WO1998042099A1 - New methods for protecting vital information/commercial products from illegal usage/reproduction - Google Patents

New methods for protecting vital information/commercial products from illegal usage/reproduction Download PDF

Info

Publication number
WO1998042099A1
WO1998042099A1 PCT/JP1997/000807 JP9700807W WO9842099A1 WO 1998042099 A1 WO1998042099 A1 WO 1998042099A1 JP 9700807 W JP9700807 W JP 9700807W WO 9842099 A1 WO9842099 A1 WO 9842099A1
Authority
WO
WIPO (PCT)
Prior art keywords
contents
software products
rom
reproduction
information
Prior art date
Application number
PCT/JP1997/000807
Other languages
French (fr)
Inventor
Joji Sakai
Original Assignee
Summersoft Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Summersoft Co., Ltd. filed Critical Summersoft Co., Ltd.
Priority to PCT/JP1997/000807 priority Critical patent/WO1998042099A1/en
Publication of WO1998042099A1 publication Critical patent/WO1998042099A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • G06Q20/3552Downloading or loading of personalisation data
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00094Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Definitions

  • This invention relates to new methods for protecting vital information
  • vital information such as password, PIN, or credit
  • card number is transferred over a network with no encryption (as is) or with
  • CD-ROM e.g.
  • Such pubI ished encryption methods include: CryptographicApparatus and
  • this inven ion uses any theoretical ly undecipherable encoding method based on the fractal theory to work around the possibility of being
  • the present invention uses any theoretical ly undecipherable encoding
  • the present invention is provided as a software program such as a DLL.
  • vital information such as password, PIN, or credit card number
  • transferred over a network can be protected by using the same encoding method
  • vital information wi 11 be encoded along with other known information such as
  • a network can be protected from i I legal usage (I ike as freeware) or i I legal
  • the generation of media-unique information may be
  • TRACKOO.CDA when music or images are written on CD-ROM
  • An example fol lows (1) ' Manufacturer ' rites media-unique information on CD-ROM with the present
  • the present invention of applying the fractal encoding methods for
  • usage/reproduction can be appI ied to user authentication, electronic banking,
  • network e.g., Internet. It can also be appI ied to authentication of contents
  • CD-ROM such as music and images.

Abstract

New methods using any encoding method based on the fractal theory, proved to be theoretically undecipherable, for protecting vital information only known to concerned parties such as password, PIN, or credit card number transferred over a network from being cracked by wire-tapping or some other means, or software products or contents (music, images, etc.) distributed across a network or written on CD-ROM from illegal usage or illegal reproduction (piracy). This invention is materialized as a software program such as a DLL (dynamic link library), and may be implemented as a firmware.

Description

Description
NEW METHODS FOR PROTECTING VITAL INFORMATION / COMMERCIAL PRODUCTS FROM
ILLEGAL USAGE / REPRODUCTION
Technical Field
This invention relates to new methods for protecting vital information
only known to concerned parties such as password, PIN, or credit card number
transferred over a network from being cracked by wire-tapping or some other
means, or software products or contents (music, images, etc) distributed
across a network or written on CD-ROM from illegal usage or illegal
reproduction (piracy).
Background
In the prior art, vital information such as password, PIN, or credit
card number is transferred over a network with no encryption (as is) or with
one of published or proprietary encryption techniques, with key(s) (public
key and private key; the former is known to anybody, and the latter is known
to each of concerned parties only), or without keys (such as in proprietary
one-time password generator), which are considered to be mathematical ly very
difficult to crack (i.e., taking a great amount of time to find the original
information). This is also true for software products or contents (music,
images, etc) transferred across a network or written on CD-ROM (e.g.
protection is carried out through a CD key printed on a label of each CD- ROM or no protec ion is provided at al I) or other conventional media. Most
of regular commercial software products and contents CD-ROMs are
protection-free to allow the pirate business.
Such pubI ished encryption methods include: CryptographicApparatus and
Method (U.S. Patent No.4,200,770), Publ ic Key Cryptographic Apparatus and
Method (4,218,582), Exponentation Cryptographic Apparatus and Method
(4,424,414), Cryprographic Communica ions System and Method (4,405,829), and
Method for Identifying Subscribers and for Generating and Verifying
Electronic Signatures in a Data Exchange System (4,995,082).
However, the prior art as such requires a great amount of computation
in encryption and decryption and may be subject to being cracked in some cases.
In addition, in order to improve security, the number of bits in a key must
be increased, which wouId further Iengthen thecomputation time and compI icate
the logic to implement the algorithm.
The information already known to concerned parties such as password,
PIN, or creadit card number need not be deciphered if the both parties use
the same encoding method.
Also, software products or contents can be protected from i I legal usage
or illegal reproduction by attaching special information which is only
enciphered for the same reason as above when both manufactured and used.
Hence, this inven ion uses any theoretical ly undecipherable encoding method based on the fractal theory to work around the possibility of being
cracked, whi le al lowing concerned parties to share vital information or to
use software products or contents, with drastical ly shorter computation time
and much simpler logic to implement the algorithm.
Disclosure of Invention
The present invention uses any theoretical ly undecipherable encoding
method based on the fractal theory. In general , any. of such methods is used
mainly for image compression (because they were invented for such purpose),
which are proved not to be completely decoded (there is no way to restore
complete original images; Ref. Fracta/ /mage Compress ion Theory And
Application Editor Yuval Fisher, published by Springer-Verlag, 1994). In
the present invention, this nature of the fractal encoding is applied to
protecting vital/commercial information from illegal usage or illegal
reproduction, whereby only concerned parties, who are permitted to know or
use vital information, or software products or contents, can apply the same
method to encode the same information to get the same result (there is no
decoding process involved), whi le providing no clues to this information to
thosenot concerned, unless of course they happen to know thevital information
by some other means I ike a simple guessing, eavesdropping, overlooking, or
threatening any of which is beyond the scope of the present invention.
THIS TYPE OF APPLICATION OF THE FRACTAL ENCODING METHODS TO THE PROTECTION OF VITAL INFORMATION/COMMERCIAL PRODUCTS IS TOTALLY NEW ANDUNIQUE
TO THE PRESENT INVENTION.
Best Mode of Carrying Out the Invention
The present invention is provided as a software program such as a DLL.
It may also be implemented as a firmware. Several embodiments of the present
invention are disclosed herein.
First, vital information such as password, PIN, or credit card number
transferred over a network can be protected by using the same encoding method
based on fractal theory on both ends (sender and recipient). In this case,
vital information wi 11 be encoded along with other known information such as
a timestamp or a certain predefined one-time data to avoid anybody else's using
the encoded information as aval id transaction. This invention is useful for
user authen ica ion, electronic banking, and electronic commerce. An example
fo11ows:
(1) 'Center' sends 'Enter Password:'+timestamp to 'Terminal'.
(2) 'Terminal' returns Password+timestamp encoded with the present invention.
(3) 'Center' encodes stored password+timestamp and checks if the received
encoded password+timestamp matches this encoded password+timestamp with the
present invention.
(6) If they match, password proves correct. Otherwise, password proves
incorrect. Secondly, commercial software products or contents distributed across
a network can be protected from i I legal usage (I ike as freeware) or i I legal
reproduction (piracy) by a recipient, by using this encoding method to
generate media-unique information on the media where products or contents are
installed (downloaded). The generation of media-unique information may be
achieved upon registration or I icense provision (without it, the products or
contents should be disabled). An example follows:
(1) 'User' downloads software products or contents from 'Center' or 'Home
Page', which are disabled when downloaded.
(2) Then 'User' requests registration or I icense for the products or contents.
(3) At this timing, media-unique information is generated with the present
invention, such as a DLL supplied by manufacturer.
(4) Now, software products or contents are enabled.
Thirdly, by using this method to write additional media-unique
information, say as TRACKOO.CDA, when music or images are written on CD-ROM,
only legal Iy obtained me iacan be used w i le prohibiting i I legal reproduction
to be made. (Actually, reproduction can be made, but since media-unique
information is differnt from CD-ROM to CD-ROM, copied information will be
considered inval id by players which would implement the present invention.)
In this case, the standard pertaining to the CD-ROM format and the devices
to play the contents on CD-ROM may be affected. An example fol lows: (1) 'Manufacturer' rites media-unique information on CD-ROM with the present
invention as TRACKOO.CDA along with the contents.
(2) 'User"s player checks if TRACKOO.CDA contains valid information.
(3) If so, the contents (music, images, etc) can be played (legal CD-ROM).
Otherwise, the contents can not be played (illegal CD-ROM).
Industrial Applicability
The present invention of applying the fractal encoding methods for
protecting vital information/commercial products from illegal
usage/reproduction can be appI ied to user authentication, electronic banking,
electronic commerce, and software products/contents distribution over a
network, e.g., Internet. It can also be appI ied to authentication of contents
written on CD-ROM such as music and images.

Claims

1. A new method for protecting vi taI information such as password,
PIN, or credit card number transferred over a network by using any fractal
theory-based undecipherable encoding method on both ends (sender and
recipient).
2. A new method for prohibiting i I legal reproduction of software
products or contents distributed over a network by using any fractal
theory-based undecipherable encoding method on recipient side to write
media-unique information on the media where software products or contents are
instaI led (downloaded) upon registration or I icense provision. This encoding
method wi 11 be provided by sel lers of software products or contents along with
software products or contents when downloaded.
3. A new method for prohibiting i I legal reproduction of contents
on CD-ROM such as music or images by using any fractal theory-based
undecipherabIe encoding method to write media-unique information on the media
upon production. This wi 11 involve the alteration to the standard pertaining
to the CD-ROM format and the devices to play the contents on CD-ROM to handle
this additional information.
PCT/JP1997/000807 1997-03-14 1997-03-14 New methods for protecting vital information/commercial products from illegal usage/reproduction WO1998042099A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/JP1997/000807 WO1998042099A1 (en) 1997-03-14 1997-03-14 New methods for protecting vital information/commercial products from illegal usage/reproduction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP1997/000807 WO1998042099A1 (en) 1997-03-14 1997-03-14 New methods for protecting vital information/commercial products from illegal usage/reproduction

Publications (1)

Publication Number Publication Date
WO1998042099A1 true WO1998042099A1 (en) 1998-09-24

Family

ID=14180214

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP1997/000807 WO1998042099A1 (en) 1997-03-14 1997-03-14 New methods for protecting vital information/commercial products from illegal usage/reproduction

Country Status (1)

Country Link
WO (1) WO1998042099A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NL1015702C2 (en) * 2000-07-13 2002-01-15 Dia Services B V System for registering a writable medium, system for authenticating a writable medium, as well as servers and client system for such systems.
US7266693B1 (en) * 2007-02-13 2007-09-04 U.S. Bancorp Licensing, Inc. Validated mutual authentication

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0561685A2 (en) * 1992-03-16 1993-09-22 Fujitsu Limited An electronic data protection system
FR2732810A1 (en) * 1995-04-04 1996-10-11 Flinois Jean Serial number application device for optical disc

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0561685A2 (en) * 1992-03-16 1993-09-22 Fujitsu Limited An electronic data protection system
FR2732810A1 (en) * 1995-04-04 1996-10-11 Flinois Jean Serial number application device for optical disc

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
DAVERN P ET AL: "Fractal-based image steganography", INFORMATION HIDING. FIRST INTERNATIONAL WORKSHOP PROCEEDINGS, INFORMATION HIDING FIRST INTERNATIONAL WORKSHOP, CAMBRIDGE, UK, 30 MAY-1 JUNE 1996, ISBN 3-540-61996-8, 1996, BERLIN, GERMANY, SPRINGER-VERLAG, GERMANY, pages 279 - 294, XP002048612 *
YOSHIOKA M: "MOWARE AND SUPERDISTRIBUTION", FUJITSU-SCIENTIFIC AND TECHNICAL JOURNAL, vol. 31, no. 1, June 1995 (1995-06-01), pages 76 - 82, XP000524137 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NL1015702C2 (en) * 2000-07-13 2002-01-15 Dia Services B V System for registering a writable medium, system for authenticating a writable medium, as well as servers and client system for such systems.
WO2002006927A1 (en) * 2000-07-13 2002-01-24 Dia Services Bv System for registering a recordable medium, system for authenticating a recordable medium, as well as servers and a client system for such systems
US7266693B1 (en) * 2007-02-13 2007-09-04 U.S. Bancorp Licensing, Inc. Validated mutual authentication

Similar Documents

Publication Publication Date Title
CN1647444B (en) Method and system for using tamperproof hardware to provide copy protection and online security
US7738659B2 (en) Multiple transform utilization and application for secure digital watermarking
US6976162B1 (en) Platform and method for establishing provable identities while maintaining privacy
US7376624B2 (en) Secure communication and real-time watermarking using mutating identifiers
US5602918A (en) Application level security system and method
US7529938B2 (en) Method, apparatus and system for performing authentication according to challenge-response protocol using scrambled access information
EP1258092B1 (en) System and method for protecting data streams in hardware components
EP1992101A2 (en) Secure data transmission using undiscoverable or black data
PL182122B1 (en) Method of and apparatus for enconding, recording method and carrier, method of and apparatus for decoding
EP1120934B1 (en) Method and apparatus for key distribution using a key base
JP2007013433A (en) Method for transmitting/receiving encrypted data and information processing system
AU2004248746A1 (en) Improved secure authenticated channel
EP1130528A4 (en) Electronic information backup system
KR20100133410A (en) Method for preventing laundering and repackaging of multimedia content in content distribution systems
KR20040019025A (en) Encrypted data delivery system
JP2001175605A5 (en)
CN1822165B (en) Secure pre-recorded digital medium and descrambling and providing method of encrypted content
JP4713745B2 (en) Authentication communication apparatus and authentication communication system
WO1998042099A1 (en) New methods for protecting vital information/commercial products from illegal usage/reproduction
WO2000056009A1 (en) Internet, intranet and other network communication security systems utilizing entrance and exit keys
KR20090062443A (en) Digital contents providing method and storage medium recording that method program, digital contens providing system and user terminal
EP1733328B1 (en) Non-algorithmic vectored steganography
JPH10228375A (en) Electronic distribution system
JP2003174442A (en) Cryptographic key generation processing method
Shih et al. A robust copyright and ownership protection mechanism for music

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): JP US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

Ref document number: 1998540300

Format of ref document f/p: F