CA2042461A1 - Procedure for configuration of a computer workstation and system for its implementation - Google Patents

Procedure for configuration of a computer workstation and system for its implementation

Info

Publication number
CA2042461A1
CA2042461A1 CA 2042461 CA2042461A CA2042461A1 CA 2042461 A1 CA2042461 A1 CA 2042461A1 CA 2042461 CA2042461 CA 2042461 CA 2042461 A CA2042461 A CA 2042461A CA 2042461 A1 CA2042461 A1 CA 2042461A1
Authority
CA
Canada
Prior art keywords
key
rights
workstation
key module
modules
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA 2042461
Other languages
French (fr)
Inventor
Gilbert Barillier
Patrice Jaraudias
Yves Tournier
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telemecanique SA
Original Assignee
Telemecanique Electrique SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telemecanique Electrique SA filed Critical Telemecanique Electrique SA
Publication of CA2042461A1 publication Critical patent/CA2042461A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices

Abstract

ABSTRACT

The company known as:

TELEMECANIQUE

"Procedure for configuration of a computer work station and system for its implementation"

(Invention of BARILLIER Gilbert, JARAUDIAS Patrice and TOURNIER Yves) Procedure for configuration of a computer work-station (1, 10), on which a number of software packages (La, Lb, Lc) are loaded, with each of which respective rights of use are associated, which are contained in a separate original key module (Ca, Cb, Cc) intended to interact with said workstation (1, 10) in order to authorize continuity of operation of said software package (La, Lb, Lc).
The procedure comprises a succession of transfer stages (II, III), each transfer stage (II, III) bringing about the union of rights contained initially in two key modules (Ca, Cb; Cc, Cab) and their transfer into one (Cab, Cabc) of said key modules, the other key module (CaO, CcO) being rendered empty of any right so that, at the end of this succession of transfer stages (II, III), a single original key module (Cabc) is available, which contains all the rights of use associated with the software packages (La, Lb, Lc) loaded on the workstation (1, 10), all the other key modules (CaO, CcO) being rendered empty of any right.
Use in particular in industrial data processing and for the control of the use of protected software packages .
See Figure 1.

Description

2~2~6~

The pre~ent invention relates to a procedure for configuration of a computer workstation or a process control workstation. It al~o relates to a system for it~
implementation.
The illicit duplication and use of software packages, in particular of program packets for scientific and industrial application on computer workstations, con-stitute a ma~or problem for the authors, designers and distributors of these software packages. These fraudulent operations, which consist in usurping the rights of use on one or more software packages, generally constitute a serious financial danger for businesse which have often invested heavily in the development and the perfection of these software packages. Moreover, the considerable development in the number of compatible microcomputers contributes to aggravating this situation with the current availability of numerous software tool~ which facilitate illicit operations on protected software packages.
In order to counter this pre~udicial situation, the authors and distribu~ors of software packages have appealed to numerous current procedures for control of the use of a software package with respect to rights of use associated with it. Thus, procedures are already known, which are aimed at preventing the duplication and the illicit use of ~oftware package~ by means of physical and/or logical counting locks. Procedures for controlling use of a software package are al80 known which make use of an electronic key which is connected to an input/
output port of the microcomputer on which the software package is loaded. These procedures consist in regularly testing the presence of this key by means of specific instructions added to the software package. French Patent 2,579,790 thus discloses an electronic device for the protection of access to a software package and a key for such a device. Similarly, French Patent 2,600,18~ dis-closes a procedure for protection of a computer ~oftware package and an electronic key for the implementation of this procedure. Other procedures which make use of a .
,:

20~2~

phyRical key exist at the present time, such a~ the logimeter which constantly exchanges information with the original software package and also allows counting of uses.
However, current procedure~ associate a key with each protected software package, whereas it is currently common that a number of software package~ are loaded on the same computer workstation. There is then the problem of the connection of the different keys associated with the software packages used, the number of input/output ports of a work~tation, and in particular of a micro-computer, being necessarily limited. The same applies when the workstation is e~uipped with a key support comprising a limited number of locations, for example two, capable of receiving keys. It i8 then necessary to carry out tedious keying operations according to the software package actually executed. These operations can moreover give rise to blocking and losses of time and efficiency in the industrial milieu.
A workstation, on which there are loaded a number of different software packages, of which the respective rights of use are contained in original key modules, becomes difficult to use for a user who has to try to manage as well as possible the insertion of the different key modules into the locations which are available to him according to the software package(s) required.
A procedure for configuration of a computer workstation is already known, which makes use on the one hand, for each workstation, a master key module and, on the other hand, optional key modules which each contain the rights of u~e of an associated software package which is intended to be loaded on the workstation. This pro-cedure makes it possible in particular to transfer rights of use which are initially contained in one or more optional key modules into the master key module. However, this procedure has the disadvantage of having to have available two type~ of key modules - key modules of the master type on the one hand and key modules of the optional type on the other hand - which results in the 20~24~ ~

managem~nt of this method of software protection being complicated and the ri~k of keying error and of blocking of use of the computer workstation.
The aim of the present invention is to overcome S these disadvantages by proposing a procedure for con-figuration of a computer workstation, on which a number of software packages are loaded, with each of which reflpective rights of use are associated, which are contained in a separate original key module intended to interact with said workstation in order to authorize continuity of operation of ~aid software package.
According to the invention, the procedure com-prises a succession of transfer stages, each transfer stage bringing about the union of rights contained initially in two key modules and their transfer into one of said key modules, the other key module being rendered empty of any right 80 that, at the end of this succession of transfer stages, a single original key module is available, which contain~ all the rights of use asso-ciated with the software packages loaded on the work-station, all the other key modules being rendered empty of any right.
Thus~ with the procedure according to the inven-tion/ the problem posed by the limited number of loca-tions for key modules is solved since, at the end of thesuccessive transfer stages, one single key module con-tains all the rights of use of the different software packages loaded on the computer workstation. Moreover, the different transfer stages are applied to key modules which all have the same status, namely that of containing rights of use corre~ponding to one or more software packages according to whether or not they are the result - of a union operation. In contrast to the prior art, - there is thus, with the procedure according to the invention, no distinction made between master key modules and optional key modules, which contributes to consi-derably simplifying the management of key mod~les with regard to the operations of union of rights.
In an advantageous version of the invention, the 2~2~
_ 4 --transfer ~tages are reversible and the procedure moreover comprises, on account of the reversibility of the trans-fer stages, at least one operation of partition which makes use of an original key module containing a number of ~et~ of rights of u~e corresponding to the ~oftware packages used on the work3tation and a blank key module, and in the cour~e of which a portion of the rights of u~e is transferred into the initially blank key modulel the remaining portion being kept in the original key module.
Thus, the reversibility of the transfer stages makes it po~sible to isolate again the right~ of u~e associated with a given software package within a key module when this i~ necessary. In thi~ manner, the user retains the possibility of modifying the distribution of lS the different rights of use by being able to carry out a partition of software packages initially collected within the same key module, which also thus imparts great flexi-bility to the procedure for configuration according to the invention.
According to another aspect of the invention, the system of configuration of a computer workstation, on which a number of software packages are loaded, with each of which re~pective rights of use are associated, which are contained in a separate original key module, making use of the procedure described above, which comprises support means for receiving simultaneously at least two key modules in locations which are adapted and connected to the computer workstation, is characterized in that the~e support means interact with the computer work-station in order to generate, from two original key modules which each contain rights of use associated with one or more software packaqes, an original key module which then contains the union of said rights of use and a key module emptied of any right.
Other characteristics and advantages of the invention will appear in the description below. In the attached drawings which are given by way of non-limiting examples - Figure 1 is a view in block form illustrating ~2~6:~

the different ~tages of the procedure according to the invention;
- Figure 2 illustrates an arrangement of the devices used in the present invention when a printer i8 to be connected to the microcomputer, and - Figure 3 illustrates another arrangement of the invention which allows the use of a secon~ Xey support.
A preferred method of implementation of the procedure according to the invention ~ill now be de~-cribed, a~ well a~ the device which allows this Lmple-mentation, with reference to Figure 1.
A user of a computer workstation~ for example a microcomputer 1 of PC-compatible type or of PS type from the company IBM or even a specialized programming ter-minal 10, wishes to be able to use on this workstation a number of separate software packages, with each of which respective right~ of use are associated. By way of example, it is supposed that the user initially has available (stage I) three software packages La, Lb, hc, which are contained for e~ample in respective diskette set~ and with each of which a respective original key module Ca, Cb, Cc is associated, which contains the respective rights of use of the associated software package.
: 25 These key modules are intended to be inserted into key supports which are either external 2, 3, 6 in the case of a microcomputer or internal 11, 12 in the specialized workstation 10. An autonomous key support 2 comprises two housings 3, 6 intended to accept key modules. It is connected to the parallel port 7 of the microcomputer 1 by a connection cable 5.
In an effective embodiment of the invention, the key modules used comprise a microcontroller which scans the signals present at the input/output port to which the autonomous key support 2 is connected, a quartz oscil-lator which delivers a clock signal for the micro-controller, a control logic for the generation of initialization and interruption signals, and a serial link to interface the key module with the key support 2 ' ' .

2~2~6~

which i8 supplied in an autonomou~ manner by a cell or a battery. It should be noted that other methods of ~upply of a key module can be enviYaged, in particular a supply via the input/output port.
S The microcontroller comprise~, according to conventional construction, a permanent memory, for example a memory of the EEPROM type which contains, in coded form according to known coding technique~, right~
of u~e of a software package which are in ~ome way the coded tran~lation of the license to operate the protected ~oftware package.
A~ the procedure according to the invention can b~ applied equally to workstations of the microcomputer type and to specialized stations such a~ programming terminals, the description will be limited to the example of the microcomputer, the whole of the following de~crip-tion being capable of being transposed without difficulty to the case of a ~pecialized workstation.
Two original key modules, for example the key modules Ca and Cb, which correspond to ths respective rights of use of the software packages La and Lb, are inserted into the two housings of the key support 2. A
key management ~oftware package loaded beforehand on the work~tation 1 carries out, during a fir~t transfer stage II, an operation of union of the rights of use of the software packages La and Lb within the key module Cb which initially contained only the rights of use of the software package Lb. At the end of the transfer stage II, the key module Cb now contains the union of the rights of the ~oftware packages La and Lb and is Lndi-cated by the reference Cab. At the end of this union operation, the key module Ca, which initially contained the rights of use of the ~oftware package La i8 emptied of any right and becomes an empty or blank module CaO. It i8 to be noted that the abovementioned transfer ~tage II i8 of reversible nature, the key management software package being capable of ordering a reverse partition operation.
The union operation which has ~ust been 2~L~2a~

dQscribed can be reproduced a~ often as i~ necessary.
ThuY, in the example illustrated in Figure 1, after having extracted the two abovementioned key modules at the end of the first transfer stage II, the user then inserts into the key ~upport 2 the original key module Cc which contains the rights of use of the software package Lc and the key module Cab obtained at the end of the preceding union operation. The key management software package then carries out during a second transfer ~tage III a union operation, at the end of which the three rights corresponding respectively to the software packages La, Lb and Lc are collected on a single key module which at the beginning of the second transfer stage III contained the union of the rights of use of the software packages La and Lb, and which is now indicated in Figure 1 by the reference Cabc. At the end of the second transfer stage III, the key module Cc, which initially contained the rights of use of the software package Lc, is emptied of any right of use and is indicated in Figure 1 ~y the reference CcO.
At the end of these two transfer stages II and III, the user then has available in IV a working key module containing the union of ~he rights of use associated respectively with the three software packages La, Lb and Lc, and two key modules which are from then on empty of any right CaO and CbO. He will then be able to use the three software packages La, Lb and Lc within the limit of the rights of use while occupying only one key support location.
The procedure according to the invention moreover makes it possible to maintain access to and use of the input/output port, to which the key support is connected, in order to connect a peripheral device to it, such as a printer, a mass memory, or even a communication peri-pheral.
Thus, with reference to Figure 2, the key support 2 is connected to tha microprocessor 1 via its parallel port 21 which usually makes possible the connection of a printer with Centronics-type communication. According to 2~2~1 the invention, a particular arrangement is envisaged, which makes possible simultaneous connection of the key support 2 and of a printer 24. The key support 2, equipped with two key housings 3, 6, is connected to the parallel port 21 via a cable provided with a connector of extendable type 20 which can also accept a Centronics-type connector 22 at the end of a connection cable 25 of the printer 24.
In another method of implementation of the procedure according to the invention, two separate types of key support can be connected to the microcomputer 1, while maintaining the use of a peripheral device, in particular of a printer 24. Thu~, it iB possible at the same time to use a key support 2 which accepts key modules which can be ~ub~ected to the abovementioned union operations and another key support 30 which accepts in slots 31 and 32 key modules which can be of different construction and format. To this end, a con-nector of extendable type 20 is provided, which allows the connection of the key support 2 via the connection cable 23 and of the second key support via the connector 33. The second key support 30 has a Centronics-type connector which can accept a printer connector 22 con-nected via a connection cable 25 to the printer 24.
The invention is of course not limited to the examples described and numerous ad~ustments can be made to these examples without departing from the scope of the invention.
Thus, this same procedure can also be applied to the protection of software used on programmable automatic machines.
Noreover, the procedure according to the invention i8 not limited to the particular case of three software packages which has ~u~t been described and can of course be extended to a large number of software packages within the limit of the capacity of the host microcomputer. Other type~ of key module~ than those which have just been described can also be envisaged, in particular of different geometry or technology.
*

Claims (5)

1. A procedure for configuration of a computer workstation (1, 10) or a process control workstation, on which a number of software packages (La, Lb, Lc) are loaded, with each of which respective rights of use are associated, which are contained in a separate original key module (Ca, Cb, Cc) intended to interact with said workstation (1, 10) in order to authorize continuity of operation of said software package (La, Lb, Lc), which comprises a succession of transfer stages (II, III), each transfer stage (II, III) bringing about the union of rights contained initially in two key modules (Ca, Cb;
Cc, Cab) and their transfer into one (Cab, Cabc) of said key modules, the other key module (CaO, CcO) being rendered empty of any right so that, at the end of this succession of transfer stages (II, III), a single original key module (Cabc) is available, which contains all the rights of use associated with the software packages (La, Lb, Lc) loaded on the workstation (1, 10), all the other key modules (CaO, CcO) being rendered empty of any right.
2. The procedure as claimed in claim 1, wherein the transfer stages (II, III) are reversible and which moreover comprises, on account of the reversibility of the transfer stages (II, III), at least one operation of partition which makes use of an original key module (Cab, Cabc) containing a number of sets of rights of use corresponding to the software packages used (La, Lb; La, Lb, Lc) on the workstation (1, 10) and a blank key module (CaO, CcO), and in the course of which a portion of the rights of use is transferred into the initially blank key module (CaO, CcO), the remaining portion being kept in the original key module (Cb, Cab).
3. A system of configuration of a computer work-station (1, 10), on which a number of software packages (La, Lb, Lc) are loaded, with each of which respective rights of use are associated, which are contained in a separate original key module (Ca, Cb, Cc), making use of the procedure according to the preceding claims, which comprises support means (2; 11, 12) for receiving simultaneously at least two key modules in locations (3, 6; 11, 12) which are adapted and connected to the computer workstation (1, 10), wherein these support means (2; 11, 12) interact with the computer workstation (1) in order to generate, from two original key modules (Ca, Cb;
Cab, Cc) which each contain rights of use associated with one or more software packages (La, Lb; La, Lb, Lc), an original key module (Cab, Cabc) which then contains the union of said rights of use and a key module emptied of any right (CaO, CcO).
4. The system as claimed in claim 3, the workstation being a microcomputer (1) of compatible type and the key support means (2) being connected to an input/output port (21) of the microcomputer (1), which moreover comprises means (20) for making possible the simultaneous con-nection of a peripheral device, in particular a printer (24), and of the key support means (2) to the input/output port (21).
5. The system as claimed in claim 4, which is arranged to integrate supplementary key support means (30, 31, 32) intended to receive key modules which are not compatible with the key modules used in the preceding claims and which cannot form the subject of union operations, so that it is possible simultaneously to connect to the input/output port (21) the means of support (2) which receive the original key modules which are capable of operations for union of rights, the supplementary means of support (30), and a peripheral device (24).
CA 2042461 1990-05-16 1991-05-13 Procedure for configuration of a computer workstation and system for its implementation Abandoned CA2042461A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR9006112A FR2662279B1 (en) 1990-05-16 1990-05-16 METHOD FOR CONFIGURING A COMPUTER WORKSTATION AND SYSTEM FOR ITS IMPLEMENTATION.
FR9006112 1990-05-16

Publications (1)

Publication Number Publication Date
CA2042461A1 true CA2042461A1 (en) 1991-11-17

Family

ID=9396666

Family Applications (1)

Application Number Title Priority Date Filing Date
CA 2042461 Abandoned CA2042461A1 (en) 1990-05-16 1991-05-13 Procedure for configuration of a computer workstation and system for its implementation

Country Status (4)

Country Link
EP (1) EP0457655A1 (en)
JP (1) JPH04232531A (en)
CA (1) CA2042461A1 (en)
FR (1) FR2662279B1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AT405466B (en) * 1996-09-24 1999-08-25 Ericsson Austria Ag DEVICE FOR PROTECTING AN ELECTRONIC DEVICE
EP1045388A1 (en) * 1999-04-16 2000-10-18 Deutsche Thomson-Brandt Gmbh Method and apparatus for preventing illegal usage of multimedia content
EP1045386B1 (en) * 1999-04-16 2007-12-19 Deutsche Thomson-Brandt Gmbh Method and apparatus for preventing illegal use of multimedia content
JP2008065785A (en) * 2006-09-11 2008-03-21 Ricoh Co Ltd Unauthorized use prevention system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0268139A3 (en) * 1986-11-05 1991-04-10 International Business Machines Corporation Manipulating rights-to-execute in connection with a software copy protection mechanism
AU1967488A (en) * 1987-06-03 1989-01-04 Personal Cad Systems, Inc. Security system having selective software program locks utilizing removable pla keys to allow hardware security lock updates
FR2618926B1 (en) * 1987-10-30 1990-06-08 Microphar MEMORY DEVICE FOR CONTROLLING THE USE OF SOFTWARE, OF THE KEY TYPE

Also Published As

Publication number Publication date
EP0457655A1 (en) 1991-11-21
FR2662279A1 (en) 1991-11-22
JPH04232531A (en) 1992-08-20
FR2662279B1 (en) 1992-08-07

Similar Documents

Publication Publication Date Title
Bergstra et al. Verification of an alternating bit protocol by means of process algebra protocol
EP0186981A2 (en) Security module for an electronic funds transfer system
EP0449622B1 (en) Still picture filing apparatus
US4843539A (en) Information transfer system for transferring binary information
US5850452A (en) Method for numerically scrambling data and its application to a programmable circuit
WO1998002854A1 (en) Integrated circuit card, secure application module, system comprising a secure application module and a terminal and a method for controlling service actions to be carried out by the secure application module on the integrated circuit card
EP0836731B1 (en) Value transfer system
EP1376459A2 (en) Autonomous integrated-circuit card
CA2042461A1 (en) Procedure for configuration of a computer workstation and system for its implementation
CN109543415A (en) A kind of secure operating system framework
CN1122950C (en) Program writable IC card and method thereof
EP0711478B1 (en) Feedforward control system, method and control module
CN108574572A (en) A kind of card washes the method and device of card distribution
CN1316720A (en) Improved interface structure of intelligent IC card and embedded SAM security module
CN114715453B (en) Valve array control method, device, conveying system, electronic equipment and storage medium
US4860250A (en) Data packet shortening method and device
JPS58194490A (en) Method and device for setting operation data of key telephone device
CN100479429C (en) System and method for extracting special overhead byte
JPS60240296A (en) Method of controlling data processing system and data processing system
GB1595449A (en) Method and apparatus for the transmission of information in digital form
Geffert A communication hierarchy of parallel computations
Hermen et al. Application of general purpose computer techniques to the design of a programmable PCM telemetry decommutator
JPS588307A (en) Program decentralized serial execution type programmable logic controller system
AU709400C (en) Integrated circuit card, secure application module, system comprising a secure application module and a terminal and a method for controlling service actions to be carried out by the secure application module on the integrated circuit card
CN117527472A (en) Multi-motor servo system initialization configuration method based on CANOPEN

Legal Events

Date Code Title Description
FZDE Dead