WO1998053384A1 - Method and apparatus for activating programs/features in a computer - Google Patents

Method and apparatus for activating programs/features in a computer Download PDF

Info

Publication number
WO1998053384A1
WO1998053384A1 PCT/SE1998/000948 SE9800948W WO9853384A1 WO 1998053384 A1 WO1998053384 A1 WO 1998053384A1 SE 9800948 W SE9800948 W SE 9800948W WO 9853384 A1 WO9853384 A1 WO 9853384A1
Authority
WO
WIPO (PCT)
Prior art keywords
feature
log
activation
integers
integer
Prior art date
Application number
PCT/SE1998/000948
Other languages
French (fr)
Inventor
Peter Carlsund
Original Assignee
Telefonaktiebolaget Lm Ericsson
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson filed Critical Telefonaktiebolaget Lm Ericsson
Priority to AU75615/98A priority Critical patent/AU7561598A/en
Publication of WO1998053384A1 publication Critical patent/WO1998053384A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1063Personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress

Definitions

  • the present invention relates to computer systems and especially to the handling of optional features in such systems.
  • One solution is to deliver a complete software system to the customer, but to activate only the programs or features the customer has ordered. The other programs or features could then be activated at a later date without new software installation. Sometimes a licence principle is used and the target system has special software for managing licence registration and licence supervision to prohibit illegal installation and utilization of that software.
  • Hardware keys are delivered to the customer together with the software and connected to a serial port on the computer, normally the printer port.
  • the delivered software comprises a unique built-in key which can only be activated by the hardware key. As the software cannot operate without the hardware key, the software is in effect protected from unauthorized copying.
  • a method to prevent continued unauthorized use of protected software when a testing time has elapsed is disclosed in US-A-5, 014,234.
  • a set of registration data appended to a selected system file is employed instead of data being a part of the software to be protected.
  • the proprietor of the protected software receives the registration data, a "diffuse" number is generated from the software serial number and returned to the user.
  • a method for protecting the d stribution of computer programs within a broadcast medium is disclosed in US-A-5,416,840. This means distributing a large number of different software titles to a large number of potential customers, for instance on CD-ROM. Each stored encrypted program has an associated identifier that may be used to identify a selected program on the medium.
  • the system has a decrypting device which has an associated unique identifier.
  • the first table includes the correlations between the encryption key and the program identifier.
  • the second table includes correlations between a password key and the hardware identifier.
  • an encrypting key which may be unique to one particular system or, if the customer has several similar systems, to a particular customer.
  • This encrypting key is added at system generation and may therefore be invisible to the users of the system.
  • a date tag used for recording the date when the feature status was last changed, one integer identifying the feature and one integer identifying the activation status of the feature.
  • the two integers are stored as encrypted values, encrypted using the site unique encoding key.
  • One particular feature is always identified by the same integer in all systems, but this integer will be stored in the systems encrypted with different encrypting keys.
  • the vendor When a feature is to be activated, as negotiated between the vendor and the customer, the vendor sends at least two integers to the customer, encrypted using the same encrypting key as the one found in the customer's system. The customer enters these integers into his system. The system decrypts the integers and performs one or more arithmetic operations, to determine if the entry is valid, what feature should be activated and for how long. An electronic seal may be used to confirm that the delivery had been authorized by the vendor.
  • the use of features is logged together with other information about activities that occur regularly in the system, for example about system restarts.
  • the log is never empty, and log entries occur regularly, unless the log or the logging function has been tampered with. Thus, if someone tries to cheat, it will be revealed in the log.
  • the method according to the invention enables the installation of all features at an initial installation.
  • the log enables the vendor to check what features the customer has used since installation.
  • the log enables the vendor to check that only activated features have been used and that all activation procedures were the result of appropriate business transactions.
  • the logging of routine activities together with the information about the activation/deactivation of features allows the vendor to check if the logging function and/or the log file has been tampered with.
  • the security level of the method according to the invention is such that unauthorized activation of features will be possible if the system is tampered with. Also, no automatic deletion or deactivation of services is foreseen. However a logging function allows the system vendor to identify unauthorized use of features. Therefore, the method according to the invention is suitable for large systems or systems with a relatively small number of customers, when the vendor and the customer maintain contact throughout the system's lifetime.
  • Figure 1 is a schematic representation of a computer system according to the invention.
  • Figure 2 is a flowchart of the events that occur when a feature is to be activated in a system according to the invention
  • Figure 3 is a flowchart of the events that occur when someone tries to use an optional feature in a system according to a preferred embodiment of the invention.
  • FIG. 1 is a schematic representation of a computer system according to the invention.
  • the system comprises a number of basic functions 1, for example an operating system, or, in a telephone exchange, the basic switching functions and the basic subscriber functions.
  • the system also comprises an encrypting key 3, which is unique to the system, and which is included when the system is manufactured. Since the encrypting key is added at the initial system generation, it is neither logged nor visible outside the system. However, it is known at the central managing site, from which new features are purchased.
  • FI, F2, ... , Fn there are one or more optional programs and/or features FI, F2, ... , Fn within the programs.
  • the word processing program has some optional features, such as a graphics package and an equation editor. If the customer wants only the file managing program and the basic version word processing program, the whole package would be delivered, but the spread sheet program, the graphics package and the equation editor would be locked, or deactivated. Later on, if the customer wanted the graphics functions, it would already be available without any new installation, and would only need to be activated.
  • the computer system may include the basic subscriber services from the begmning, but not optional features such as call waiting and call forwarding, which may be offered to the subscribers, and which may be wanted at a later stage.
  • Each optional feature FI, F2, ..., Fn comprises the feature software FSW and three integers, encrypted with the system unique encrypting key, to be used when the service is activated: one feature date tag FD, one feature identification number FI and one feature activation status FA.
  • the vendor sends at least two integers to the customer, which are to be entered into the system.
  • the system comprises at least one input terminal 5, from which the user can enter the integers.
  • the system also comprises a comparison means 7 for comparing the entered integers with the ones stored in connection with each feature. The use of these integers is discussed in detail in the description of figure 2. In the following discussion of the invention, three integers will be used.
  • the system includes one log ind cator 9 stored in such a way that it is not persistent, for example in the random access memory (RAM).
  • this log indicator it is indicated at least when a feature is used for the first time.
  • the log records are then written to a log 11 stored on disk, out of reach for the user, so that it cannot be changed or erased manually, as explained in connection with figure 3. It will not be possible to prevent this with 100% certainty, but if attempts to change or erase the log are made, these attempts will leave traces.
  • the feature identity, time of activation, activation state and the seal are logged. If the system is restarted, the log indicator 9 is erased, but the log 11 is not. When the system is powered up or restarted, some system-specific information that is always present and can be verified against other information sources, is checked and stored in the log. In a preferred embodiment, the activation status, and the time and date of the last change of status, of all optional features are registered.
  • the system vendor may examine the log 11 at regular or irregular intervals, to verify that only the features paid for have been used.
  • the system may further comprise a table 13 for storing previously used integer combinations to prevent later use of the same integers.
  • Figure 2 shows the events that occur when a feature is to be activated according to a preferred embodiment of the invention.
  • the customer receives at least two encrypted integers from the vendor.
  • three integers II, 12, 13 are used, which are dehvered with an electronic seal.
  • the first two integers II, 12 are used to identify the feature to be activated and the third integer is used together with the other two, to determine the activation time.
  • the seal is unique to this business transaction, and may for example be an integer. It is used to verify that the delivery was actually sent from the vendor and that it has not been manipulated by anyone. As an additional check, the identity of the feature to be activated might be specified in connection with entering the encrypted integers.
  • Step 100 The three integers II, 12, 13 are entered into the system, normally by the customer.
  • Step 102 The system decrypts the two first integers II, 12, using the system unique decrypting key and performs an arithmetic operation on II and 12 to produce a new integer 14.
  • Step 104 Is 14 equal to the feature identity FI? If yes, go to step 108; if no, go to step 106.
  • Step 106 Register the failed attempt to activate the feature in the security log. End procedure.
  • Step 108 The system decrypts the third integer 13 using the system unique decrypting key.
  • Step 110 The system performs an arithmetic or Boolean operation on 13 and 14 to produce the activation code Al.
  • Step 112 Is the activation code Al equal to zero? If yes, go to step 118; if no, go to step 114. Step 114: If 0 ⁇ A1 ⁇ 365, go to step 116; otherwise go to step 106.
  • Step 116 Activate the feature for a number of days corresponding to the value of
  • Step 118 Activate the feature permanently. Go to step 120.
  • Step 120 Set the date tag to the current date and log the activation of the feature.
  • the security log is not necessarily a separate log, but may be part of the log 11.
  • step 120 the activation status of the feature may be stored in a log, or in connection with each feature.
  • Figure 3 shows the events that take place when someone tries to use an optional feature in the system.
  • the computer system comprising an office program package
  • this may be when someone tries to run one of the programs or, assuming that a person is working in the word-processing program, for example at an attempt to use the graphics part of the program.
  • a telephone exchange it may be when a subscriber tries to use the call forwarding feature.
  • Step 150 An attempt is made to access a feature.
  • Step 152 The system checks if the feature has been activated, i.e. if the value of the activation code Al is within the allowed range (0-365). If yes, go to step 154; if no, go to step 158.
  • Step 154 The system checks if the activation code Al equals 0. If yes, go to step
  • step 156 if no, go to step 156.
  • Step 156 The system checks if the activation date of the feature + Al is less than or equal to today's date. If yes, go to step 160; if no, go to step 158. Step 158: Access to the feature is denied. End of procedure.
  • Step 160 The system checks if the log indication for the feature is activated. If yes, go to step 166; of no, go to step 162.
  • Step 162 The system creates a log record comprising the feature identity, activation status and current date in the log indication found in RAM.
  • Step 164 The log record is stored in the log on disk.
  • Step 166 Access to the feature is granted. End of procedure.
  • step 158 After or in connection to step 158 of course the failed attempt to access the feature could be logged, although this is not shown in the flow chart. After the limited period of time has expired, it would of course be possible to deactivate the feature again by changing the value of the activation status FA to a number outside the allowed range (0-365). In this case, the activity in step 156 might be omitted.
  • the date tag would be replaced by a field registering the number of times the feature may be used, and a field registering how many times the feature had actually been used. In steps 152, 154, 156, the values of these two fields would be compared. Another possible solution would be to register the number of times the user was allowed to use the feature in a counter field and decrement the value of this counter field each time the feature was accessed.

Abstract

A method and an apparatus for handling the access to optional features in a computer system, such as a telephone exchange, are disclosed. The computer system comprises an encryption key. Each feature is associated with a feature identification integer (FI), a feature activation integer (FA) and a data tag (FD). To activate a feature, the user enters a number of integers, received from the system vendor and encrypted using the same encryption key found in the computer system. The integers are decrypted, an arithmetic operation performed, and the result compared with the integers associated with the feature. If there is a match, the feature is activated, forever, or for a period of time determined by the integers. The use of features may be stored in a log (11), which may, together with a log indicator (9), be used by the vendor to check the use of optional features.

Description

METHOD AND APPARATUS FOR ACΗVATING PROGRAMS/FEATURES IN A COMPUTER
Technical Field
The present invention relates to computer systems and especially to the handling of optional features in such systems.
Background
Especially in large computer systems, there is a need for vendors to offer optional functions or features that can be made available to an operator if and when they are paid for. In many cases the original order does not include these features. This means that the additional order of such functions will result in a software delivery procedure. The procedure to create the software package, deliver it to the customer and upgrade the target system is costly and time consuming. Installation also requires that the system be taken down while the software is installed.
Also the system management becomes increasingly difficult when new deliveries are made.
Often customers want to test a feature over a period of time before deciding whether or not to buy it. This normally requires test installation of programs.
One example of such a computer system is a modern digital telephone exchange. In telephone exchanges it is particularly important to avoid service interrupt. Therefore, there is a strong desire to be able to change the functionality of a telephone exchange without having to take the exchange out of service.
One solution is to deliver a complete software system to the customer, but to activate only the programs or features the customer has ordered. The other programs or features could then be activated at a later date without new software installation. Sometimes a licence principle is used and the target system has special software for managing licence registration and licence supervision to prohibit illegal installation and utilization of that software.
For licence management a solution known as hardware keys is often used, mostly by vendors of personal computers (PCs). Hardware keys are delivered to the customer together with the software and connected to a serial port on the computer, normally the printer port. The delivered software comprises a unique built-in key which can only be activated by the hardware key. As the software cannot operate without the hardware key, the software is in effect protected from unauthorized copying.
A method to prevent continued unauthorized use of protected software when a testing time has elapsed is disclosed in US-A-5, 014,234. A set of registration data appended to a selected system file is employed instead of data being a part of the software to be protected. When the proprietor of the protected software receives the registration data, a "diffuse" number is generated from the software serial number and returned to the user.
A method for protecting the d stribution of computer programs within a broadcast medium is disclosed in US-A-5,416,840. This means distributing a large number of different software titles to a large number of potential customers, for instance on CD-ROM. Each stored encrypted program has an associated identifier that may be used to identify a selected program on the medium. The system has a decrypting device which has an associated unique identifier.
Two tables are generated and stored. The first table includes the correlations between the encryption key and the program identifier. The second table includes correlations between a password key and the hardware identifier. When a user selects a particular software program from the medium, a program identifier and a hardware identifier are used to permit access to the selected program. In the document it is foreseen that this will be associated with an obligation to pay for the use of the program.
The solutions described above may be used for complete tools and applications, but are not implemented for special features within the applications.
Summary of the Invention
Thus, it is an object of the present invention to be able to extend the system functionality, in particular in large computer systems, without the need for new software deliveries.
It is another object of the invention to be able to discover any unauthorized use of features in the system without the use of additional hardware.
It is yet another object of the invention to provide time-limited test licences of applications or features without the need for new software deliveries.
These objects are achieved according to the invention by equipping the computer system with an encrypting key, which may be unique to one particular system or, if the customer has several similar systems, to a particular customer. This encrypting key is added at system generation and may therefore be invisible to the users of the system. In addition, for each optional feature there is a date tag used for recording the date when the feature status was last changed, one integer identifying the feature and one integer identifying the activation status of the feature. The two integers are stored as encrypted values, encrypted using the site unique encoding key. One particular feature is always identified by the same integer in all systems, but this integer will be stored in the systems encrypted with different encrypting keys.
When a feature is to be activated, as negotiated between the vendor and the customer, the vendor sends at least two integers to the customer, encrypted using the same encrypting key as the one found in the customer's system. The customer enters these integers into his system. The system decrypts the integers and performs one or more arithmetic operations, to determine if the entry is valid, what feature should be activated and for how long. An electronic seal may be used to confirm that the delivery had been authorized by the vendor.
In the log, the use of features is logged together with other information about activities that occur regularly in the system, for example about system restarts. In this way, the log is never empty, and log entries occur regularly, unless the log or the logging function has been tampered with. Thus, if someone tries to cheat, it will be revealed in the log.
The invention offers the following advantages:
The method according to the invention enables the installation of all features at an initial installation.
The log enables the vendor to check what features the customer has used since installation.
The log enables the vendor to check that only activated features have been used and that all activation procedures were the result of appropriate business transactions.
The logging of routine activities together with the information about the activation/deactivation of features allows the vendor to check if the logging function and/or the log file has been tampered with.
The security level of the method according to the invention is such that unauthorized activation of features will be possible if the system is tampered with. Also, no automatic deletion or deactivation of services is foreseen. However a logging function allows the system vendor to identify unauthorized use of features. Therefore, the method according to the invention is suitable for large systems or systems with a relatively small number of customers, when the vendor and the customer maintain contact throughout the system's lifetime.
Brief Description of the Drawings The invention will be described in more detail in the following, with particular reference to the drawings, in which:
Figure 1 is a schematic representation of a computer system according to the invention;
Figure 2 is a flowchart of the events that occur when a feature is to be activated in a system according to the invention;
Figure 3 is a flowchart of the events that occur when someone tries to use an optional feature in a system according to a preferred embodiment of the invention.
Detailed Description of the Embodiments Figure 1 is a schematic representation of a computer system according to the invention. The system comprises a number of basic functions 1, for example an operating system, or, in a telephone exchange, the basic switching functions and the basic subscriber functions. The system also comprises an encrypting key 3, which is unique to the system, and which is included when the system is manufactured. Since the encrypting key is added at the initial system generation, it is neither logged nor visible outside the system. However, it is known at the central managing site, from which new features are purchased.
There are one or more optional programs and/or features FI, F2, ... , Fn within the programs. As an example, consider an office program package containing a spread sheet, a word processing programming, and file managing program. The word processing program has some optional features, such as a graphics package and an equation editor. If the customer wants only the file managing program and the basic version word processing program, the whole package would be delivered, but the spread sheet program, the graphics package and the equation editor would be locked, or deactivated. Later on, if the customer wanted the graphics functions, it would already be available without any new installation, and would only need to be activated.
If the computer system is a telephone exchange, for example, it may include the basic subscriber services from the begmning, but not optional features such as call waiting and call forwarding, which may be offered to the subscribers, and which may be wanted at a later stage.
Each optional feature FI, F2, ..., Fn comprises the feature software FSW and three integers, encrypted with the system unique encrypting key, to be used when the service is activated: one feature date tag FD, one feature identification number FI and one feature activation status FA.
When a feature is to be activated, the vendor sends at least two integers to the customer, which are to be entered into the system. For this and other purposes the system comprises at least one input terminal 5, from which the user can enter the integers. The system also comprises a comparison means 7 for comparing the entered integers with the ones stored in connection with each feature. The use of these integers is discussed in detail in the description of figure 2. In the following discussion of the invention, three integers will be used.
The system includes one log ind cator 9 stored in such a way that it is not persistent, for example in the random access memory (RAM). In this log indicator it is indicated at least when a feature is used for the first time. The log records are then written to a log 11 stored on disk, out of reach for the user, so that it cannot be changed or erased manually, as explained in connection with figure 3. It will not be possible to prevent this with 100% certainty, but if attempts to change or erase the log are made, these attempts will leave traces.
When a feature is activated, the feature identity, time of activation, activation state and the seal are logged. If the system is restarted, the log indicator 9 is erased, but the log 11 is not. When the system is powered up or restarted, some system-specific information that is always present and can be verified against other information sources, is checked and stored in the log. In a preferred embodiment, the activation status, and the time and date of the last change of status, of all optional features are registered.
Theoretically it would be possible to log every time a feature is used, but in many cases this would make the log very big and not add any useful information. In some cases the only point of interest, as will be discussed later, is whether or not the customer is using a particular feature, not how many times it is used. To prevent unauthorized persons from tampering with the file it is suggested to let the log consist of a number of sequential files, and to use a wrap-around principle, so that when it is full, the oldest file will be overwritten.
The system vendor may examine the log 11 at regular or irregular intervals, to verify that only the features paid for have been used.
The system may further comprise a table 13 for storing previously used integer combinations to prevent later use of the same integers.
Figure 2 shows the events that occur when a feature is to be activated according to a preferred embodiment of the invention. When the feature is purchased, the customer receives at least two encrypted integers from the vendor. In a preferred embodiment three integers II, 12, 13 are used, which are dehvered with an electronic seal. The first two integers II, 12 are used to identify the feature to be activated and the third integer is used together with the other two, to determine the activation time. It will be obvious to the person skilled in the art that the number of integers used in the operations could be increased. The seal is unique to this business transaction, and may for example be an integer. It is used to verify that the delivery was actually sent from the vendor and that it has not been manipulated by anyone. As an additional check, the identity of the feature to be activated might be specified in connection with entering the encrypted integers.
Step 100: The three integers II, 12, 13 are entered into the system, normally by the customer.
Step 102: The system decrypts the two first integers II, 12, using the system unique decrypting key and performs an arithmetic operation on II and 12 to produce a new integer 14. Step 104: Is 14 equal to the feature identity FI? If yes, go to step 108; if no, go to step 106.
Step 106: Register the failed attempt to activate the feature in the security log. End procedure.
Step 108: The system decrypts the third integer 13 using the system unique decrypting key.
Step 110: The system performs an arithmetic or Boolean operation on 13 and 14 to produce the activation code Al.
Step 112: Is the activation code Al equal to zero? If yes, go to step 118; if no, go to step 114. Step 114: If 0<A1<365, go to step 116; otherwise go to step 106.
Step 116: Activate the feature for a number of days corresponding to the value of
Al. Go to step 120.
Step 118: Activate the feature permanently. Go to step 120.
Step 120: Set the date tag to the current date and log the activation of the feature.
The security log is not necessarily a separate log, but may be part of the log 11.
The arithmetic operations in steps 102 and 104 may be the same kind of operation or different ones. For example, an exclusive or operation may be performed on the binary representation of the two numbers. It will be obvious to the skilled person that any number of integers might be used in the operations. In step 120 the activation status of the feature may be stored in a log, or in connection with each feature.
Figure 3 shows the events that take place when someone tries to use an optional feature in the system. In the example of the computer system comprising an office program package, this may be when someone tries to run one of the programs or, assuming that a person is working in the word-processing program, for example at an attempt to use the graphics part of the program. In the example of a telephone exchange, it may be when a subscriber tries to use the call forwarding feature.
Step 150: An attempt is made to access a feature.
Step 152: The system checks if the feature has been activated, i.e. if the value of the activation code Al is within the allowed range (0-365). If yes, go to step 154; if no, go to step 158.
Step 154: The system checks if the activation code Al equals 0. If yes, go to step
160; if no, go to step 156.
Step 156: The system checks if the activation date of the feature + Al is less than or equal to today's date. If yes, go to step 160; if no, go to step 158. Step 158: Access to the feature is denied. End of procedure.
Step 160: The system checks if the log indication for the feature is activated. If yes, go to step 166; of no, go to step 162.
Step 162: The system creates a log record comprising the feature identity, activation status and current date in the log indication found in RAM. Step 164: The log record is stored in the log on disk.
Step 166: Access to the feature is granted. End of procedure.
After or in connection to step 158 of course the failed attempt to access the feature could be logged, although this is not shown in the flow chart. After the limited period of time has expired, it would of course be possible to deactivate the feature again by changing the value of the activation status FA to a number outside the allowed range (0-365). In this case, the activity in step 156 might be omitted.
Instead of making the feature available for a limited period of time, it would be possible to allow the user to test the feature a limited number of times. This could be solved in different ways; for example, the date tag would be replaced by a field registering the number of times the feature may be used, and a field registering how many times the feature had actually been used. In steps 152, 154, 156, the values of these two fields would be compared. Another possible solution would be to register the number of times the user was allowed to use the feature in a counter field and decrement the value of this counter field each time the feature was accessed.

Claims

1. A method for controlling activation and/or deactivation of programs or parts of programs in a computer system, comprising at least one optional program and/or program part and an encrypting key, each optional program or program part being associated with at least one integer number, characterized in that it comprises the following steps
- Manually entering at least one integer (II), encrypted with the same kind of encrypting key as the one found in the computer system;
- Automatically decrypting the integers using the encrypting key;
- Automatically performing an arithmetic operation on the at least one integers (II) to produce at least another integer (14) and comparing the result with a feature identification (FI); - If said second integer (14) equals said feature identificaton (FI), performing the following steps:
- performing another arithmetic operation on the same integer or integers (II) and at least one additional integer (12) entered into the system, to determine the length of the period for which the feature should be activated.
- activating the feature for the specified period of time.
2. A method according to step 1, characterized in that the following steps are carried out by the system when an attempt to use the feature is carried out:
- checking if the feature has been activated; - if the feature has been activated, checking if the activation is still valid
- if the activation is still valid, granting access to the feature.
3. A method according to claim 1 or 2, characterized in that the feature identity (FI) and the activation time (FD) are stored in a log (11) persistently stored in the system when the activation status of the feature is changed.
4. A method according to claim 3, characterized by
- Delivering the integers (II, 12) to the customer together with an electronic seal, unique to the transaction
- Storing the transaction unique seal in the log (11) when the activation status of the feature is changed.
5. A method according to claim 2, 3 or 4, characterized in that the following steps are performed by the system when a valid activation has been verified, but before access to the feature is granted: - checking if there is a log record for the feature, and, if there is not, perforating the following steps:
- registering the activation of the feature in the log indication (9)
- creating a log record for the feature and storing it in the persistent log (11).
6. A method according to any of the preceding claims, characterized by including an encryption key in the computer system at system generation.
7. A method according to any of the preceding claims, characterized in that the computer system is a digital telephone exchange.
8. A computer system comprising one ore more basic functions (1), one or more optional programs and/or program parts (FI, F2, ..., Fn), an encrypting key (3), and means (7) for performing at least one arithmetic operation on at least two integers entered into the system, to produce a result (14), characterized in that each optional program or program part (FI, F2, ..., Fn) is associated with at least one integer (FI), stored encrypted with the encrypting key (3) and that the system comprises means (7) for comparing the result of said at least one arithmetic operation with said at least one integer (FI) and activating the program part if there is a match.
9. A computer system according to claim 8, comprising a log (11), stored in such a way that it cannot be erased in normal operation and that it will remain over a system restart, characterized in that said log (11) is adapted to comprise at least information about the activation status (FA) of features, the time (FD) when the activation status of the feature was last changed, the seal, if any, used in the transaction when the activation status was changed, and information about system restarts.
10. A computer system according to claim 8 or 9, characterized in that it comprises a log indication file (9) stored in a non-persistent way and adapted to contain information for each feature (FI, F2, ..., Fn) about whether or not the feature has been used.
PCT/SE1998/000948 1997-05-21 1998-05-20 Method and apparatus for activating programs/features in a computer WO1998053384A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU75615/98A AU7561598A (en) 1997-05-21 1998-05-20 Method and apparatus for activating programs/features in a computer

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SE9701894A SE518017C2 (en) 1997-05-21 1997-05-21 Method and apparatus for computer systems
SE9701894-9 1997-05-21

Publications (1)

Publication Number Publication Date
WO1998053384A1 true WO1998053384A1 (en) 1998-11-26

Family

ID=20407024

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE1998/000948 WO1998053384A1 (en) 1997-05-21 1998-05-20 Method and apparatus for activating programs/features in a computer

Country Status (3)

Country Link
AU (1) AU7561598A (en)
SE (1) SE518017C2 (en)
WO (1) WO1998053384A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002042899A2 (en) * 2000-11-22 2002-05-30 Ge Medical Technology Services, Inc. Method and system to remotely enable software-based options for a trial period
EP1550933A1 (en) * 2003-10-31 2005-07-06 Sap Ag Securely providing user-specific application versions
EP1936451A1 (en) * 2006-12-18 2008-06-25 Fanuc Ltd System and method for setting software option of numeric control device
WO2009129080A1 (en) * 2008-04-15 2009-10-22 Hurco Companies, Inc. Software option selection and validation system
US8200214B2 (en) 2006-10-11 2012-06-12 Johnson Controls Technology Company Wireless network selection
US8380251B2 (en) 1999-05-26 2013-02-19 Johnson Controls Technology Company Wireless communications system and method
US9318017B2 (en) 1999-05-26 2016-04-19 Visteon Global Technologies, Inc. Wireless control system and method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1990013865A1 (en) * 1989-04-28 1990-11-15 Softel, Inc. Method and apparatus for remotely controlling and monitoring the use of computer software
US5014234A (en) * 1986-08-25 1991-05-07 Ncr Corporation System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software
US5023907A (en) * 1988-09-30 1991-06-11 Apollo Computer, Inc. Network license server
WO1992009160A1 (en) * 1990-11-07 1992-05-29 Tau Systems Corporation A secure system for activating personal computer software at remote locations
US5182770A (en) * 1991-04-19 1993-01-26 Geza Medveczky System and apparatus for protecting computer software
US5337357A (en) * 1993-06-17 1994-08-09 Software Security, Inc. Method of software distribution protection

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5014234A (en) * 1986-08-25 1991-05-07 Ncr Corporation System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software
US5023907A (en) * 1988-09-30 1991-06-11 Apollo Computer, Inc. Network license server
WO1990013865A1 (en) * 1989-04-28 1990-11-15 Softel, Inc. Method and apparatus for remotely controlling and monitoring the use of computer software
WO1992009160A1 (en) * 1990-11-07 1992-05-29 Tau Systems Corporation A secure system for activating personal computer software at remote locations
US5182770A (en) * 1991-04-19 1993-01-26 Geza Medveczky System and apparatus for protecting computer software
US5337357A (en) * 1993-06-17 1994-08-09 Software Security, Inc. Method of software distribution protection

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8380251B2 (en) 1999-05-26 2013-02-19 Johnson Controls Technology Company Wireless communications system and method
US8897708B2 (en) 1999-05-26 2014-11-25 Johnson Controls Technology Company Wireless communications system and method
US9318017B2 (en) 1999-05-26 2016-04-19 Visteon Global Technologies, Inc. Wireless control system and method
US9370041B2 (en) 1999-05-26 2016-06-14 Visteon Global Technologies, Inc. Wireless communications system and method
WO2002042899A2 (en) * 2000-11-22 2002-05-30 Ge Medical Technology Services, Inc. Method and system to remotely enable software-based options for a trial period
WO2002042899A3 (en) * 2000-11-22 2003-08-21 Ge Medical Tech Serv Method and system to remotely enable software-based options for a trial period
US7962416B1 (en) * 2000-11-22 2011-06-14 Ge Medical Technology Services, Inc. Method and system to remotely enable software-based options for a trial period
EP1550933A1 (en) * 2003-10-31 2005-07-06 Sap Ag Securely providing user-specific application versions
US8200214B2 (en) 2006-10-11 2012-06-12 Johnson Controls Technology Company Wireless network selection
EP1936451A1 (en) * 2006-12-18 2008-06-25 Fanuc Ltd System and method for setting software option of numeric control device
WO2009129080A1 (en) * 2008-04-15 2009-10-22 Hurco Companies, Inc. Software option selection and validation system
US8418171B2 (en) 2008-04-15 2013-04-09 Hurco Companies, Inc. Software option selection and validation system

Also Published As

Publication number Publication date
AU7561598A (en) 1998-12-11
SE9701894D0 (en) 1997-05-21
SE518017C2 (en) 2002-08-13
SE9701894L (en) 1998-11-22

Similar Documents

Publication Publication Date Title
US5754646A (en) Method for protecting publicly distributed software
EP0895148B1 (en) Software rental system and method for renting software
US6067640A (en) System for management of software employing memory for processing unit with regulatory information, for limiting amount of use and number of backup copies of software
US5870467A (en) Method and apparatus for data input/output management suitable for protection of electronic writing data
US8443455B2 (en) Apparatus, method, and computer program for controlling use of a content
EP1048998B1 (en) Security managing system, data distribution apparatus and portable terminal apparatus
US8327453B2 (en) Method and apparatus for protecting information and privacy
US6889209B1 (en) Method and apparatus for protecting information and privacy
US6449720B1 (en) Public cryptographic control unit and system therefor
US6684210B1 (en) File managing system, file management apparatus, file management method, and program storage medium
US20030028592A1 (en) Backup-restoration system and right management server
US20070136202A1 (en) Personal-information managing apparatus, method of providing personal information, computer product, and personal-information-providing system
US20040039705A1 (en) Distributing a software product activation key
US7895124B2 (en) Method for protecting sensitive data during execution
JPH10312335A (en) Data processing method and processor therefor
JPH11194937A (en) Rent control system for electronic computer program
WO1998053384A1 (en) Method and apparatus for activating programs/features in a computer
US8160967B2 (en) Authorization code recovering method
US20020108024A1 (en) Method for protecting publicly distributed software
WO1998053383A1 (en) Method and apparatus for visualizing the features/programs that have been used in a computer system by means of log files
JPH09319572A (en) Device for managing use of software
JP2004185047A (en) Copyright protected software and medium recorded with the program of the same
CN115357918A (en) Authorization control method and device for broadcast control software, terminal equipment and storage medium
JP3289656B2 (en) Program execution control method
JP2001202289A (en) Security managing method and its program recording medium

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM GW HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: JP

Ref document number: 1998550297

Format of ref document f/p: F

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA