Method for protecting publicly distributed software
First Claim
1. A system for protecting computer software (120) from unauthorized execution within a computer system (100), the system comprising:
- a memory (116) within the computer system for containing a first part of the computer software;
a hardware key (122) attached to the computer system, the hardware key (122) for containing and executing a second part of the computer software;
a processor (102) for executing the first part (120) of the computer software and for communicating to the hardware key (122) to cause execution of the second part of the computer software within the hardware key (122), when the execution of the second part of the computer software is requested by the first part of the computer software.
1 Assignment
0 Petitions
Accused Products
Abstract
A device for storing and reproducing audio and/or video data includes a semiconductor memory (3) for storing the data in difference form and a conversion unit (4, 5) capable of converting the digital audio and/or video data into analog signals suitable for reproducing apparatuses. Preferably, only analog useful signals issuing from the conversion unit appear on the output lines. Thus, the user does not have access to the original digital data, which precludes unauthorized copying of the digital audio and/or video data. The processing logic connected to the semiconductor memory is preferably configurable in different manners so as to allow the medium to be tailored to the customer'"'"'s ideas about features and quality when it is purchased.
-
Citations
10 Claims
-
1. A system for protecting computer software (120) from unauthorized execution within a computer system (100), the system comprising:
-
a memory (116) within the computer system for containing a first part of the computer software;
a hardware key (122) attached to the computer system, the hardware key (122) for containing and executing a second part of the computer software;
a processor (102) for executing the first part (120) of the computer software and for communicating to the hardware key (122) to cause execution of the second part of the computer software within the hardware key (122), when the execution of the second part of the computer software is requested by the first part of the computer software. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for protecting computer software from unauthorized execution within a computer system, the method comprising the steps of:
-
(a) dividing the computer software into two parts;
(b) storing a first part (120) of the computer software into a memory (116) within the computer system;
(c) storing a second part of the computer software into a hardware key (122) attached to the computer system;
(d) executing the first part (120) of the computer software in a processor (102) contained in the computer system, wherein the first part of the computer software communicates to the hardware key (122) to cause execution of the second part of the computer software within the hardware key (122) to provide results needed for operation of the first part (120) of the computer software.
-
Specification