An increasingly large number of products are being provided to clients in digital form. Products in a digital form (e.g., software products and the like, music, video, books, etc.) are often distributed to clients via fixed computer readable media, such as, for example, compact disc (CD-ROM), digital versatile disc (DVD-ROM), soft magnetic diskette, or hard magnetic disk (e.g., a preloaded hard drive). More recently, clients have been able to download digital content directly from developers or service providers to their digital devices using data communication services, such as those associated with communication networks, such as intranets and extranets.
Unfortunately, due to its nature digital content has a number of security shortcomings that allow widespread digital piracy (e.g., unauthorized reproduction or use of a copyrighted digital media). For example, digital content can be easily duplicated or accessed by unauthorized parties. Every year digital piracy results in billions of dollars of lost revenue for digital media development companies and providers. Therefore, many such companies invest significant resources into digital rights management (DRM) protection to prevent unauthorized distribution, copying, and/or illegal operation of, or access to digital content.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key factors or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Product registration of an electronic good (e.g., software) over the telephone is made easier by reducing the length of a product identification code (product ID) that is communicated to the electronic good's provider (e.g., software provider). More particularly, an electronic good is registered over a telephone by providing a reduced portion of its product ID to a telephone registration server which uses a bi-linear pairing signature system to verify the authenticity of the electronic good.
Essentially, an electronic good provider provides a product ID to a client purchasing an electronic good. The product ID comprises a message and a digital signature, wherein the digital signature is a hash value of the message encrypted with the electronic good provider's private key. The client performs a verification via a telephone to ensure that the client is not using a pirated (e.g., unauthorized) copy of a copyrighted software program. The verification requires that the client provide the digital signature portion of the product ID (e.g., the first 10 characters of a 25 characters long product ID) to a trusted verifier (e.g., telephone registration server) that has the electronic good provider's private key. The trusted verifier uses the electronic good provider's private key to reconstruct the message. The trusted verifier then compares the reconstructed message to an expected structure to ensure that the client is not using a pirated (e.g., unauthorized copy of a copyrighted software program) version of the electronic good. If the expected structure is found, the electronic good is authentic and the trusted verifier (e.g., telephone registration server) then returns a registration code which activates the client's software. Verification using only the digital signature portion of the product ID reduces the amount of information that needs to be transferred over the telephone line to perform electronic good registration.
To the accomplishment of the foregoing and related ends, the following description and annexed drawings set forth certain illustrative aspects and implementations. These are indicative of but a few of the various ways in which one or more aspects may be employed. Other aspects, advantages, and novel features of the disclosure will become apparent from the following detailed description when considered in conjunction with the annexed drawings.
The claimed subject matter is now described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the claimed subject matter. It may be evident, however, that the claimed subject matter may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate describing the claimed subject matter.
Various DRM techniques have been developed and employed in an attempt to stop digital piracy. One technique requires clients to register digital goods with the digital good's developer or provider. For example, many software programs come with a product identification code (product ID) (e.g., a string of alpha numeric characters) that users provide to the software provider either through mail, over a telephone, or online via the Internet or a direct connection for proper software performance. In this technique, digital goods require the client to enter a registration code before allowing the digital good to be fully operational or the digital content to be fully accessed. As computers get faster and the ability to break cryptographic codes increases, the length of product IDs continues to grow to provide increased security against piracy. Longer codes are especially cumbersome for product users not connected to the Internet who register via the telephone. Therefore, there is a need for a method of product register via a telephone with a reduced length product ID.
The present techniques and systems, provided herein, relate to a method by which product registration of an electronic good (e.g., software) over a telephone is made easier by reducing the length of a product identification code (product ID) that is communicated to the electronic good's provider (e.g., software provider).
The content of this disclosure will often be explained in regard to software registration for computers, however it will be appreciated that the techniques and systems provided herein can be applied to a wide range of applications. For example, any electronic good provided in digital form (e.g., music, video, books) may utilize a method of registration set forth in this disclosure. Similarly, the method may be performed for electronic goods installed on any electronic device, such as PDAs, cell phones, etc. Furthermore, the trusted verifier (e.g., phone registration server) is denoted in figures as a separate element from the software provider. However, it will be appreciated that the trusted is often owned by the software provider and the separate elements could also be represented as a single element.
For digital signatures asymmetric cryptography uses a pair of cryptographic keys, a private key and a public key. A sender's private key is usually kept secret by a sender and is not distributed to other parties. A sender's public key is usually widely distributed. In digital signatures a hash value of a plaintext input is signed with a sender's private key to form a unique digital signature that can only be formed using the sender's public key. Therefore, by keeping his private key private the sender ensures that he cannot be impersonated by malicious third parties. The digital signature is sent with the message and to a receiver (e.g., anyone who has access to the senders public key) who can use the sender's public key to verified the digital signature upon receipt. By verifying the digital signature the receiver ensures the authenticity of data (e.g., email, software, etc.) received from a sender.
At 204 a private key is provided by the software provider to a trusted verifier (e.g., a telephone registration server). The software provider's private key is used by the software provider to sign its digital signature. Often the software provider owns the trusted verifier (e.g., telephone registration server, but in cases where the software provider and trusted verifier are separate entities, the software provider's private key can be delivered to the trusted verifier (e.g., telephone registration server) by a number of methods. For example, a trusted courier could be used to deliver the private key to the trusted verifier. A cheaper alternative would be to break the private key into multiple (e.g., three) pieces and to deliver respective pieces in a separate channel (e.g., email, telephone, physical mail, etc.).
The product ID, comprising the message and the digital signature, is communicated from the software provider to the client at 206. A product ID is a string of alpha numeric characters. Traditionally, a client communicates the entire product ID to a verifier (e.g., untrusted) who confirms that the product ID is authentic (e.g., unmodified) thereby ensuring that the user receives an un-tampered, un-pirated product. For example, the client may provide the product ID to the software provider who confirms that the software is authentic (e.g., not from a source other than the software provider and not tampered with) and not pirated (e.g., being used without authorization).
The product ID can be communicated from the software provider to the client in various ways depending on the method of purchase. For example, store bought software comprising a fixed computer readable media (e.g., CD-ROM) may have a product ID code printed on the media or included in the software package (e.g., box). Software downloaded over a network (e.g., Internet) may provide a product ID number on screen at the time of purchase or over email.
At 208 the digital signature portion of the product ID is communicated from the client, via a telephone, to a trusted verifier (e.g., telephone registration server). The digital signature portion of the product ID is a subset of the entire product ID traditionally communicated for product registration. For example, if the product ID contains 25 alpha numeric characters the digital signature portion may comprise the first 10 characters of the product ID. In one example, the digital signature length is substantially equal to half that of a digital signature algorithm (DSA) signature for a substantially equal strength encryption.
At 210 the trusted verifier (e.g., telephone registration server) utilizes the received digital signature and the software provider's private key to verify that the digital signature is authentic (e.g., signed by the software provider). The trusted verifier uses the private key and the digital signature to reconstruct the message and then looks for a predetermined expected structure in the message. If the expected structure is present in the recovered message then the received digital signature is authentic. If the expected structure is not present in the recovered message than the received digital signature is not authentic.
If the received digital signature is authentic, the telephone registration server communicates a registration code to the client at 212. The registration code can be entered into the client's electronic device (e.g., computer) to allow the software to be fully operational. If the received digital signature is not authentic, the telephone registration server does not communicate a registration code to the client and the software cannot be utilized.
In one example, the telephone registration server of
In a further example, the telephone registration server of
As shown in
In
The client 302 performs a first verification 408 using the software provider's two public keys, the digital signature, and the message to verify that the message and digital signature are authentic (e.g., an unmodified version of the software from the software provider). The first verification 408 requires the client enter the entire product ID (e.g., the message and the digital signature) into his electronic device which already has the software provider's two public keys.
Once the first verification is complete, the client communicates (e.g., speaks or enters via the touchtone keypad) the digital signature 410 to the telephone registration server 308 (e.g., trusted verifier owned by the software provider). The telephone registration server 308 performs a second verification 412 using the digital signature and the software providers private key to ensure that the client is not using a pirated (e.g., unauthorized copy of a copyrighted software program) version of the software. The telephone registration server 308 then sends a registration code 414 to the client 302. The client 302 can enter the registration code into his electronic device to allow the digital good to be fully operational.
At 502 the software provider 602 hashes the message (M) 604. Hashing 606 is performed by applying a hashing function (e.ga hashing function that hashes to points on an Elliptic Curve) to the message (M) 604 which returns a relatively small string of characters called the hash value 608. The hash value 608 is a short a summary of the original messages (M) 604 computed with a hashing function. A hash value 608 is nearly impossible to derive the original input number without knowing the data used to create the hash.
The hash value 608 is signed 610 using the software provider's private key (s) 612 forming a digital signature (C) 618 at 504. The digital signature (C) 618 (e.g., signed hash value) provides a way to ensure that the message (M) 604 is authentic (e.g., not altered in any way since it was created by the software provider).
At 506 the software provider 602 forms a software package 614 comprising a product ID comprising the digital signature (C) 616 and the message (M) 604. The software provider's public key(s) (Q and P) 618 and 620 (where P is proportionate to Q and the private key s. (e.g., P=sQ)), may optionally be provided as part of the software package 614 in one embodiment. In other embodiments the public keys Q and P, 618 and 620, may be obtained via other means (e.g., downloaded from the Internet ).
At 508 the client (not shown in
The client performs verification I 600 using the digital signature (C) 616 and message (M) 604 to confirm the software's authenticity at 510. The message (M) 604 and the digital signature (C) 604 are communicated to an untrusted verifier 622 (e.g., clients computer) who has the software provider's two public keys (Q and P) 618 and 620. The untrusted verifier 622 (e.g., client's computer) calculates a pairing function p(x,y) (e.g., a function which uniquely maps two non-negative integers into a single non negative integer) which takes two numbers (e.g., message (M) and public key (Q)) and (e.g., message and public key) and manipulates them to get a third number. For example, to perform the first verification a first pairing function may be calculated 624 from the message (M) 604 and the public key Q 618 which results in a first number Y626 (e.g., Y=p(M,Q)). Similarly, a second pairing function (e.g., can be substantially equal to the first pairing function) may be calculated 624 from the digital signature (C) and public key P 620 which results in a second number X 630 (e.g., X=p(C,P)) If the first number Y 626 and the second number X 630 and are equal (e.g., p(C,F)=p(M,Q)) it signifies that the message (M) 604 and digital signature (C) 616 are authentic (e.g., software has not been altered in any way since it was created by the software provider) and verification I is complete.
At 512 the client provides the digital signature (C) 616 portion of the product ID to a trusted verifier 702 (e.g., telephone registration server). The client can provide the digital signature (C) 616 to the telephone registration server 702 by either speaking the digital signature (C) 616 or entering the digital signature (C) 616 using a touchtone keypad via a telephone.
The telephone registration server 702 performs verification II 700 using the digital signature (C) 616 and software provider's private key (s) 612 to confirm the software's authenticity at 514. The telephone registration server 702 uses the software provider's private key (s) 612 to attain the message (M) 604. For example, the message (M) 604 can be recovered from the digital signature (C) 616 by multiplying (e.g., modular multiplication) the inverse of the private key (s) 612 and the digital signature (C) 616:
M=s
−1
C
Once the recovered message (M′) 706 is obtained the telephone registration server 702 looks for an expected structure 708 (e.g., runs of zeroes in expected places, zeroes in particular places, etc.) in the recovered message (M) 706. If the expected structure is found, then the telephone registration server 702 knows that the recovered message (M′) 706 is authentic. If the expected structure is not found, then the telephone registration server 702 knows that the recovered message (M′) 706 is not authentic.
If the expected structure is found the telephone registration server 702 relays an authentication code to the client at 616. The client can enter the registration code into their electronic device to allow the digital good to be fully operational or the digital content to be fully accessed.
M=d
B
C+d
D
C
Utilization of verifier secret sharing tolerates the compromise of any one server without compromising the entire system.
Comparison of standard secret sharing to the modified version further illustrates the operation of the approach. Standard secret sharing works by letting r,s denote the k-vectors of values of the above secret polynomial, and its coefficients, respectively. There is a known k-by-k Vandermonde matrix V, such that r=Vs mod q. So, given r, s=V−1r mod q can be found, which includes p(0). In the modified version used herein, rC is known instead of r where C is not integer, but an element of G1 (e.g., a point on an elliptic curve). However, it is still true that rC=(Vs)C in G1, and therefore that sC=V−1rC, which includes M=p(0)C.
Still another embodiment involves a computer-readable medium comprising processor-executable instructions configured to apply one or more of the techniques presented herein. An exemplary computer-readable medium that may be devised in these ways is illustrated in
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
As used in this application, the terms “component,” “module,” “system”, “interface”, and the like are generally intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a controller and the controller can be a component. One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers.
Furthermore, the claimed subject matter may be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof to control a computer to implement the disclosed subject matter. The term “article of manufacture” as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier, or media. Of course, those skilled in the art will recognize many modifications may be made to this configuration without departing from the scope or spirit of the claimed subject matter.
Although not required, embodiments are described in the general context of “computer readable instructions” being executed by one or more computing devices. Computer readable instructions may be distributed via computer readable media (discussed below). Computer readable instructions may be implemented as program modules, such as functions, objects, Application Programming Interfaces (APIs), data structures, and the like, that perform particular tasks or implement particular abstract data types. Typically, the functionality of the computer readable instructions may be combined or distributed as desired in various environments.
In other embodiments, device 1112 may include additional features and/or functionality. For example, device 1112 may also include additional storage (e.g., removable and/or non-removable) including, but not limited to, magnetic storage, optical storage, and the like. Such additional storage is illustrated in
The term “computer readable media” as used herein includes computer storage media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions or other data. Memory 1118 and storage 1120 are examples of computer storage media. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVDs) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by device 1112. Any such computer storage media may be part of device 1112.
Device 1112 may also include communication connection(s) 1126 that allows device 1112 to communicate with other devices. Communication connection(s) 1126 may include, but is not limited to, a modem, a Network Interface Card (NIC), an integrated network interface, a radio frequency transmitter/receiver, an infrared port, a USB connection, or other interfaces for connecting computing device 1112 to other computing devices. Communication connection(s) 1126 may include a wired connection or a wireless connection. Communication connection(s) 1126 may transmit and/or receive communication media.
The term “computer readable media” may include communication media. Communication media typically embodies computer readable instructions or other data in a “modulated data signal” such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” may include a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
Device 1112 may include input device(s) 1124 such as keyboard, mouse, pen, voice input device, touch input device, infrared cameras, video input devices, and/or any other input device. Output device(s) 1122 such as one or more displays, speakers, printers, and/or any other output device may also be included in device 1112. Input device(s) 1124 and output device(s) 1122 may be connected to device 1112 via a wired connection, wireless connection, or any combination thereof. In one embodiment, an input device or an output device from another computing device may be used as input device(s) 1124 or output device(s) 1122 for computing device 1112.
Components of computing device 1112 may be connected by various interconnects, such as a bus. Such interconnects may include a Peripheral Component Interconnect (PCI), such as PCI Express, a Universal Serial Bus (USB), firewire (IEEE 1394), an optical bus structure, and the like. In another embodiment, components of computing device 1112 may be interconnected by a network. For example, memory 1118 may be comprised of multiple physical memory units located in different physical locations interconnected by a network.
Those skilled in the art will realize that storage devices utilized to store computer readable instructions may be distributed across a network. For example, a computing device 1130 accessible via network 1128 may store computer readable instructions to implement one or more embodiments provided herein. Computing device 1112 may access computing device 1130 and download a part or all of the computer readable instructions for execution. Alternatively, computing device 1112 may download pieces of the computer readable instructions, as needed, or some instructions may be executed at computing device 1112 and some at computing device 1130.
Various operations of embodiments are provided herein. In one embodiment, one or more of the operations described may constitute computer readable instructions stored on one or more computer readable media, which if executed by a computing device, will cause the computing device to perform the operations described. The order in which some or all of the operations are described should not be construed as to imply that these operations are necessarily order dependent. Alternative ordering will be appreciated by one skilled in the art having the benefit of this description. Further, it will be understood that not all operations are necessarily present in each embodiment provided herein.
Furthermore, it will be appreciated that the message referred to is a hash value of a plaintext message. While beyond the scope of this application, those experienced in the art will appreciate that the message hash value is not an ordinary hash value used with RSA, but is a hash to point value computed based upon an elliptical curve according to the bi-linear pairing system method.
Moreover, the word “exemplary” is used herein to mean serving as an example, instance, or illustration. Any aspect or design described herein as “exemplary” is not necessarily to be construed as advantageous over other aspects or designs. Rather, use of the word exemplary is intended to present concepts in a concrete fashion. As used in this application, the term “or” is intended to mean an inclusive “or” rather than an exclusive “or”. That is, unless specified otherwise, or clear from context, “X employs A or B” is intended to mean any of the natural inclusive permutations. That is, if X employs A; X employs B; or X employs both A and B, then “X employs A or B” is satisfied under any of the foregoing instances. In addition, the articles “a” and “an” as used in this application and the appended claims may generally be construed to mean “one or more” unless specified otherwise or clear from context to be directed to a singular form.
Also, although the disclosure has been shown and described with respect to one or more implementations, equivalent alterations and modifications will occur to others skilled in the art based upon a reading and understanding of this specification and the annexed drawings. The disclosure includes all such modifications and alterations and is limited only by the scope of the following claims. In particular regard to the various functions performed by the above described components (e.g., elements, resources, etc.), the terms used to describe such components are intended to correspond, unless otherwise indicated, to any component which performs the specified function of the described component (e.g., that is functionally equivalent), even though not structurally equivalent to the disclosed structure which performs the function in the herein illustrated exemplary implementations of the disclosure. In addition, while a particular feature of the disclosure may have been disclosed with respect to only one of several implementations, such feature may be combined with one or more other features of the other implementations as may be desired and advantageous for any given or particular application. Furthermore, to the extent that the terms “includes” , “having”, “has”, “with”, or variants thereof are used in either the detailed description or the claims, such terms are intended to be inclusive in a manner similar to the term “comprising.”