DE3828573A1 - Method of protecting computer programs from illegal use - Google Patents

Method of protecting computer programs from illegal use

Info

Publication number
DE3828573A1
DE3828573A1 DE19883828573 DE3828573A DE3828573A1 DE 3828573 A1 DE3828573 A1 DE 3828573A1 DE 19883828573 DE19883828573 DE 19883828573 DE 3828573 A DE3828573 A DE 3828573A DE 3828573 A1 DE3828573 A1 DE 3828573A1
Authority
DE
Germany
Prior art keywords
key
diskette
program
programs
method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
DE19883828573
Other languages
German (de)
Inventor
Bernd Hoehne
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HOEHNE BERND DIPL WIRTSCH ING
Original Assignee
HOEHNE BERND DIPL WIRTSCH ING
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HOEHNE BERND DIPL WIRTSCH ING filed Critical HOEHNE BERND DIPL WIRTSCH ING
Priority to DE19883828573 priority Critical patent/DE3828573A1/en
Priority to DE8810638U priority patent/DE8810638U1/de
Publication of DE3828573A1 publication Critical patent/DE3828573A1/en
Application status is Ceased legal-status Critical

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0092Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which are linked to media defects or read/write errors
    • G11B20/00927Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which are linked to media defects or read/write errors wherein said defects or errors are generated on purpose, e.g. intended scratches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00094Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
    • G11B20/00123Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers the record carrier being identified by recognising some of its unique characteristics, e.g. a unique defect pattern serving as a physical signature of the record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • G06F2221/0722Content
    • G06F2221/0744Unique instance

Abstract

For protecting computer programs from illegal use, known methods such as copy protection and linkage of programs with computer components have been unsuccessful. They have disadvantages such as incompatibility, expensive modifications, difficult handling or failure. The new method permits copying of programs without restriction. The protection is in the combination of the program with a physical key. The medium is a diskette, which has mechanical modifications, which are decoded using a diskette station. The program to be protected can be started, after the user has been authorised, only by inserting the key diskette. It is also possible to record the program start on the key diskette, to prevent other starts of the program on other devices. The mechanical modifications are unusable sectors, the position of which defines the key. Key diskettes can be manufactured without great cost, but cannot be reproduced without considerable mechanical cost. The security method is particularly suitable for programs for personal computers or stand-alone computer systems. No additional equipment is necessary, since diskette drives are standard on personal computers. However, the method can be used anywhere where a diskette station can be connected.

Description

Die Erfindung betrifft ein technisches Verfahren zum Schutz von Computerprogrammen gegen unrechtmäßige Nutzung. The invention relates to a technique for protecting computer programs against unauthorized use. Die Erfindung soll die rechtmäßige Nutzung nicht erschweren und andererseits dem Hersteller genügend Schutz gegen unrechtmäßige Nutzung bieten für Computersysteme, die eine Diskettenlesestation besitzen. The invention is not to impede the lawful use and also offer the manufacturer sufficient protection against unauthorized use of computer systems that have a floppy reading station.

Es ist bekannt, daß Computerprogramme durch Kopierschutz von unrechtmäßiger Nutzung ausgeschlossen werden sollen. It is known that computer programs are to be excluded by copy protection from unlawful use. Weiter werden Verfahren eingesetzt, die die Benutzung der Programme von der Existenz eines bestimmten Hardwarebauteils abhängig machen wie Kanalstecker oder Integrierte Schaltkreise. Next methods are used that make use of the programs of the existence of a particular hardware component dependent as channel connector or integrated circuits.

Kopierschutz hat sich in der Praxis nicht etablieren können weil einerseits kein ausreichender Schutz oder eine wesentlich erschwerte Handhabung das Resultat ist. Copy protection has not been able to establish in practice because, firstly, no adequate protection or a much more difficult handling is the result. Die Kombination von Programmen mit Integrierten Schaltkreisen und Kanalsteckern bieten ausreichenden Schutz, setzen aber eine technische Änderung des Computersystems voraus und erfordert zusätzliche Bauteile. The combination of programs with integrated circuits and channel connectors provide sufficient protection, but require a technical amendment to the computer system and requires additional components.

Die Erfindung hat zur Aufgabe, ein Computerprogramm gegen un rechtmäßige Nutzung ausreichend zu schützen und andererseits die Handhabung nicht wesentlich zu beeinträchtigen ohne, daß Änderungen oder Ergänzungen an Computer - und Externen Bauteilen nötig sind. The invention has the task of protecting a computer program to un lawful use acceptable as well as not to affect the handling substantially without that changes or additions to your computer - and external components are needed.

Diese Aufgabe wird Erfindungsmäßig dadurch gelöst, daß auf einer Schlüsseldiskette durch die Anordnung unbrauchbarer Stellen (mechanische Veränderungen) ein Kode abgelegt ist. This object is solved invention default, characterized in that on a key disk due to the arrangement unusable locations (physical changes), a code is stored. Dieser Kode bildet den Schlüssel, der beim Start des Computerprogramms durch Schreib- oder Formatierversuche ermittelt wird und zu einem im Programm abgelegten Kode in einer Beziehung stehen bzw. übereinstimmen muß. This code is the key, which is determined at the start of the computer program by writing or formatting and attempts for a stored in the program code are related and must be identical. Der Start des zugehörigen Programms wird auf der Schlüsseldiskette vermerkt wodurch weitere Programmstarts davon abhängig gemacht werden können, daß der vorherige Programmlauf mit Schlüsseldiskette beendet wurde bzw. eine bestimmte Zeitspanne verstrichen ist. The start of the associated program is on the key diskette which noted further program starts can be made dependent on that of the previous program run was terminated with key diskette or a certain time period has elapsed.

Die erzielbaren Vorteile bestehen darin, daß die Schlüssel diskette ohne erheblichen mechanischen Aufwand nicht zu vervielfältigen ist. The advantages achieved are that the key diskette without considerable mechanical effort is not to reproduce. Die Erstellung der Schlüsseldiskette aber dadurch einfach und kostengünstig geschehen kann, indem die Diskette punktuell beschädigt wird, dann der so entstandene Kode gelesen und in ein Computerprogramm eingebaut wird. The preparation of the key disk but can be done simply and inexpensively by the disk is selectively damaged, then read the resulting code and is incorporated into a computer program. Eine anspruchsvolle Mechanik wird nicht benötigt. A sophisticated mechanism is not needed. Außer der Schlüsseldiskette werden keine weiteren Teile benötigt, sofern ein Diskettenlaufwerk vorhanden ist. In addition to the key diskette no further parts are required, if a disk drive is present.

Die Erfindung wird anhand einer Zeichnung näher beschrieben. The invention will be described with reference to a drawing. Es zeigen: Show it:

Fig. 1 Beispiel für den Aufbau einer Diskette. Fig. 1 an example of the structure of a floppy disk.

Fig. 2 Beispiel für die Kodierung eines Schlüssels. FIG. 2, for the coding of a key.

In Fig. 1 wird der prinzipielle Aufbau einer Diskette dargestellt. In Fig. 1 the basic structure of a disk is shown. Dabei wird die Darstellung idealisiert, die Spuren - konzen trische Kreise - sind als Strecken dargestellt. The representation is idealized, the traces - concentrating tric circles - are shown as lines. Die Spuren werden in Sektoren, im Beispiel neun, unterteilt, wobei der 1. Sektor jeder Spur beim Indexloch beginnt. The tracks are divided into sectors, in the example nine, with the first sector start each track the index hole. Ein Sektor, nach Spurnummer und Sektornummer identifizierbar, ist eine adressierbarer Speicherbereich auf der Diskette. A sector identified by track number and sector number, is an addressable storage area on the disk. Im Beispiel Fig. 1 stehen 40 · 9 Sektoren = 360 Sektoren zur Verfügung. In the example, Fig. 1 are 40 x 9 = 360 sectors sectors. Jeder Bereich kann brauchbar oder aber unbrauchbar sein. Each area can be useful or useless. Diese Aussage bildet den binären Schlüsselkode. This statement forms the binary key code. Ein Sektor hat für den Schlüssel den Informationsgehalt von einem Bit. A sector has the information content of one bit for the key.

Fig. 2 zeigt in einem Ausschnitt eine Diskette mit den Spuren 29 , 30 und 31 . Fig. 2 shows in a section of a disk with the tracks 29, 30 and 31. Dieser Ausschnitt soll beispielhaft die Schlüssel bildung zeigen. This section is to exemplify the key education. Die mit "XXX" gekennzeichneten Sektoren sind mechanisch defekt. The sectors marked with "XXX" are mechanically broken. Ein defekter Sektor wird logisch mit "0" und ein intakter Sektor mit "1" bewertet. A defective sector is logically rated "0" and an intact sector with "1". Von Spur 29 Sektor 1 nach Spur 31 Sektor 9 gelesen ergibt der so gewonnene Schlüssel den Wert 403706403 oktal wie Tabelle 1 verdeutlicht. 31 read sector 9 of track 29. Sector 1 to track the key thus obtained gives the value 403 706 403 octal as Table 1 shows. In einem beliebigen Sektor, der von der Schlüsselbildung ausgenommen ist wird ein Kennzeichen dafür gesetzt, daß mit diesem Schlüssel das zugehörige Programm gestartet wurde. In any sector, which is excluded from the key creation, a flag is set for that the associated program has been started with this key. Nach Maßgabe des Programmherstellers kann vorgegeben werden, daß das Programm mit Schlüsseldiskette beendet werden muß oder eine bestimmte Zeit verstreichen muß bevor das Programm ein weiteres Mal mit dem zugehörigen Schlüssel gestartet werden kann. In accordance with the program manufacturer can specify that the program must be terminated with key diskette must elapse or a certain time before the program can be started with the associated key one more time.

Tabelle 1 Table 1

Claims (1)

  1. Schutzverfahren für Computerprogramme gegen unrechtmäßige Nutzung, dadurch gekennzeichnet, daß eine separate, mechanisch veränderte Diskette als Schlüssel dient, der das Starten des Programms erlaubt. Protection method for computer programs against unauthorized use, characterized in that a separate, mechanically modified diskette as the key is used, which allows the starting of the program.
DE19883828573 1988-08-23 1988-08-23 Method of protecting computer programs from illegal use Ceased DE3828573A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
DE19883828573 DE3828573A1 (en) 1988-08-23 1988-08-23 Method of protecting computer programs from illegal use
DE8810638U DE8810638U1 (en) 1988-08-23 1988-08-23

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE19883828573 DE3828573A1 (en) 1988-08-23 1988-08-23 Method of protecting computer programs from illegal use
DE8810638U DE8810638U1 (en) 1988-08-23 1988-08-23

Publications (1)

Publication Number Publication Date
DE3828573A1 true DE3828573A1 (en) 1990-03-08

Family

ID=25871389

Family Applications (2)

Application Number Title Priority Date Filing Date
DE8810638U Expired DE8810638U1 (en) 1988-08-23 1988-08-23
DE19883828573 Ceased DE3828573A1 (en) 1988-08-23 1988-08-23 Method of protecting computer programs from illegal use

Family Applications Before (1)

Application Number Title Priority Date Filing Date
DE8810638U Expired DE8810638U1 (en) 1988-08-23 1988-08-23

Country Status (1)

Country Link
DE (2) DE8810638U1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0522332A1 (en) * 1991-07-12 1993-01-13 M.A.N.-ROLAND Druckmaschinen Aktiengesellschaft Computer for controlling a machine, especially a printing press
EP0704844A1 (en) * 1994-09-30 1996-04-03 Victor Company Of Japan, Limited Optical disc and information management system for the same
EP0711479A1 (en) * 1993-07-26 1996-05-15 Elonex Technologies, Inc. Cd prom encryption system
EP0969348A1 (en) * 1998-07-01 2000-01-05 Iomega Corporation Readable indelible mark on storage media
US6259575B1 (en) 1998-07-01 2001-07-10 Iomega Corporation Readable indelible mark on storage media

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4584641A (en) * 1983-08-29 1986-04-22 Paul Guglielmino Copyprotecting system for software protection

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4584641A (en) * 1983-08-29 1986-04-22 Paul Guglielmino Copyprotecting system for software protection

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0522332A1 (en) * 1991-07-12 1993-01-13 M.A.N.-ROLAND Druckmaschinen Aktiengesellschaft Computer for controlling a machine, especially a printing press
EP0711479A1 (en) * 1993-07-26 1996-05-15 Elonex Technologies, Inc. Cd prom encryption system
EP0711479A4 (en) * 1993-07-26 1996-10-02 Elonex Technologies Inc Cd prom encryption system
EP0704844A1 (en) * 1994-09-30 1996-04-03 Victor Company Of Japan, Limited Optical disc and information management system for the same
US5809545A (en) * 1994-09-30 1998-09-15 Victor Company Of Japan, Ltd. Optical disc for a master key, and a method and apparatus for optical-disc information management which inhibit and permit reproduction of main information from an illegal copy disc by using physical and logical security information
EP0969348A1 (en) * 1998-07-01 2000-01-05 Iomega Corporation Readable indelible mark on storage media
WO2000002117A1 (en) * 1998-07-01 2000-01-13 Iomega Corporation Readable indelible mark on storage media
FR2783962A1 (en) * 1998-07-01 2000-03-31 Iomega Corp readable indelible mark on a storage medium
NL1012487C2 (en) * 1998-07-01 2000-04-13 Iomega Corp -Readable indelible identifying mark on a storage medium.
US6259575B1 (en) 1998-07-01 2001-07-10 Iomega Corporation Readable indelible mark on storage media
US6324026B1 (en) 1998-07-01 2001-11-27 Iomega Corporation Readable indelible mark on storage media
US6445523B2 (en) 1998-07-01 2002-09-03 Iomega Corporation Readable indelible mark on storage media

Also Published As

Publication number Publication date
DE8810638U1 (en) 1989-01-05

Similar Documents

Publication Publication Date Title
DE3923165C2 (en)
DE3040004C2 (en)
DE60010578T2 (en) A process for mutual authentication, recording apparatus, reproducing apparatus and recording medium
DE2942825C2 (en)
DE3123978C2 (en) A method for decoding and correcting blockwise digital information words, and use of the method
US7765605B2 (en) Method for copy protecting a record carrier, copy protected record carrier and means for detecting access control information
CA1203019A (en) Apparatus for recording and reproducing a digital signal
DE3623719C2 (en)
DE69632243T2 (en) Data recording apparatus and method, data recording medium and data reproducing apparatus and method
EP0151714B1 (en) Apparatus for securing secret information
DE69923241T2 (en) Recording and playback system, recording and reproducing apparatus having copy protection function
DE69732880T2 (en) Encryption method, decryption method, recording and reproducing method, decryption device, means for decrypting unit, recording medium, recording medium manufacturing method, and key control method
US5896454A (en) System and method for controlling copying and playing of digital programs
EP0452854A2 (en) Method and apparatus for data recording
DE60013916T2 (en) Semiconductor memory card and data reading device
DE10044837C1 (en) Tampering detection circuit for IC has detection circuit coupled to signal line and at least one line pair extending between separate circuit blocks of IC
EP0195972B1 (en) Antitheft safeguarding system for electronic apparatuses, particularly for car radios
DE69721178T2 (en) Signal recording apparatus and method
DE69930425T2 (en) File operating method using real time recording / reproduction information
DE69630751T2 (en) License Display System
DE69233335T2 (en) Closed information system with copy protection
EP0225428B1 (en) Method for the recognition of edge structures in a picture signal
DE60205238T2 (en) A method and apparatus for recording files on a sequential data carrier, and a sequential data media
DE69434381T2 (en) A method for representation in a parity RAID subsystem using a non-volatile memory
US4849836A (en) Copy protection for computer discs

Legal Events

Date Code Title Description
OP8 Request for examination as to paragraph 44 patent law
8122 Nonbinding interest in granting licenses declared
8131 Rejection