTION", FUJITSU-SCIENTIFIC AND TECHNICAL JOURNAL, vol. 31, no. 1, June 1995 (1995-06-01), pages 76 - 82, XP000524137 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
NL1015702C2 (en) * | 2000-07-13 | 2002-01-15 | Dia Services B V | System for registering a writable medium, system for authenticating a writable medium, as well as servers and client system for such systems. |
WO2002006927A1 (en) * | 2000-07-13 | 2002-01-24 | Dia Services Bv | System for registering a recordable medium, system for authenticating a recordable medium, as well as servers and a client system for such systems |
US7266693B1 (en) * | 2007-02-13 | 2007-09-04 | U.S. Bancorp Licensing, Inc. | Validated mutual authentication |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1647444B (en) | Method and system for using tamperproof hardware to provide copy protection and online security | |
US7738659B2 (en) | Multiple transform utilization and application for secure digital watermarking | |
US6976162B1 (en) | Platform and method for establishing provable identities while maintaining privacy | |
US7376624B2 (en) | Secure communication and real-time watermarking using mutating identifiers | |
US5602918A (en) | Application level security system and method | |
US7529938B2 (en) | Method, apparatus and system for performing authentication according to challenge-response protocol using scrambled access information | |
EP1258092B1 (en) | System and method for protecting data streams in hardware components | |
EP1992101A2 (en) | Secure data transmission using undiscoverable or black data | |
PL182122B1 (en) | Method of and apparatus for enconding, recording method and carrier, method of and apparatus for decoding | |
EP1120934B1 (en) | Method and apparatus for key distribution using a key base | |
JP2007013433A (en) | Method for transmitting/receiving encrypted data and information processing system | |
AU2004248746A1 (en) | Improved secure authenticated channel | |
EP1130528A4 (en) | Electronic information backup system | |
KR20100133410A (en) | Method for preventing laundering and repackaging of multimedia content in content distribution systems | |
KR20040019025A (en) | Encrypted data delivery system | |
JP2001175605A5 (en) | ||
CN1822165B (en) | Secure pre-recorded digital medium and descrambling and providing method of encrypted content | |
JP4713745B2 (en) | Authentication communication apparatus and authentication communication system | |
WO1998042099A1 (en) | New methods for protecting vital information/commercial products from illegal usage/reproduction | |
WO2000056009A1 (en) | Internet, intranet and other network communication security systems utilizing entrance and exit keys | |
KR20090062443A (en) | Digital contents providing method and storage medium recording that method program, digital contens providing system and user terminal | |
EP1733328B1 (en) | Non-algorithmic vectored steganography | |
JPH10228375A (en) | Electronic distribution system | |
JP2003174442A (en) | Cryptographic key generation processing method | |
Shih et al. | A robust copyright and ownership protection mechanism for music |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): JP US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP Ref document number: 1998540300 Format of ref document f/p: F |