Unlock instant, AI-driven research and patent intelligence for your innovation.

A method of execution of a software application and a storage device for storing the software application

A software application, storage device technology, applied in the protection of internal/peripheral computer components, instrument, program/content distribution protection, etc., can solve problems such as low system portability

Inactive Publication Date: 2011-07-20
THOMSON LICENSING SA
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, the scheme requires the host to know the challenge-response protocol before connecting, which makes the system very less portable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of execution of a software application and a storage device for storing the software application
  • A method of execution of a software application and a storage device for storing the software application
  • A method of execution of a software application and a storage device for storing the software application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The main concept of the invention is a device for distributing computer applications (hereinafter referred to as "applications"), in particular computer games, which do not require any permanent installation on a computer. The technical solution (such as figure 1 shown) are particularly well-suited to today's nomadic environment.

[0024] figure 1 A system 100 is shown comprising a computer 110 and a security device 120 of the present invention. The security device 120 is preferably implemented by a USB key or other USB device implementing U3 technology, which includes:

[0025] - Read Only Memory (ROM) 122 for storing application code 1221 .

[0026] - A non-volatile memory 123, preferably flash memory, for storing persistent initialization data and personal data, such as data relating to the user's role in the game.

[0027] - A security processor 121 , preferably implemented in tamper-resistant hardware (eg a smart card chip), which is the only entry point to the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of and a system for execution of a software application. A storage medium (120) stores the software application (1221) in a first memory (122). The software application (1221) comprises code that, when executed by a computing device (110) authenticates the storage medium (120). The storage medium (120) verifies (230) an integrity of the software application (1221) and transfers (240) the software application (1221) to the computing device (110) upon successful verification. The computing device (110) executes the software application (1221), which authenticates (250) the storage medium (120). If the storage medium (120) is successfully authenticated, the computing device (110) accesses (260) data in a second memory (123; 124) of the storage medium (120), the data being susceptible to be used by the software application (1221) during execution.

Description

technical field [0001] The present invention relates generally to software, and in particular to software copy protection. Background technique [0002] This section is intended to introduce the reader to various aspects of art that may be related to aspects of the present invention that are described and / or claimed below. It is believed that this discussion helps to provide the reader with background information to readily gain a better understanding of the various aspects of the invention. It is therefore to be understood that these statements should be read in this light, and not as admissions of prior art. [0003] Software distributors often face the problem of piracy, where someone uses an unauthorized copy of a software application without paying for it. This situation is even more pronounced in the field of computer games. Therefore, game providers and distributors use protection mechanisms such as SecuROM and SafeMedia in an attempt to prevent this piracy. Howev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/12G06F21/44G06F21/64
CPCG06F21/445G06F21/123G06F21/64G06F21/79G06F21/12
Inventor 伊夫·梅茨马可·埃罗德
Owner THOMSON LICENSING SA