JPS58154040A - Method for inhibiting use of charged program - Google Patents

Method for inhibiting use of charged program

Info

Publication number
JPS58154040A
JPS58154040A JP57036776A JP3677682A JPS58154040A JP S58154040 A JPS58154040 A JP S58154040A JP 57036776 A JP57036776 A JP 57036776A JP 3677682 A JP3677682 A JP 3677682A JP S58154040 A JPS58154040 A JP S58154040A
Authority
JP
Japan
Prior art keywords
program
code
user
codes
paid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP57036776A
Other languages
Japanese (ja)
Inventor
Setsuo Inagaki
稲垣 節雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujitsu Ltd
Original Assignee
Fujitsu Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Ltd filed Critical Fujitsu Ltd
Priority to JP57036776A priority Critical patent/JPS58154040A/en
Publication of JPS58154040A publication Critical patent/JPS58154040A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Abstract

PURPOSE:To inhibit copying a charged program for the foul use, by ciphering the program with designated codes and to supply the program in showing that this program is charged, and then decoding the program by the user with the codes related to the designated ones. CONSTITUTION:A program feeder (a) ciphers a program read out of a program library 1 at a processing part 3 and with use of a specific code 2 (e.g., A) which is assigned to the user. Then a flag region is newly set up to show that the program is charged, and this program is recorded to a magnetic tape 4. A program user (b) detects a code A' out of the tape 4 at a register processing part 5 and with use of a user code B which has a fixed relation with the code A and compares it with the code A of the tape 4. Then the user (b) decodes 9 the program stored in a program library 7 if the coincidence is obtained between codes A and A'. The decoded program is loaded to a recorder 10. It is impossible to perform decoding 9 when no coincidence is obtained between A and A'. Thus the use of the program is impossible unless the relation is made clear between codes A and B, although the program is copied for the foul use and used at a different place.

Description

【発明の詳細な説明】 に)発明の技術分野 本発明はプログラム作成者が有償プログラムを供給した
際に他の資格のない人が有償プログラムを使用すること
を禁止する有償プログラム便用糸上方法に関するもので
ある (口)技術の背景 電子計算機システムを稼動するには、プログラムが必要
でおり、このプログラム開発には多大の工数と経費を委
する。従って特定用途に開発作成されたプログラムは有
償にしてユーザーに供給している。この有償プログラム
を複写或は移植して資格のない人々に使用されることは
プログラム作成者の利益が著しく損なわれ有償プログラ
ムの意味もなくなることとなる。
[Detailed Description of the Invention] Technical Field of the Invention The present invention relates to a method for distributing a paid program that prohibits other unqualified persons from using the paid program when a program creator supplies the paid program. Technical Background: A program is required to operate an electronic computer system, and the development of this program requires a large amount of man-hours and expenses. Therefore, programs developed and created for specific purposes are provided to users for a fee. If this paid program is copied or ported and used by unqualified people, the interests of the program creator will be seriously damaged and the paid program will lose its meaning.

((3)  従来技術と問題点 ところが以上のことに対処するために従来特定プログラ
ムと情報処理装置の各々に暗誦情報を付与し各々の暗誦
情報を比較して一致したる際特定グログラムの使用を許
可するという方法が提案されている。しかしこの方法に
て特定10グフムの、使用を禁止することは充分でない
といった欠点があり、運用上便利で且つ有効に使用の禁
止が行える有償ブロクラム使用禁止方法が要望されてい
た。
((3) Problems with the prior art However, in order to deal with the above problems, in the past, recitation information is given to each of the specific program and the information processing device, and when the recitation information of each is compared and matches, a specific program is used. However, this method has the disadvantage that it is not sufficient to prohibit the use of specific 10 ghum, so there is a method of prohibiting the use of paid blocks that is operationally convenient and effective. was requested.

に)発明の目的 この発明は、以上のような従来の状況から有償プログラ
ム使用を禁止するとともに、所要時に特定技術者はこの
禁止の解放を行える有償プログラム使用禁止方法の提供
を目的とするものである。
B) Purpose of the Invention The purpose of the present invention is to provide a method for prohibiting the use of paid programs, which prohibits the use of paid programs in view of the above-mentioned conventional situation, and allows a specified engineer to release this prohibition when necessary. be.

(θ)発明の構成 簡単に述べるとこの発明は、指定され九コードにもとづ
いて有償プログラムを暗号化するとともに有償プログラ
ムであることを示すフラグ領域をそのプログツふに設定
し、プログラムライブフリに登録するに際して前記コー
ドに対応するコードが指定され9両コードの一致、不一
致によって前記フラグ領域の状態を設定し、プログラム
ライブフリよシ主記憶装置にロードするに際してフラグ
領域の状taKよってプログラムの復号化を制御するこ
とを特徴とする。
(θ) Structure of the Invention Briefly stated, this invention encrypts a paid program based on a specified code, sets a flag area in the program indicating that it is a paid program, and registers it in the program live free. When executing the program, a code corresponding to the above code is specified, and the state of the flag area is set depending on whether the codes match or do not match, and when the program is loaded into the main memory, the program is decoded according to the state of the flag area taK. It is characterized by controlling.

(1)発明の実施例 図はこの発明を適用した有償プログラム使用禁止方法の
一実施例を示すブロック図であって、lはプログラム・
ライプフリ、2と6はユーザー・コード、Bは有償プロ
グラム処理部 4は磁気テープ6は登S旭理II、  
7はユーザー・ライプフリ、8はプログラムロード部、
9は解読部、ioは主記憶装置である。
(1) Embodiment of the Invention The figure is a block diagram showing an embodiment of a paid program usage prohibition method to which this invention is applied, and l is a
Leipfuri, 2 and 6 are user codes, B is a paid program processing unit, 4 is a magnetic tape 6 is Tosori Asahi II,
7 is user life free, 8 is program load section,
9 is a decoding unit, and io is a main storage device.

図における一点鎖線の上部即ちに)、下部即ち(至)は
それぞれプログラム供給者とユーザー側を示している 有償プログラムを磁気テープ4に格納してユーザーに提
供する場合にはデルグラム供給者はプログラム・ライプ
フリ1よシブログラムを取シ出し有償プログラム処理部
8に入力する。このとき提供するユーザーに割当てたユ
ーザー・コード2例えばコードAを有償プログラム処理
部8に入力する。有償プログラム処理部8は有償プログ
ラムであることを示すフラグ領域を10グフム内の所定
の暗所に新設するとともに、プログラム・ライプフリ1
よシのプログラムを入力されたコードAにもとづいて暗
号化して有償プログラムを作成して磁気テープ4に格納
lする。暗号化とは例えば特定ビット毎にビット情報を
変換するものである。
The upper part (to) and the lower part (to) of the dashed-dotted line in the figure indicate the program supplier and the user side, respectively. When a paid program is stored on the magnetic tape 4 and provided to the user, the Delgram supplier is the program supplier. LiveFuri 1 extracts the sibling program and inputs it to the paid program processing section 8. At this time, a user code 2, for example code A, assigned to the user to be provided is input into the paid program processing unit 8. The paid program processing unit 8 newly establishes a flag area indicating that the program is a paid program in a predetermined dark place within 10 minutes, and
The desired program is encrypted based on the input code A to create a paid program and stored on the magnetic tape 4. Encryption is, for example, converting bit information for each specific bit.

ユーザー側にてはこの有償プログラムをユーザープログ
ツムライプフリー7に登録すべく登録処理部HC入力す
る。このと色登録処理部5にはユーザコード例えばコー
ドBが入力される。このコードBは前記コードAと対応
している。登録処理部6はコードBをコードAに変換す
る機能と変換したコードと磁気テープ4のコードAとの
比較を行い等しければ磁気テープ4の7フグ領域をセラ
F即ち11′を書龜込む。両コードを比較して異なって
おればフラグ領域をリセットすなわちO′を書龜込みユ
ーザー・プログラムライブラリー7にプログラムを格納
する。このユーザー・プログラムライブフリー7から要
求に応じてプログラムロード部8を介して主記憶装置1
0にプログラムをロードするのであるが、プログラムロ
ード部8は上述のフラグ領域の%t” o’を検出し%
l#であれば解読部9にてプログラムをデコードして本
来のプログラムに変換して配憶装置IOにロードする。
On the user side, input is made to the registration processing unit HC in order to register this paid program in the user program Live Free 7. At this time, a user code, for example code B, is input to the color registration processing section 5. This code B corresponds to the code A mentioned above. The registration processing section 6 has a function of converting code B into code A, and compares the converted code with code A of the magnetic tape 4, and if they are equal, writes Cera F, that is, 11', into the 7 puffer region of the magnetic tape 4. The two codes are compared and if they are different, the flag area is reset, that is, O' is written and the program is stored in the user program library 7. This user program is transferred to the main storage device 1 via the program load section 8 in response to a request from the user program Live Free 7.
0, the program loading unit 8 detects %t"o' in the flag area mentioned above and reads %t"o'.
If it is l#, the decoder 9 decodes the program, converts it into the original program, and loads it into the storage device IO.

フラグ領域が10′であればそのt−すなわちデコード
しないで主記憶装置10にロードする。従って有償プロ
グラムを移植即ち複写を行い別の箇所の処理装置に使用
してもユーザフードAとBとの関係が明確でなく分らな
ければフラグ領域が10′となりデコードされることな
く暗号化されたプログラムが主記憶装置IOK格納され
るので、プログラムが所期の手順を行ない得ないので有
償プログラムの使用が禁止される。
If the flag area is 10', it is loaded into the main memory 10 without being decoded. Therefore, even if a paid program is ported or copied and used in a processing device in another location, if the relationship between user hoods A and B is not clear and cannot be understood, the flag area becomes 10' and is encrypted without being decoded. Since the program is stored in the main memory IOK, the program cannot perform the intended procedure and use of the paid program is prohibited.

更にプログラム供給者側にてはコードAとBの関係は判
明しているのでユ・−°ザの要請によプ有償プログラム
の禁止を容易に解除できる。
Furthermore, since the program supplier knows the relationship between codes A and B, it can easily cancel the prohibition of paid programs at the user's request.

(2)発明の効果 上述のごときこの発明によれば有償プログラムを移植し
ても使用を禁止するとともに所要時に特定技術者はこの
禁止音解放が行え有償プログツムリ 運用上利点の大きいものとなゐ効果大である。
(2) Effects of the Invention According to the invention as described above, even if a paid program is ported, its use is prohibited, and a specific engineer can release the prohibited sound when necessary, which is a great advantage in the operation of paid programs. It's large.

【図面の簡単な説明】[Brief explanation of the drawing]

図はこの発明を適用した有償プログラム使用端止方法の
一実施例を示すブロック図である。 2と6はユーザー・コード、8は有償プログラム処理部
、5は登録処理部、8はロード部、9は解読部である。
The figure is a block diagram showing an embodiment of a paid program use termination method to which the present invention is applied. 2 and 6 are user codes, 8 is a paid program processing section, 5 is a registration processing section, 8 is a loading section, and 9 is a decoding section.

Claims (1)

【特許請求の範囲】 指定されたコードにもとづいて有償プログラムを暗号化
するとともに有償プログラムであることを示す7フグ領
斌をそのグログラふに設定し、プログフムフイプフリに
登録するに際して前記コードに対応するコードが指定さ
れ9両コードの一致。 不一致によって前記フフグ領域の状縣を設定し。 プログラムフイプラリより主記憶装置にロードするに際
してフラグ領域の状態によってプログラムの復号化を制
御することを特徴とする有償プログラムの使用禁止方法
[Claims] A paid program is encrypted based on a specified code, and 7 puffer flags indicating that it is a paid program are set in its grograph, and when it is registered in the program, the code is encrypted. The corresponding code is specified and 9 codes match. Set the shape of the fufugu region according to the discrepancy. A method for prohibiting the use of a paid program, characterized in that decoding of the program is controlled according to the state of a flag area when the program is loaded from a program library into a main storage device.
JP57036776A 1982-03-08 1982-03-08 Method for inhibiting use of charged program Pending JPS58154040A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP57036776A JPS58154040A (en) 1982-03-08 1982-03-08 Method for inhibiting use of charged program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP57036776A JPS58154040A (en) 1982-03-08 1982-03-08 Method for inhibiting use of charged program

Publications (1)

Publication Number Publication Date
JPS58154040A true JPS58154040A (en) 1983-09-13

Family

ID=12479167

Family Applications (1)

Application Number Title Priority Date Filing Date
JP57036776A Pending JPS58154040A (en) 1982-03-08 1982-03-08 Method for inhibiting use of charged program

Country Status (1)

Country Link
JP (1) JPS58154040A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS63127334A (en) * 1986-11-05 1988-05-31 インターナシヨナル・ビジネス・マシーンズ・コーポレーシヨン Withdrawal and conditioning execution right from software protection mechanism in safety
JPS649524A (en) * 1987-06-26 1989-01-12 Ibm Prevention of execution of wrong program in computer system
WO1995022825A1 (en) * 1994-02-19 1995-08-24 Nsm Aktiengesellschaft Interchange system for running storage media

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS63127334A (en) * 1986-11-05 1988-05-31 インターナシヨナル・ビジネス・マシーンズ・コーポレーシヨン Withdrawal and conditioning execution right from software protection mechanism in safety
JPH0332813B2 (en) * 1986-11-05 1991-05-14 Intaanashonaru Bijinesu Mashiinzu Corp
JPS649524A (en) * 1987-06-26 1989-01-12 Ibm Prevention of execution of wrong program in computer system
JPH0570859B2 (en) * 1987-06-26 1993-10-06 Ibm
WO1995022825A1 (en) * 1994-02-19 1995-08-24 Nsm Aktiengesellschaft Interchange system for running storage media

Similar Documents

Publication Publication Date Title
DE69729495T2 (en) Image information processing system and microprocessor for the protected reproduction of audiovisual data
US5146575A (en) Implementing privilege on microprocessor systems for use in software asset protection
KR100970527B1 (en) Content management method and content management apparatus
CN101833632B (en) System and method for execution of a secured environment initialization instruction
CA2333613C (en) Method of controlling usage of software components
US8191155B2 (en) Microprocessor
JPH08305558A (en) Ciphering program arithmetic unit
WO2007040228A1 (en) Information processing device, information processing method, and program
EP0818723A2 (en) Computer system with a copy-protecting function and recording medium for use with the same
JPS58154040A (en) Method for inhibiting use of charged program
JPS63129564A (en) Preventing system for unauthorized copying of recording medium
JPS63153633A (en) Use limitation system for program
JPS5887631A (en) Management system for period of onerous software
JPS61134836A (en) Limiting system for application of software
JPS6120159A (en) Method for limiting use of software
JPS6136842A (en) Foul use preventing system using software copy
JPS62278650A (en) File protection system
JPS61109144A (en) Storage medium with copy preventing function
JPH02165334A (en) Program protection system
JPS6167161A (en) System for inhibiting universal use of software
JPH02138622A (en) Microprocessor
JP2024504987A (en) key capabilities storage
JPS6249541A (en) Method for inhibiting use of program without permission
JPS6261123A (en) Software protecting device
JPS61231631A (en) Data processor