CA1232080A - Security system - Google Patents

Security system

Info

Publication number
CA1232080A
CA1232080A CA000478592A CA478592A CA1232080A CA 1232080 A CA1232080 A CA 1232080A CA 000478592 A CA000478592 A CA 000478592A CA 478592 A CA478592 A CA 478592A CA 1232080 A CA1232080 A CA 1232080A
Authority
CA
Canada
Prior art keywords
data
encoded
algorithm
optical
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired
Application number
CA000478592A
Other languages
French (fr)
Inventor
Barry J. Frost
Richard G. Bingham
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GB848425017A external-priority patent/GB8425017D0/en
Application filed by Individual filed Critical Individual
Application granted granted Critical
Publication of CA1232080A publication Critical patent/CA1232080A/en
Expired legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Record Information Processing For Printing (AREA)
  • Controls And Circuits For Display Device (AREA)
  • Storage Device Security (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

ABSTRACT OF THE DISCLOSURE

The invention provides security systems for pro-tection of computer software against unauthorized access such as to inhibit the running of computer programs whilst still permitting the software to be copied and in the pro-duction of encoded documents, lables and tags which cannot be read but again, can be copied. The present invention provides a system to inhibit unauthorized access to data comprising output means to transpose two or more components of an element of said data in accordance with a preselected algorithm, and thus produce an encoded element, and decoding means to rearrange said encoded element, thereby recreating the element of said data, the output means comprising at least one microprocessor programmed with said algorithm and means for displaying the encoded element in visible form, and the decoding means comprising at least one optical element capable of rearranging said encoded element.

Description

~3~

M&C FOLIO: 230P49982 WANGDOC.0319s T i t le:- S~CURIT~ SYSTEMS

This invention relates to a security system and, in one particular embodiment, to security systems for protection of computer software against unauthorised access. One specific application for this invention is 5 to inhibit the running of computer programs whilst still permitting the software to be copied. A further specific application of the invention is in the production of encoded documents, labels and tags which cannot be read but again, can be copied o Both in industry and in commerce, there is a demand to restrict access to information. One way of doing this is to prevent unauthorised access to documents, computer tapes or other storage media. This has the disadvantage that all copying, transport and backup work has to be carried GUt by authorised personnel. Even with precautions being taken in this manner, it is possible that passwocds and information may still be copied.

In the related field of computer software sales, especially in the mainframe micro and mini computer ED markets, software piracy is a large and growing problem. The needs of the vendor in preventing copying 1~3~8~) of programs conflict with the needs of the user to copy valuable software as a hedge against corruption of storage media.

In the still further related field of label production, 5 it is often necessary to provide a label on an article which cannot be read by a potential buyer. but can be read by one offering to sell. Clearly, apparatus for reading the information should be readily portable and rapidly usable.

o In a still further related field of database managment it is occasionally preferable for a host to restrict user access to specific files.

It is one object of the present invention to provide a method of storage which allows copying but restricts l5 user access.

United States Patent 4480179 provides an apparatus for coding and/or decoding a written document comprisinq a plurality of fibre-optic light paths which re-arrange the relative positions of parts of the document while Jo the document is being photocopied. The apparatus thus produces an encoded document which can be read by reversing the coding process.

~;~3~

According to one aspect of the present invention there is provided a system to inhibit unauthorised access to data comprising;

a) output means to transpose two or more components of an element of said data in accordance with a preselected algorithm, and thus produce an encoded element, and, b) decoding means to rearrange said encoded element, thereby recreating the element of said data, CHARACTERISED IN THAT, the output means comprise at least one microprocessor programmed with said algorithm and means for displaying the encoded element in visible form, and the the decoding means comprise at least one optical element capable of rearranging said encoded element.

lS By employing a microprocessor to encode the element of data in accordance with a preselected algorithm and employing an optical element capable of rearranging the encoded element when displayed in visible form, it is possible to enable an authorised user to access the 20 element of data by providing the user with an optical element. Clearly, the particular configuration of the optical element will depend on the particular form of the preselected algorithm. The term microprocessor is ~23~8~

intended to include those elements of a computer which perform the functions of a microprocessor, such as, for example, the central processing unit.

Typically, the element of said data comprises an S alphanumeric character.

By employing alphanumeric characters as the elements of the data it is possible to display a password, price tag or other quantitative or qualitative information to a user equipped with the optical element.

In a first preferred embodiment of the present invention, the element of said data is selected at random from a range of elements and comprises the password for access to the data.

By employing a range of elements from which the element of said data is selected at random it is possible to prevent a user from having future access to the data without the user possessing the optical element.

Thus, in a particular application of this first embodiment of the present invention, the system further comprises input means for input of alphanumeric characters and comparator means for comparing the input with the element of said data selected at random from 5 ~L2~2~
the data.

By employing input and comparator means as defined above, it is possible to enable the data to be copied without consequently allowing the copied data to be accessed. Only a user who is in possession of the optical element may decode the coded element and therefore input the correct alphanumeric character or characters to access the data. It is envisaged that the invention will find a particular utility in systems o which are intended to protect computer software or similar data held either in a static or dynamic memory device. In the case of computer software, a randomly or pseudo-randomly selected password is shown on the screen for the user to input. The password is however displayed in an encoded form which cannot be read until viewed through the optical element. It is envisaged that the algorithm which encodes the data will be itself held as part of the data, as would a suitable password-generating program, and a suitable comparator program.
? o In certain embodiments the data would furthec comprise a set of machine readable instructions for the deletion or corruption of the data, or for the generation of a warning message for display either to the user or at some other location.

~5 It is generally supposed that the display means would ~23~
comprise the VDU screen in embodiments which employ a computer unit as part of the system, however it should be noted that the invention is not to be considered as limited to such embodiments and extends to other 5 embodiments employing light-emitting diodes, liquid crystal displays, or other visual signal generating means.

Furthermore, the invention is not limited to embodiments in which the data is held in or on a magnetic form, such 1O as on a reel of magnetic tape or a floppy or fixed disk. Therefore the invention is intended Jo extend to those embodiments in which data is encoded in other machine-readable forms, such as laser disks, punched tape or semiconductor arrays. Moreover some of the data 5 may be recorded in other forms, such as photographic film materials or video tape or disk, and thus the invention extends to a system for the prevention of unauthorised access to, for example, a cable television or other diffusive system, including but not limited to Jo systems in which at least part of the data is transmitted down fibre optic, telephone, or radio links or the like.

The display may be static or may scroll in a direction such that the optical element is caused to scan the 25 encoded element. If an image is formed of the encoded ~2~

element this image may in some embodiments be a real image while in others may be a virtual image.

In a second ereferred embodiment of the present invention, the means for displaying the encoded element in visible form comprise a printing apparatus.

By employing a printing apparatus to display the encoded element it is possible to provide a permanent or shard"
copy of the encoded element of the data.

Thus, in a particular application of this second Jo embodiment of the present invention, the means for displaying the encoded element of data, provide labels having the encoded element of data printed thereon.

By providing labels having encoded data printed upon them it is possible to enable articles to be marked with 5 elements of data which cannot be read by the casual observer. It is envisaged that this particular embodiment of the invention will be useful in those areas of commerce and trade in which, for example, goods are to be labeled with data which is not for the view of ~0 potential customers but is required by sales staff.

The manner of labelling shall not exclude the use of magnetic inks or other machine-readable printed formats.

~L;2 3~B~

Clearly, the computer software required to run the label printing embodiment of the invention will differ from that in the access inhibition system described generally above. It will however still include means for 5 transposing portions of the element of data before display, although there is not in tnis embodiment a requirement that the element of data so encoded is selected at random, rather the element to be encoded will be selected specifically for coding under user or ;o system control.

According to a second aspect of the present invention there is provided an optical element capable of transforming a first image into a second image by the transposition of at least two portions of said first 15 image, CHARACTERISED IN THAT, the said optical element is substantially planar and at least one optical parameter of the said optical element varies across the said plane.

By providing an optical element which is capable of 2D transposing portions of an image and is substantially planar it is possible to provide a readily portable means for decoding an element of data which has been encoded by the transposition of portions of the said data.

1232~

Conveniently, the optical element comprises an array of light-transmissive elements each capable of deflecting a ray of light from a first path to a second path whereby at least two of said elements are so disposed to transpose the two portions of the first image.

By employing a light-transmissive element is is possible to enable the optical element to be constructed in a variety of ways. For example, optical element may bring about the transposition of the elements of the encoded o data by means of refraction at a surface or within a body of light-transmissive material having a varying refractive index. It is envisaged that the surface of each light-transmissive element may be flat or curved, discontinuous or continuous, and that the optics of each ~5 light-transmissive element may be axisymmetric or non-axisymmetric, magnifying or non-magnifying, polarising or non-polarising.

Alternatively, the optical element may comprise an array of light-reflective elements each capable of deflecting 20 a ray of light from a first path to a second path whereby at least two of said elements are so disposed to transpose the two portions of the first image.

Once again there is a varieey of ways in which the optical element may be constructed within the definition ~3~

given above. Again, it is envisaged that the surface of each element may be flat or curved, continuous or discontinuous.

In both the above embodiments it is intended that the 5 invention should extend to those optical elements which employ the techniques of holography. By employing a holograph as the optical element it is possible to make duplication of the element more difficult, without access to specialist equipment and therefore inhibit lo further unauthorised access to the data. Furthermore the use of a holograph allows the precise optical configuration of the optical element to be varied during manufactuce, as well as enabling easy mass production of the optical elements by a suitable photographic process.

In an embodiment of the present invention, each said light-transmissive element comprises a prism.

By employing a prism as each said light-transmissive element it is possible to manufacture the optical elements cheaply and quickly from a suitable plastics Jo material, for example by stamping, pressing and/or moulding operations.

According to a third aspect of the present invention, there is provided an optical element for use with the ~23~V8~) system according to the first aspect of the present invention and capable of transforming a first image into a second image by the transposition of at least two portions of said first image, 5 CHARACTERISED IN THAT, the said optical element is a substantially planar, light-transmissive body having at least one optical parameter which varies across the said plane.

By employing an optical element as defined above it is lo possihle to rearrange the encoded element of data in accordance with the predetermined algorithm and thereby to reproduce said rearranged components Apparatus in accordance with the invention can be used for the protection of magnetically and optically 15 recorded media, such as computer software or video recordings. As described above, it can also be used foe decrypting printed material. The system can also be used in an electro-optical system internal to a machine or robot viewing device, i.e. without human vision.

Jo The light source for the device is obtained from a luminous screen or an array of light emitting devices, or in the case of printed material, natural or artificial light. Natural or artificial light would be ~23~

used for liquid crystals or other non-light emitting devices.

The invention will now be particularly described with reference to the accompanying drawings, in which :-Figure 1 shows decoding of a displayed symbol, Figure 2 another method of decoding a differentlyencoded displayed symbol, Figure 3 a decoding device including means for magnification, O Figure 4 illustrates a means of modifying the decoding device of Figure 4 in order to facilitate alignment, Figure 5 shows a further means of modification to prevent cross-talk, Figure 6 shows a mounting for the device of Figure 4, IS Figure 7 shows a diagram illustrating a method of setting up a device in accordance with the invention, Figure 8 shows a mounting means for a decoder device, ~23;~

Figure 9 shows a means of incorporating a decoder device into a cassette tape holder, Figure lO is a block diagram of a data security system incorporating a device as described herein and, I F;gures lla-lld illustrate possible flow charts for a microprocessor system which embodies the present invention.

Refering now to Figure l of the drawings, an encoded alphanumeric character is displayed in dot-matrix form lo on a screen (l). The dots making up the character to be read are deviated from their correct positions by distances and in directions determined by a predetermined algorithm so that the particular character cannot be recognised. Mounted before the display screen l5 is a multi-faceted prism device (3) having facets (4) to rearrange the dot pattern to provide a decoded display or image of the display on screen (l). The dot pattern may include bogus dots which are either deflected to an insignificant position or are not transmitted by the Jo prism. In this as in other embodiments of the present invention the mathematical mapping between the display on the screen and the image of the screen may be a one-one, many-one, many-many or one-many mapping.

In the arrangement of Figure l vertical columns of dots forming the character have been deviated sideways by various distances to alter their order.

In the decoding prism (3) the angles of the prisms (4) have been calculated to deflect the vertical columns to their correct order. On the viewing side of the prism, an eye (S) sees the dot matrix reareanged to display the decoded character (6), which in this example is the english alphabetic character ~'R".

lo The device is primarily intended to protect magnetically and opticaly stored data and under these conditions the algorithm for encrypting a character may be stored with the data on a suitable media.

Figure 2 shows a system in which the dots (7) of a lo dot-matrix character have been deviated in vertical and horizontal directions. The decoding optical element has the angles of the facets (9) calculated to correct the vertical and horizontal deviations. The resultant display (10) as seen by the user when the eye is Jo positioned behind the device has been corrected by the optical system.

There may be any number of optical elements in the optical path betwen the display and the viewer.

~3;~8~) Examples of optical techniques separately or in combination which may be used for encrypting data are faceted optical surfaces, axisymmetric optical systems, non-axisymmetric optical systems, refracting elements, 5 lenses, prisms, graded index optical media and materials of differing refractive indices. Additionally the following may be employed either in combination with other techniques or in isolation; mirrors, pin holes, tubes and baffles, masks, polarisers, optical components o with continuous (smooth) shapes, optical components with discontinuous shapes, fibre optics and waveguides, diffraction gratings and interference gratings or masks, holographic lens elements, and retroreflecting devices.

Figure 3 shows a decoding device which contains a single l5 compound magnifying element (11). An alternative is to add a magnifying element to each of the lenses within the construction, forming a lens array. These magnifying elements serve to aid vision. or to project the pattern onto a photoelectric detector.

Spacing arms (13) (Figure 4) may be added to the construction (14). Any suitable shape of spacing arms may be used to obtain the correct viewing distance or spacing of the decoder device from the display screen.

In the embodiment of Figure 5 individual facets of a ~3~

prism are each set in separate channels (15) to avoid cross-talk. Alternatively. tubes or perforated baffles may be used, or part or parts of the device darkened (16a). An optical system in accordance with the 5 invention may be sealed into a construction by means of a clear cover as shown in figure 6.

In the arrangement of Figure 7 the correct viewing distance is found by displaying two reference points which are superimposed by means of reference facets.

Jo The alignment points (19) may be identified by shape, flashing, intensity or colour. The physical position of the device is correct when the specific parts of the pattern overlap at the viewing position (22).

Figure 8 shows how a decoder device (23) can be mounted l5 on or built into a convenient size holder (24) to assist with the handling. The holder may have printing if required to identify the lens system and may include any of the features detailed in the previous Figures.

Figure 9 shows how the features illustrated in Figures 4 Jo and 8 can be combined so as to mount the optical system into the container or packing or recorded printed media. In the example shown in Figure 9 the optical system (22) is built into the lid of a cassette tape 1~32~

holder (26). The length of the lid (27) provides the correct viewing distance.

The optical system may be incorporated into any convenient part of a container or packing material or 5 with a suitable fitting attached to any piece of equipment. As an alternative to single facets to deflect predetermined dots of a matrix, multi-faceted prisms may be used, with a plurality of facets to deflect dots in a predetermined position. This would o have the advantage that the individual areas viewed are smaller than the dots of the matrix so facillitating alignment.

Alternatively, a liquid crystal mask may be used as a decoder device, such as is described in Kowel et al.
5 (Applied Qptics, 23. 16. pp. 2774-2777). This has the two advantages that it makes the device more difficult to copy fraudulently and that its optical parameters may be changed under program control.

A complete system is depicted in Figure lO, in which an encrypted character is displayed on a display device (28). The display is decoded by a decoder (29). In response to the displayed character, a trigger device (30) generates a signal which is fed to a selector device (31) which permits or prevents access to further ~3~!8~) data according to the signal generated by the trigger device.

Figures ~la-lld show possible slow charts for the operation of a computer system which embodies the 5 present invention. It should be understood that the manner in which computer systems display information is particularly variable from machine-type to machine-type and therefore the particular details of the program to perform this function will vary considerably over a range of machines; thus a general sceme is given by way of example.

Turning now to figure lla. there is shown a general sceme for the flow chart of a program to be used as described herein. The processor unit starts by loading a randomly or pseudo-randomly selected character into RCl, and follows this by loading a second random or pseudorandom character into RC2. The processor then calls Subroutine which displays the characters. The next routine excecuted is Subroutine B which reads the
2~ keyboard, as with the display of characters the particular manner in which a machine reads the keyboard will vary. Subroutines A and B are described in more detail below.

The character read from the keyboard is now loaded into 1~3~80 the register KC1 and a second keyboard reading operation is performed. The second character is also loaded into a register, this time KC2.

The comparator now considers whether or not RCl=KC1 and 5 RC2=KC2. If this is true, then the protected software may be run, otherwise the user is given a further chance to access the data as the program selects a further set of random characters.

Should the user fail to enter the correct figures in, ofor example, three sucessive attempts then the system denies access to the protected data and may in some embodiments delete or corrupt the data.

Figure llb. gives a subroutine for the display of characters RC1 and RC2 in encoded form. The system 15 first clears the screen and then displays a set of lens alignment points. Subroutine C is then called, which displays RC1 or RC2 in an encoded form. The subroutine ends at this point with a return instruction. It is important to note that the algorithm of subroutine C for Jo encoding may be loaded into the microprocessor from the data itself.

Figure llc. shows a schematic of subroutine B, that is the subroutine which reads the keyboard. The subroutine 32~8[) starts by setting a time period counter which holds a number indicative of the time since the subroutine was called. The keyboard is then read; this is normally done by scanning the keyboard or reading the keyboard 5 buffer. If there is no input then the time period counter is reduced and a check is made to see whether or not the time period counter has reached zero. If the time period has expired then the subroutine is exited with a return instruction. If the time period has not l expired then the keyboard is scanned again.

On input, the scanning loop is exited and a check is made as to whether or not the keyboard signal indicates that the user wishes to increase or decrease the size of the display. If a size change is reqired then 15 subroutine A is called to erect a new display with the size factor E changed.

The purpose of the size changing facility is to enable the system to be used with varying sizes of monitor screens. If no size change is required then the input 20 character is stored and the subroutine exited.

Figure lld. shows subroutine C, which displays the encoded character. In this example it is assumed that the particular computer in which the program is contained employs an eight by eight matrix for the ~23~8C) display of characters. The subroutine contains two nested loops the outer one of which repeats for each byte and the inner one of which repeats for each bit.

Each bit is read in turn and, if it is true that the 5 bit=l then the screen co-ordinates for that bit are calculated and if necessary expanded by the factor E.
In the case of the first bit, the display co-ordinates which are calculated are those which the algorithm states the first bit is to be transposed to, and so on lo for each bit.

The algorithm may be stored as a table of required deviation or alternatively as a matrix of suitable dimensions to transform the coordinates of the character selected for coding. In the former the algorithm is l5 changed by altering the contents of the table.

when each bit has been checked for whether the bit=l, transposed and displayed the subroutine is exited with a return instruction.

Claims (8)

THE EMBODIMENTS OF THE INVENTION IN WHICH AN EXCLUSIVE
PROPERTY OR PRIVILEGE IS CLAIMED ARE DEFINED AS FOLLOWS:
1) A system to inhibit unauthorised access to data comprising;

a) output means to transpose two or more components of an element of said data in accordance with a preselected algorithm, and thus produce an encoded element, and, b) decoding means to rearrange said encoded element, thereby recreating the element of said data, CHARACTERISED IN THAT, the output means comprise at least one microprocessor programmed with said algorithm and means for displaying the encoded element in visible form, and the the decoding means comprise at least one optical element capable of rearranging said encoded element.
2) A system as claimed in claim 1, wherein the element of said data comprises an alphanumeric character.
3) A system as claimed in claim 2, wherein the element of said data is selected at random from a range of elements and comprises the password for access to the data.
4. A system as claimed in claim 3, wherein the system further comprises input means for input of alphanumeric charac-ters and comparator means for comparing the input with the ele-ment of said data selected at random from the data.
5. A system as claimed in claim 2, wherein the means for displaying the encoded element in visible form comprise a printing apparatus.
6. A system as claimed in claim 5, wherein the means for displaying the encoded element of data, provide labels having the encoded element of data printed thereon.
7. A system as claimed in claim 1, wherein the micro-processor is arranged to be programmed with said algorithm from said data.
8. An optical element for use with the system of claim 1, capable of transforming a first image into a second image by the transposition of at least two portions of said first image.
CA000478592A 1984-04-04 1985-04-04 Security system Expired CA1232080A (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
GB8408603 1984-04-04
GB8408603 1984-04-04
GB848425017A GB8425017D0 (en) 1984-10-03 1984-10-03 Security systems
GB8425017 1984-10-03

Publications (1)

Publication Number Publication Date
CA1232080A true CA1232080A (en) 1988-01-26

Family

ID=26287554

Family Applications (1)

Application Number Title Priority Date Filing Date
CA000478592A Expired CA1232080A (en) 1984-04-04 1985-04-04 Security system

Country Status (6)

Country Link
EP (1) EP0176538A1 (en)
AU (1) AU4154285A (en)
CA (1) CA1232080A (en)
ES (1) ES8802093A1 (en)
IL (1) IL74782A0 (en)
WO (1) WO1985004746A1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CH555577A (en) * 1972-06-09 1974-10-31 Gretag Ag METHOD AND DEVICE FOR CONVERTING CLEAR GRAPHICAL INFORMATION INTO ENCRYPTED GRAPHICAL INFORMATION AND REVERSE
US3814904A (en) * 1972-10-20 1974-06-04 Rca Corp Cryptographically coded cards employing synthetic light modifying portion
US3937565A (en) * 1974-06-03 1976-02-10 Alasia Alfred Victor Process of coding indicia and product produced thereby
GB2101376B (en) * 1981-07-11 1986-05-21 John Gordon Lawrence Method and apparatus for use against counterfeiting

Also Published As

Publication number Publication date
WO1985004746A1 (en) 1985-10-24
EP0176538A1 (en) 1986-04-09
ES8802093A1 (en) 1987-01-16
IL74782A0 (en) 1985-07-31
ES541987A0 (en) 1987-01-16
AU4154285A (en) 1985-11-01

Similar Documents

Publication Publication Date Title
JP5095748B2 (en) Encoding method, decoding method, codec and data storage medium for holographic storage
US4921278A (en) Identification system using computer generated moire
US3894756A (en) Identification card having a reference beam coded hologram
US3552853A (en) Hologramic identification system
US6070160A (en) Non-linear database set searching apparatus and method
US5319629A (en) Content addressable optical data storage system
CN106605220A (en) Method and system for selective document redaction
CA2122919A1 (en) Optical image encryption and decryption processes
JPH05501020A (en) optically readable coded target
AU2005315520A1 (en) Method for recording data in a holographic form on a lens and a corresponding lens
EP1187728B1 (en) Information carrier with a hologram
CN102887003A (en) Novel laser beam marking method of two-dimensional bar code
CN106156821A (en) A kind of optical readability bar code anti-counterfeit structure and implementation method
US20120262768A1 (en) Stacking a visible image and a synthetic hologram
US5499116A (en) Encoded hologram for producing a machine readable image and a human readable image
CA1232080A (en) Security system
US20020030112A1 (en) Human readable barcode label
EP1647415A2 (en) Surface relief holographic recording medium and optical system for its reading
WO2007011259A1 (en) Article optical marking method
US20200333745A1 (en) Holograms
JPH07200760A (en) Recording medium card
JPS61501878A (en) security device
Ferguson Assessing the collection development need for CD-ROM products
US5024495A (en) Computer software protection, by optical effects
GB2196443A (en) Secure holographic data storage using an optical phase encryption device

Legal Events

Date Code Title Description
MKEX Expiry