Systems and methods for data protection

Abstract Described herein are systems and methods for data protection. In overview, the present systems and methods are primarily adapted to provide data protection in situations where a software image is regulated, thereby limiting the ability to embed a unique identifier in the software image or a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: GNANASUNDRAM, BAHEERATHAN, ESKIN, ERDAL, MANCHANAYAKE, WARUNA
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Abstract Described herein are systems and methods for data protection. In overview, the present systems and methods are primarily adapted to provide data protection in situations where a software image is regulated, thereby limiting the ability to embed a unique identifier in the software image or an image area of a carrier medium that carries the software image. In overview, according to one embodiment a data protection method includes operating a computing device thereby to access a removable carrier medium. The removable carrier medium is configured to maintain computer readable data, wherein the carrier medium includes a first readable memory storage component which is able to be duplicated by conventional means to a corresponding memory storage component of a similar carrier medium. The carrier medium also includes a second readable memory storage component that is not able to be duplicated by conventional means to a corresponding memory storage component of a similar carrier medium wherein the second readable component includes a identifier that is configured to enable unique identification of the carrier medium. The method further includes operating a computing device to read a set of data including data belonging to a software element and the identifier that is configured to enable unique identification of the carrier medium. The method further includes applying a predetermined algorithm to data read at (i) and (ii) thereby to define a validation token for the software element as carried by the carrier medium; and writing the validation token the carrier medium. (FIG. 1) 101 Write software element to carrier medium 102 Seal carrier medium based with validation token Carrier medium provided to machine for execution Verify validation token Verification successful Verification unsuccessful 104 Execute software Prevent execution of 105 element software element