EP0163715A1 - Systeme d'ordinateur - Google Patents
Systeme d'ordinateurInfo
- Publication number
- EP0163715A1 EP0163715A1 EP19850900149 EP85900149A EP0163715A1 EP 0163715 A1 EP0163715 A1 EP 0163715A1 EP 19850900149 EP19850900149 EP 19850900149 EP 85900149 A EP85900149 A EP 85900149A EP 0163715 A1 EP0163715 A1 EP 0163715A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- computer
- data
- program
- security
- card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000004590 computer program Methods 0.000 claims abstract description 15
- 230000002401 inhibitory effect Effects 0.000 claims description 3
- 108010080511 serum sodium transport inhibitor Proteins 0.000 claims 1
- 230000000694 effects Effects 0.000 abstract 1
- KKEBXNMGHUCPEZ-UHFFFAOYSA-N 4-phenyl-1-(2-sulfanylethyl)imidazolidin-2-one Chemical compound N1C(=O)N(CCS)CC1C1=CC=CC=C1 KKEBXNMGHUCPEZ-UHFFFAOYSA-N 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
Definitions
- This invention relates to computer systems. At the present time it is very easy to copy computer programs without authority and to use the unauthorised copy in a computer. This is undesirable and it is therefore an object of the present invention to obviate or mitigate this disadvantage.
- a computer system characterised by the combination of a computer program recorded on a machine-readable medium, a computer, means for loading said program into said computer, a card reader coupled to said computer, and a pre-programmed security card capable of being loaded into said card reader, wherein said computer program comprises program data for operating said computer and security data for inhibiting unauthorised use of the computer program in said computer, said security data being formed by interrogation data for interrogating the card reader via -the computer, identification data for effecting a comparison with the pre-programmed security card data, and disablement data for inhibiting further operation of the computer program in the computer in the absence of concurrence in said comparison.
- each program may be recorded on magnetic tape or disc and the program distributor issues with each program an appropriate security card so that when the program is in use in a computer the computer will only run in the presence of the .security card which is correct for the particular program.
- the security card may conveniently be in the form of a plastic carrier with read-only pre-programmed magnetic strips, generally similar to cards conventionally used nowadays for banking and cheque encashment purposes, or alternatively may take the form of a plastic carrier incorporating a signal processing chip with pre-programmed memory.
- the security data interrupt the program data to interrogate the security card and compare some or all of the pre-programmed data therein with the identification data within the program. If the returned data message does not agree with that of the identification data the disablement data inhibits further operation of the computer so that the computer program does not run any further and effectively is worthless to the user. If the returned data message does agree with the identification data the disablement data is inhibited from operating and the computer program continues to run.
- the reader for the security card may be used to read more than one security card at any one time where more than one program is used concurrently in the computer (e.g. operating systems software, application software, compiler software, interpreter software) .
- the reader may be of the type which reads a security card statically, or dynamically during insertion of the security card, and conveniently is attached to the serial printer or TTY port of the computer.
- the identification data and preferably the entire security data, is encrypted in such a way as to make it difficult to decode.
- the security data is in the form of disguised calls to a program data routine.
- Fig. 1 illustrates the computer system in block format
- Fig. 2 illustrates a detail of the Fig. 1 system
- Fig. 3 illustrates the organisation of the software used in the Fig. 1 system.
- a computer system 10 comprises a magnetic disc 11 on which is recorded a computer program, the disc 11 being removably mounted in a disc-reading device 12 coupled to a computer 13 by way of a data trans- mission path 14.
- a card reader 15 Connected to computer 13 by way of its serial printer port is a card reader 15 releasably containing a security card 16 having pre-recorded or
- Fig. 2 illustrates card reader 15 in greater detail in order to illustrate its preferred ability to house concurrently several cards 16 respectively associated with several programs which may operate concurrently within computer 13 having been sequentially loaded therein from a pertaining disc 11 by way of the device 12.
- Fig. 3 schematically illustrates the organisation of the security data software provided by a single program on a disc 11.
- the computer 13 is in its RUN mode whereby the program of disc 11 is rendered operational (or at least quasi-operational by virtue of the present invention) there intermittently occurs during the program data the security data which initiates, via computer 13, the sequence of events denoted by blocks 20 to 30.
- block 20 arranges interrogation of card reader 15 to determine the presence or absence of a specifically identified card 16 as indicated by blocks 21, 22.
- a password identified in block 20 is applied to the card 16 to determine whether or not that password is meaningful as indicated by block 23.
- a card response indicated by block 24 is established which is checked comparatively by computer 13 with the identification data of the program as denoted by block 25.
- the computer 13 is signalled to permit the program to continue running, as indicated by block 27.
- a 'NO* signal is returned to the computer 13 as indicated by block 28 which results in the computer 13 displaying a standard shut-down message on its VDU as denoted by block 29 the program is rejected, that is inhibited from further operation within the computer "13 as indicated by block 30.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Remote Sensing (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Radar, Positioning & Navigation (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Abstract
Un système d'ordinateur (10) comprend un ordinateur (13) associé avec un lecteur de disques (12) permettant de charger un programme enregistré sur un disque magnétique (11) dans l'ordinateur (13). Une carte de sécurité préprogrammée (16) est chargée dans un lecteur de cartes (15) qui est couplé à l'ordinateur (13) et le programme codé sur disque (11) est formé par des données de programme commandant le fonctionnement de l'ordinateur (13) et par des données de sécurité servant à empêcher l'utilisation non autorisée du programme dans l'ordinateur (13). Les données de sécurité sont formées par des données d'interrogation agencées pour interroger le lecteur de cartes (15) via l'ordinateur (13), des données d'identification pour effectuer une comparaison entre les données préprogrammées dans la carte de sécurité et des données d'invalidation empêchant toute activité du programme d'ordinateur dans l'ordinateur (13) en l'absence de correspondance dans la comparaison.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB8332532 | 1983-12-06 | ||
GB8332532 | 1983-12-06 |
Publications (1)
Publication Number | Publication Date |
---|---|
EP0163715A1 true EP0163715A1 (fr) | 1985-12-11 |
Family
ID=10552902
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP19850900149 Withdrawn EP0163715A1 (fr) | 1983-12-06 | 1984-12-06 | Systeme d'ordinateur |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP0163715A1 (fr) |
WO (1) | WO1985002696A1 (fr) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4794470A (en) * | 1986-06-25 | 1988-12-27 | Media Security Incorporated And Associates | Security system for protecting information |
FR2622319A1 (fr) * | 1987-10-27 | 1989-04-28 | Guerri Jean | Support de logiciel a protection contre la copie et dispositif de mise en oeuvre d'un logiciel a protection contre la copie |
FR2647937B2 (fr) * | 1988-11-30 | 1994-10-14 | Vernois Goulven | Disquette perfectionnee incorporant des circuits integres et des connecteurs, ou amenagee pour recevoir des circuits integres et des connecteurs, et dispositifs de liaison avec un ordinateur |
DE4239865A1 (de) * | 1992-11-27 | 1994-06-01 | Heinz Johann | Verfahren zur Verhinderung der Anwendung eines unberechtigt auf einen Datenträger kopierten Programms und Vorrichtung zur Durchführung des Verfahrens |
GB9405753D0 (en) * | 1994-03-23 | 1994-05-11 | Gms Recordings Limited | Interactive compact disk system |
FR2720532B1 (fr) * | 1994-05-25 | 1997-09-12 | Vincent Lorphelin | Système de location sécurisée de logiciels par carte à mémoire. |
GB2320597A (en) * | 1997-10-08 | 1998-06-24 | Powerdesk Plc | Card-controlled personal computer |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB1414126A (en) * | 1971-11-22 | 1975-11-19 | Key Tronic Ltd | Secutity for computer systems |
US3996449A (en) * | 1975-08-25 | 1976-12-07 | International Business Machines Corporation | Operating system authenticator |
FR2523745B1 (fr) * | 1982-03-18 | 1987-06-26 | Bull Sa | Procede et dispositif de protection d'un logiciel livre par un fournisseur a un utilisateur |
-
1984
- 1984-12-06 EP EP19850900149 patent/EP0163715A1/fr not_active Withdrawn
- 1984-12-06 WO PCT/GB1984/000419 patent/WO1985002696A1/fr unknown
Non-Patent Citations (1)
Title |
---|
See references of WO8502696A1 * |
Also Published As
Publication number | Publication date |
---|---|
WO1985002696A1 (fr) | 1985-06-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US4462078A (en) | Computer program protection method | |
US5379433A (en) | Protection against unauthorized use of software recorded on recording medium | |
US4748561A (en) | Method of protecting computer software | |
US4446519A (en) | Method and apparatus for providing security for computer software | |
JP3243331B2 (ja) | ソフトウェア管理用階層媒体の作成方法,ソフトウェア管理用階層媒体の作成装置およびソフトウェア管理用階層媒体 | |
KR950029928A (ko) | 소프트웨어 객체 배포 방법 및 장치 | |
US20060066902A1 (en) | Electronic document storage apparatus, program and electronic document reference apparatus | |
CN101283332A (zh) | 信息处理装置、信息处理方法及程序 | |
JPS623459B2 (fr) | ||
EP0163715A1 (fr) | Systeme d'ordinateur | |
WO1990010292A1 (fr) | Procede de controle de l'utilisation d'un support d'informations, notamment magnetique ou magneto-optique et systemes pour sa mise en ×uvre | |
WO1985003584A1 (fr) | Surveillance de securite et d'utilisation | |
EP0470163A1 (fr) | Securite amelioree pour systemes de memorisation de donnees programmables a la machine | |
JP2007140961A (ja) | 不正にコピーされたファイルの使用防止装置およびプログラム | |
CN103440465A (zh) | 一种移动存储介质安全控制方法 | |
EP1298655A2 (fr) | Dispositif de rendu, dispositif d'enregistrement, et méthode de contrôle de la copie | |
GB2145856A (en) | Copyright protection device | |
JPH07503566A (ja) | ドングル | |
FI103440B (fi) | Datan tallennuksen varmentaminen välimuistia käyttävälle nauha-asemall e | |
JPS60157787A (ja) | 記憶媒体 | |
JPS63153633A (ja) | プログラムの利用制限方式 | |
IE914474A1 (en) | Security of stored data | |
WO2004088658A1 (fr) | Unite de commande de protection de support optique | |
CN108595967A (zh) | 一种基于虚拟化技术的数据保护方法和系统 | |
JP2742067B2 (ja) | データ秘密保護方式 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Designated state(s): AT BE CH DE FR GB LI LU NL SE |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 19851107 |