摘要 |
Software on a wireless device is protected by an arrangement in which an identifier (1234) is derived from the hardware of the device on which the software is to be run. The identifier (1234) is sent to a server which derives a derived identifier (WXYZ) by applying a function g to the identifier (1234). The derived identifier is returned to the device which executes a function h. Function h is the inverse of function g. Comparison with the original identifier thus confirms that operation of the software is authorised. In the event that it is not, the server does not send back a derived identifier. |