摘要 |
The protection method consists of initial storage of a scrambled and compressed version of the file to be protected, followed by decompressing and unscrambling of the file to allow it to be used. The decompressing and unscrambling makes use of a physical key unique to a particular user, and can only be activated with the aid of this physical key. In addition a unique password is assigned to each user, and must also be used if the decompression and unscrambling is to be successful. Where the protected file is an executable program the correct access keys enable generation of a program that installs the executable program.
|