摘要 |
Software on a wireless device is protected by an arrangement in which an identifier is derived from the hardware of the device on which the software is to be run. The identifier is sent to a server which derives a derived identifier by applying a function g to the identifier. The derived identifier is returned to the device which executes a function h. Function h is the inverse of function g. Comparison with the original identifier thus confirms that operation of the software is authorised. In the event that it is not, the server does not send back a derived identifier. |