发明名称 Method for generating a cryptographic key for a protected digital data object on the basis of current components of a computer
摘要 A method for coupling protected digital data object, for example an application program, and a specified computer, which allows for, if desired, individual components of the computer to be modified. A cryptographic key is generated on the basis of current components of a computer in order to decrypt an encrypted, computer-specific authorization code for executing a protected digital data object on the computer. The computer-specific authorization code is encrypted with a key based on original components of the computer. The key can be determined from the current components of the computer even if they are different from the original components of the computer.
申请公布号 US8844049(B2) 申请公布日期 2014.09.23
申请号 US201213452379 申请日期 2012.04.20
申请人 WIBU-Systems AG 发明人 Wichmann Peer;Reuther Udo
分类号 G06F21/00;H04L29/06;G06F21/73;G06F21/10 主分类号 G06F21/00
代理机构 Hubbard Law, PLLC 代理人 Hubbard Law, PLLC
主权项 1. Method of generating a cryptographic key on the basis of current components of a computer for decryption of an encrypted, computer-specific authorization code for activating a protected digital data object on the computer, wherein the computer-specific authorization code is encrypted by means of a key depending on original components of the computer, the method comprising: generating an inventory list of features for the original components of the computer; determining original feature values for the features stored in the inventory list; determining original checksums for each of the original feature values; determining redundancy values from the entirety of original feature values; determining current feature values for the features of the computer stored in the inventory list; calculating current checksums from the current feature values; comparing the current checksums with the original checksums; if the original checksum and the current checksum are identical, storing the current feature values in a current feature value vector, and if they are not identical, inserting spaces in the current feature value vector instead of the current feature value; determining missing feature values in the current feature value vector using redundancy data; completing the current feature value vector with the determined feature values; generating the cryptographic key to decrypt the authorization code from the feature value vector.
地址 Karlsruhe DE