1994-03-22 - HW-key SW protection

Header Data

From: dsantos@die.upm.es (Diego Santos Romero)
To: cypherpunks@toad.com
Message Hash: 9003d2e88655272ae648866b3e88ebef86aee6986eaa512ecd586717cb1a1dad
Message ID: <9403221932.AA03856@sparc4.die.upm.es>
Reply To: N/A
UTC Datetime: 1994-03-22 19:28:21 UTC
Raw Date: Tue, 22 Mar 94 11:28:21 PST

Raw message

From: dsantos@die.upm.es (Diego Santos Romero)
Date: Tue, 22 Mar 94 11:28:21 PST
To: cypherpunks@toad.com
Subject: HW-key SW protection
Message-ID: <9403221932.AA03856@sparc4.die.upm.es>
MIME-Version: 1.0
Content-Type: text/plain


Hola a todos!

Perhaps you have seen them. Hw-keys are used to protect sw from unauthorized
copying. Usually, they come as a piece of HW that goes connected to one of the
PC's parallel ports. When you are using sw that is protected, it sends a message
to the hw key, and this responds with a signal or data block authorizing (or
enabling) the computation to proceed. If you have a copy and do not have the key, you cannot go on. If you have the key then you can make as many copies of the
sw as you need (as back up, for example) and be able to use all of them (albeit not at the same time, you have just one key!).

Well, the question is: Does anyone of you know what kind of algorithm do this
hw keys use? 

Saludos, Diego





Thread