Identification system safeguarded against misuse
Computer software security system
Microprocessor for executing enciphered programs
Portable data carrier including a microprocessor
Crypto microprocessor for executing enciphered programs
Key management for encryption/decryption systems
Method and means for securing the distribution of encoding keys
Digital computer having code conversion apparatus for an encrypted program
Crypto microprocessor using block cipher
Cryptographic decoder for computer programs
ApplicationNo. 06/828080 filed on 02/05/1986
US Classes:705/55, Requiring a supplemental attachment or input (e.g., dongle) to open235/376, Operations analysis235/382, Permitting access713/190Computer instruction/address encryption
ExaminersPrimary: Shaw, Gareth D.
Assistant: Kriess, Kevin A.
Attorney, Agent or Firm
International ClassesG06F 21/00 (20060101)
G07F 7/10 (20060101)
Foreign Application Priority Data1982-03-18 FR
AbstractThe invention relates to a method and a device for protecting software delivered to a user by a supplier. The method amounts to rendering the programs non-executable in the state in which they have been delivered to the users. With each program (Pi) there is associated a validation key defined via a main validation key (Vi) delivered by the supplier and recorded in a storage area (M) of the user's machine (1), and via a supplementary key (V'i) computed on the lever of a card (C) issued to the user via a secret code (S) and via arguments (bi) that identify each program (Pi) and are recorded in a storage area (M1) of the card (C).