1. Field of the Invention
The present invention relates to a double key protection method for computer peripherals and architecture for the same. It especially relates to a double key protection method and architecture by using a first key to protect the computer peripheral hardware and a second key to protect the client program.
2. Description of Prior Art
The mostly common used mechanism for protection of a modern computer and network is a secret code. The designers of the computer peripheral apparatus usually use a secret code to protect their own hardware or software, such as the computer video interface card and some application program or driver for the computer interface card.
In order to protect the computer interface card 10, the client program 21 and the interface program 22, the designer will set a code verification mechanism in the computer interface card 10. In code verification mechanism the interface program 21 of the computer 20 will send a key value 100 to the microprocessor 11. The microprocessor 11 will compare the key value 100 with the key value 100 inside the storage unit 12. If the key value 100 inside the storage unit 12 is correct, the microprocessor 11 will tell the client program 21 that the client program 21 and the computer interface card 10 are copyrighted. If the key value 100 is incorrect, this means that either the interface program 22 or the computer interface card 10 is a fake.
The advantage of the protection mechanism mentioned above is that the program is composed easily and cheap. But the designer must make a fixed key value for each computer interface card 10. As the number of computer interface cards increases, so do the storage costs. Therefore, most designers will make the client program and the key value in a single CD, corresponding to only one computer interface card.
If the producer of the computer interface card 10, the designer of the client program 21 or the interface program 22 are different, the producer of the computer interface card 10 will provide the key value to the software designer. But an embezzler only needs to purchase the computer interface card 10.
Therefore, an embezzler will have competitive superiority over those who purchase both copyrighted hardware and software.
Therefore, the inventor of the present invention invents a double key protection mechanism. The client can set their own second key value to protect their products.
It is the object of the present invention to provide a double key protection method for computer peripherals and architecture for the same. The present invention allows software designers to set their own key value, without the necessity of setting different key values for each interface card. It both protects the software designer's product and lowers their costs.
To achieve the above objectives, the present invention provides a double key protection method for computer peripherals. The present invention sets a microprocessor and a memory device in a computer peripheral apparatus, and executes a client program which operates alongside the computer peripheral apparatus in the computer. The methods of the present invention first indicate a first key value previously stored in the memory device, and indicate a second key value. After the microprocessor takes the first key value in operation and produces a first cyclic redundancy check, it then writes the second key value and the first cyclic redundancy check in the client program. When the client program is executed, the second key value is transferred to the microprocessor and produces a second cyclic redundancy check, and finally returns the cyclic redundancy check to the client program to check with the first cyclic redundancy check. Therefore, the software can be verified whether or not it is copyrighted.
The present invention also provides a double key protection architecture for computer peripherals, which comprises a computer peripheral apparatus and a recorder, the computer peripheral apparatus has a microprocessor and a memory device and an interface unit. The recorder connects to the computer peripheral apparatus and records the first key value in the memory device; the interface unit connects to the computer and inputs a second key value to the microprocessor through a client program and reads the preserved first key value to produce a second cyclic redundancy check. It then compares the first cyclic redundancy check with the second cyclic redundancy check to verify a copyrighted device.
The features of the invention believed to be novel are set forth with particularity in the appended claims. The invention itself however may be best understood by reference to the following detailed description of the invention, which describes certain exemplary embodiments of the invention, taken in conjunction with the accompanying drawings in which:
Please refer to
The computer peripheral mentioned in the present invention can be an interface device which plugs into a computer, such as a TV card; it can also be a peripheral device such as a TV box connected outside the computer. The computer peripheral connects to the computer through an input/output interface. The input/output interface can be a PCI interface or an AGP interface if the computer peripheral is a TV card. The input/output interface also can be a USB interface if the computer peripheral is a TV box.
The interface unit 33 is connected to the input/output interface 23 of the computer 40. If the computer interface card 30 is plugged into a PCI bus and the computer 40 has a client program 41, the client program 41 can be the driver of the computer interface card 30 or an application program. Therefore, the computer 40 can execute a specific procedure with the computer interface card 30.
The recorder connection port 34 connects to a recorder 50, and the programmers can utilize the recorder 50 to record a key value in the memory device 32.
Please refer to
If the first hardware key values are incorrect, the computer interface card 30 is a fake and the computer will stop using the computer interface card 30 in step S108.
The second key of the present invention is used to protect the client program or some application programs which both operate alongside the computer interface card.
In the computer interface card 30 of the present invention, the microprocessor 31 processes a key operation procedure. The key operation procedure needs at least the first key value and the second key value to produce a first cyclic redundancy check. The software designer connects the specific recorder 50 to the computer recorder port 34 of the interface card 30 when setting key values in step S200.
The present invention executes the key procession procedure to produce the first cyclic redundancy check and stores the information on the recorder 50. Thereafter, the software designers can remove the recorder 50 and program the second key value and the first cyclic redundancy check in the client program 41 in step S300so the client program can check whether it is copyrighted.
After the microprocessor 30 accepts the second key value and reads the first key value in the memory device 32 in step S304, the first key value and the second key value will be processed by the key procession procedure and produce a second cyclic redundancy check in step S306.
Finally, the microprocessor 31 returns the second cyclic redundancy check to the interface program in step S308. The second cyclic redundancy check is compared with the first cyclic redundancy check when operating the interface program in step S310. If the first cyclic redundancy check and the second cyclic redundancy check are the same, the client program 41 is copyrighted; if not, the client program is a fake and the computer will stop using the computer interface card or tell the user to perform an appropriate action.
Because the first key value and the second key value are both set by the software designer, even if the software thief breaks the first key in the computer interface card 30, they still can not obtain the second key value. Therefore, the software and hardware are both protected by the double key protection architecture.
Although the present invention has been described with reference to the preferred embodiment thereof, it will be understood that the invention is not limited to the details thereof. Various substitutions and modifications have suggested in the foregoing description, and others will occur to those of ordinary skill in the art. Therefore, all such substitutions and modifications are intended to be embraced within the scope of the invention as defined in the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
93121627 | Jul 2004 | TW | national |