EP0163715A1 - Computer system - Google Patents

Computer system

Info

Publication number
EP0163715A1
EP0163715A1 EP19850900149 EP85900149A EP0163715A1 EP 0163715 A1 EP0163715 A1 EP 0163715A1 EP 19850900149 EP19850900149 EP 19850900149 EP 85900149 A EP85900149 A EP 85900149A EP 0163715 A1 EP0163715 A1 EP 0163715A1
Authority
EP
European Patent Office
Prior art keywords
computer
data
program
security
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP19850900149
Other languages
German (de)
French (fr)
Inventor
Alexander Battison Gardiner
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of EP0163715A1 publication Critical patent/EP0163715A1/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress

Definitions

  • This invention relates to computer systems. At the present time it is very easy to copy computer programs without authority and to use the unauthorised copy in a computer. This is undesirable and it is therefore an object of the present invention to obviate or mitigate this disadvantage.
  • a computer system characterised by the combination of a computer program recorded on a machine-readable medium, a computer, means for loading said program into said computer, a card reader coupled to said computer, and a pre-programmed security card capable of being loaded into said card reader, wherein said computer program comprises program data for operating said computer and security data for inhibiting unauthorised use of the computer program in said computer, said security data being formed by interrogation data for interrogating the card reader via -the computer, identification data for effecting a comparison with the pre-programmed security card data, and disablement data for inhibiting further operation of the computer program in the computer in the absence of concurrence in said comparison.
  • each program may be recorded on magnetic tape or disc and the program distributor issues with each program an appropriate security card so that when the program is in use in a computer the computer will only run in the presence of the .security card which is correct for the particular program.
  • the security card may conveniently be in the form of a plastic carrier with read-only pre-programmed magnetic strips, generally similar to cards conventionally used nowadays for banking and cheque encashment purposes, or alternatively may take the form of a plastic carrier incorporating a signal processing chip with pre-programmed memory.
  • the security data interrupt the program data to interrogate the security card and compare some or all of the pre-programmed data therein with the identification data within the program. If the returned data message does not agree with that of the identification data the disablement data inhibits further operation of the computer so that the computer program does not run any further and effectively is worthless to the user. If the returned data message does agree with the identification data the disablement data is inhibited from operating and the computer program continues to run.
  • the reader for the security card may be used to read more than one security card at any one time where more than one program is used concurrently in the computer (e.g. operating systems software, application software, compiler software, interpreter software) .
  • the reader may be of the type which reads a security card statically, or dynamically during insertion of the security card, and conveniently is attached to the serial printer or TTY port of the computer.
  • the identification data and preferably the entire security data, is encrypted in such a way as to make it difficult to decode.
  • the security data is in the form of disguised calls to a program data routine.
  • Fig. 1 illustrates the computer system in block format
  • Fig. 2 illustrates a detail of the Fig. 1 system
  • Fig. 3 illustrates the organisation of the software used in the Fig. 1 system.
  • a computer system 10 comprises a magnetic disc 11 on which is recorded a computer program, the disc 11 being removably mounted in a disc-reading device 12 coupled to a computer 13 by way of a data trans- mission path 14.
  • a card reader 15 Connected to computer 13 by way of its serial printer port is a card reader 15 releasably containing a security card 16 having pre-recorded or
  • Fig. 2 illustrates card reader 15 in greater detail in order to illustrate its preferred ability to house concurrently several cards 16 respectively associated with several programs which may operate concurrently within computer 13 having been sequentially loaded therein from a pertaining disc 11 by way of the device 12.
  • Fig. 3 schematically illustrates the organisation of the security data software provided by a single program on a disc 11.
  • the computer 13 is in its RUN mode whereby the program of disc 11 is rendered operational (or at least quasi-operational by virtue of the present invention) there intermittently occurs during the program data the security data which initiates, via computer 13, the sequence of events denoted by blocks 20 to 30.
  • block 20 arranges interrogation of card reader 15 to determine the presence or absence of a specifically identified card 16 as indicated by blocks 21, 22.
  • a password identified in block 20 is applied to the card 16 to determine whether or not that password is meaningful as indicated by block 23.
  • a card response indicated by block 24 is established which is checked comparatively by computer 13 with the identification data of the program as denoted by block 25.
  • the computer 13 is signalled to permit the program to continue running, as indicated by block 27.
  • a 'NO* signal is returned to the computer 13 as indicated by block 28 which results in the computer 13 displaying a standard shut-down message on its VDU as denoted by block 29 the program is rejected, that is inhibited from further operation within the computer "13 as indicated by block 30.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Remote Sensing (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Storage Device Security (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

Un système d'ordinateur (10) comprend un ordinateur (13) associé avec un lecteur de disques (12) permettant de charger un programme enregistré sur un disque magnétique (11) dans l'ordinateur (13). Une carte de sécurité préprogrammée (16) est chargée dans un lecteur de cartes (15) qui est couplé à l'ordinateur (13) et le programme codé sur disque (11) est formé par des données de programme commandant le fonctionnement de l'ordinateur (13) et par des données de sécurité servant à empêcher l'utilisation non autorisée du programme dans l'ordinateur (13). Les données de sécurité sont formées par des données d'interrogation agencées pour interroger le lecteur de cartes (15) via l'ordinateur (13), des données d'identification pour effectuer une comparaison entre les données préprogrammées dans la carte de sécurité et des données d'invalidation empêchant toute activité du programme d'ordinateur dans l'ordinateur (13) en l'absence de correspondance dans la comparaison.A computer system (10) includes a computer (13) associated with a disk drive (12) for loading a program recorded on a magnetic disk (11) into the computer (13). A preprogrammed security card (16) is loaded into a card reader (15) which is coupled to the computer (13) and the disc encoded program (11) is formed by program data controlling the operation of the computer (13) and by security data used to prevent unauthorized use of the program in the computer (13). The security data are formed by interrogation data arranged to interrogate the card reader (15) via the computer (13), identification data for carrying out a comparison between the data preprogrammed in the security card and invalidation data preventing any activity of the computer program in the computer (13) in the absence of a match in the comparison.

Description

COMPUTER SYSTEM
This invention relates to computer systems. At the present time it is very easy to copy computer programs without authority and to use the unauthorised copy in a computer. This is undesirable and it is therefore an object of the present invention to obviate or mitigate this disadvantage.
According to the present invention there is provided a computer system characterised by the combination of a computer program recorded on a machine-readable medium, a computer, means for loading said program into said computer, a card reader coupled to said computer, and a pre-programmed security card capable of being loaded into said card reader, wherein said computer program comprises program data for operating said computer and security data for inhibiting unauthorised use of the computer program in said computer, said security data being formed by interrogation data for interrogating the card reader via -the computer, identification data for effecting a comparison with the pre-programmed security card data, and disablement data for inhibiting further operation of the computer program in the computer in the absence of concurrence in said comparison.
It will be understood that in accordance with the present invention each program may be recorded on magnetic tape or disc and the program distributor issues with each program an appropriate security card so that when the program is in use in a computer the computer will only run in the presence of the .security card which is correct for the particular program. The security card may conveniently be in the form of a plastic carrier with read-only pre-programmed magnetic strips, generally similar to cards conventionally used nowadays for banking and cheque encashment purposes, or alternatively may take the form of a plastic carrier incorporating a signal processing chip with pre-programmed memory.
When the computer is operating in accordance with the program data of the computer program, and at intervals while the software is running, the security data interrupt the program data to interrogate the security card and compare some or all of the pre-programmed data therein with the identification data within the program. If the returned data message does not agree with that of the identification data the disablement data inhibits further operation of the computer so that the computer program does not run any further and effectively is worthless to the user. If the returned data message does agree with the identification data the disablement data is inhibited from operating and the computer program continues to run.
With the system of the present invention as many copies of the computer program may be made as the user desires but because only one security card exists (being associated with the originally distributed program) only one of the copies can be used at a time. If multiple machine operation is required multiple security cards are required and can be purchased from the program distributor In this connection it will be appreciated that unauthorise copying of the security card whilst not entirely impossibl is very substantially more complicated than unauthorised copying of a program recorded on magnetic tape or disc and is well beyond the abilities of the average program user.
It will be understood that the reader for the security card may be used to read more than one security card at any one time where more than one program is used concurrently in the computer (e.g. operating systems software, application software, compiler software, interpreter software) . The reader may be of the type which reads a security card statically, or dynamically during insertion of the security card, and conveniently is attached to the serial printer or TTY port of the computer.
It will also be understood that the identification data, and preferably the entire security data, is encrypted in such a way as to make it difficult to decode. Preferably also the security data is in the form of disguised calls to a program data routine.
An embodiment of the present invention will now be described by way of example with reference to the accompanying drawings, in which:
Fig. 1 illustrates the computer system in block format;
Fig. 2 illustrates a detail of the Fig. 1 system; and Fig. 3 illustrates the organisation of the software used in the Fig. 1 system.
As is shown in Fig. 1 a computer system 10 comprises a magnetic disc 11 on which is recorded a computer program, the disc 11 being removably mounted in a disc-reading device 12 coupled to a computer 13 by way of a data trans- mission path 14. Connected to computer 13 by way of its serial printer port is a card reader 15 releasably containing a security card 16 having pre-recorded or
"BUREAU
OMPI WIPO *J programmed data thereon.
Fig. 2 illustrates card reader 15 in greater detail in order to illustrate its preferred ability to house concurrently several cards 16 respectively associated with several programs which may operate concurrently within computer 13 having been sequentially loaded therein from a pertaining disc 11 by way of the device 12.
Fig. 3 schematically illustrates the organisation of the security data software provided by a single program on a disc 11. Thus, when the computer 13 is in its RUN mode whereby the program of disc 11 is rendered operational (or at least quasi-operational by virtue of the present invention) there intermittently occurs during the program data the security data which initiates, via computer 13, the sequence of events denoted by blocks 20 to 30.
Accordingly block 20 arranges interrogation of card reader 15 to determine the presence or absence of a specifically identified card 16 as indicated by blocks 21, 22. In the event of the required card 16 being present a password identified in block 20 is applied to the card 16 to determine whether or not that password is meaningful as indicated by block 23. In the event that the password is meaningful a card response, indicated by block 24 is established which is checked comparatively by computer 13 with the identification data of the program as denoted by block 25. In the event of concurrence in the comparison as denoted by block 26 the computer 13 is signalled to permit the program to continue running, as indicated by block 27. In any case where a negative response is achieved a 'NO* signal is returned to the computer 13 as indicated by block 28 which results in the computer 13 displaying a standard shut-down message on its VDU as denoted by block 29 the program is rejected, that is inhibited from further operation within the computer "13 as indicated by block 30.

Claims

1. A computer system characterised by the combination of a computer program recorded on a machine-readable medium (11) , a computer (13) , means (12) for loading said program into said computer (13), a card reader (15) coupled to said computer (13) , and a pre-programmed security card (16) capable of being loaded into said card reader (15) , wherein said computer program comprises program data for operating said computer (13) and security data for inhibitin unauthorised use of the computer program in said computer (13), said security data being formed by interrogation data for interrogating the card reader (15) via the computer (13) , identification data for effecting a comparison with the pre-programmed security card data, and disablement data for inhibiting further operation of the computer program in the computer (13) in the absence of concurrence in said σomparison.
2. A computer system as claimed in claim 1, characterised in that the security card (16) is in the form of a plastic carrier with read-only pre-programmed magnetic strips.
3. A computer system as claimed in claim 1, characterised in that the security card (16) is in the form of a plastic carrier incorporating a single processing chip with pre¬ programmed memory.
4. A computer system as claimed in claim 1 and substantially as hereinbefore described with reference to the accompanying drawings.
EP19850900149 1983-12-06 1984-12-06 Computer system Withdrawn EP0163715A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB8332532 1983-12-06
GB8332532 1983-12-06

Publications (1)

Publication Number Publication Date
EP0163715A1 true EP0163715A1 (en) 1985-12-11

Family

ID=10552902

Family Applications (1)

Application Number Title Priority Date Filing Date
EP19850900149 Withdrawn EP0163715A1 (en) 1983-12-06 1984-12-06 Computer system

Country Status (2)

Country Link
EP (1) EP0163715A1 (en)
WO (1) WO1985002696A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4794470A (en) * 1986-06-25 1988-12-27 Media Security Incorporated And Associates Security system for protecting information
FR2622319A1 (en) * 1987-10-27 1989-04-28 Guerri Jean Software medium with protection against copying and device for using software with protection against copying
FR2647937B2 (en) * 1988-11-30 1994-10-14 Vernois Goulven IMPROVED DISKETTE INCORPORATING INTEGRATED CIRCUITS AND CONNECTORS, OR ARRANGEMENT FOR RECEIVING INTEGRATED CIRCUITS AND CONNECTORS, AND CONNECTION DEVICES WITH A COMPUTER
DE4239865A1 (en) * 1992-11-27 1994-06-01 Heinz Johann Unauthorised program use prevention method - inserting installation chip card data carrier into test appts. before starting, interrogating card to check program addresses, and interrupting program with incorrect answer
GB9405753D0 (en) * 1994-03-23 1994-05-11 Gms Recordings Limited Interactive compact disk system
FR2720532B1 (en) * 1994-05-25 1997-09-12 Vincent Lorphelin Secure software rental system with memory card.
GB2320597A (en) * 1997-10-08 1998-06-24 Powerdesk Plc Card-controlled personal computer

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1414126A (en) * 1971-11-22 1975-11-19 Key Tronic Ltd Secutity for computer systems
US3996449A (en) * 1975-08-25 1976-12-07 International Business Machines Corporation Operating system authenticator
FR2523745B1 (en) * 1982-03-18 1987-06-26 Bull Sa METHOD AND DEVICE FOR PROTECTING SOFTWARE DELIVERED BY A SUPPLIER TO A USER

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO8502696A1 *

Also Published As

Publication number Publication date
WO1985002696A1 (en) 1985-06-20

Similar Documents

Publication Publication Date Title
US4462078A (en) Computer program protection method
US5379433A (en) Protection against unauthorized use of software recorded on recording medium
US4748561A (en) Method of protecting computer software
KR950029928A (en) Software object distribution method and device
US8218188B2 (en) Electronic document storage apparatus, electronic document storage and reference system, electronic document transfer method, and computer readable medium for storing an electronic document
JPH06324858A (en) Software use amount managing system and storage medium with software used amount managing function
EP0238537A1 (en) System for preventing software piracy employing multi-encrypted keys and single decryption circuit modules.
CN101283332A (en) Information processing device, information processing method, and program
EP0163715A1 (en) Computer system
WO1990010292A1 (en) Process for controlling the use of an information storage medium, in particular of a magnetic or magneto-optic type, and system for its implementation
EP0470163A1 (en) Improved security for machine-writeable data storage systems
JP2007140961A (en) Device for preventing usage of fraudulent copied file, and its program
CN103440465A (en) Mobile storage medium safety control method
WO1993009498A1 (en) Method and system protecting data in storage device against computer viruses
GB2145856A (en) Copyright protection device
JPH07503566A (en) dongle
FI103440B (en) Authentication of data storage to cache tape drive e
JPS6136842A (en) Foul use preventing system using software copy
EP1465182A1 (en) Optical media protection driver
JPH03105419A (en) Fixed disk device
JPS63153633A (en) Use limitation system for program
IE914474A1 (en) Security of stored data
JP2742067B2 (en) Data secret protection method
JPH03250327A (en) Install control system
JPH0438523A (en) Program execution permitting system

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Designated state(s): AT BE CH DE FR GB LI LU NL SE

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 19851107