Systems and methods for data protection
Described herein are systems and methods for data protection. In overview, the present systems and methods are primarily adapted to provide data protection in situations where a software image is regulated, thereby limiting the ability to embed a unique identifier in the software image or an image a...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Described herein are systems and methods for data protection. In overview, the present systems and methods are primarily adapted to provide data protection in situations where a software image is regulated, thereby limiting the ability to embed a unique identifier in the software image or an image area of a carrier medium that carries the software image. In overview, according to one embodiment a data protection method includes operating a computing device thereby to access a removable carrier medium. The removable carrier medium is configured to maintain computer readable data, wherein the carrier medium includes a first readable memory storage component which is able to be duplicated by conventional means to a corresponding memory storage component of a similar carrier medium. The carrier medium also includes a second readable memory storage component that is not able to be duplicated by conventional means to a corresponding memory storage component of a similar carrier medium wherein the second readable component includes an identifier that is configured to enable unique identification of the carrier medium. The method further includes operating a computing device to read a set of data including data belonging to a software element and the identifier that is configured to enable unique identification of the carrier medium. The method further includes applying a predetermined algorithm to data read at (i) and (ii) thereby to define a validation token for the software element as carried by the carrier medium; and writing the validation token the carrier medium. (FIG. 1) 101 Write software element to carrier medium 102 Seal carrier medium based with validation token Carrier medium provided to machine for execution Verification successful Verification unsuccessful 104 Execute software Prevent execution of 105 element software element |
---|