JPS62166428A - Preventing method against illegal copying of software - Google Patents

Preventing method against illegal copying of software

Info

Publication number
JPS62166428A
JPS62166428A JP61007181A JP718186A JPS62166428A JP S62166428 A JPS62166428 A JP S62166428A JP 61007181 A JP61007181 A JP 61007181A JP 718186 A JP718186 A JP 718186A JP S62166428 A JPS62166428 A JP S62166428A
Authority
JP
Japan
Prior art keywords
software
supplied
execution
rom
storage means
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP61007181A
Other languages
Japanese (ja)
Inventor
Yuichiro Miyamoto
裕一郎 宮本
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Panasonic Holdings Corp
Original Assignee
Matsushita Electric Industrial Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Matsushita Electric Industrial Co Ltd filed Critical Matsushita Electric Industrial Co Ltd
Priority to JP61007181A priority Critical patent/JPS62166428A/en
Publication of JPS62166428A publication Critical patent/JPS62166428A/en
Pending legal-status Critical Current

Links

Abstract

PURPOSE:To prevent software from being copied illegally while allowing it to be copied only by a specific machine by incorporating a nonvolatile ROM for storing codes which are not the same among individual bodies in necessary equipment that the software requires during the manufacture. CONSTITUTION:The nonvolatile ROM storing codes which are not always the same among individual bodies is incorporated in the equipment that the software requires at the stage of manufacture, and the software to be supplied is fixed on a supply medium together with an installation program for installation by using technique for copy prevention. The software to be supplied is converted into a file that an OS can handle when installed and codes stored in the ROM are counted from the installation program; and coincidence with the codes stored in the ROM is confirmed at every start of execution and the execution is stopped when no coincidence is obtained. Consequently, only legal users can copy the software.

Description

【発明の詳細な説明】 (産業上の利用分野) 本発明は、ソフトウェアが必要な機器に対して供給され
るソフトウェアの、バック・アップのための複写は許し
て不正使用のための複写を拒絶しようとするソフトウェ
ア不正複写防止方法に関するものである。
Detailed Description of the Invention (Field of Industrial Application) The present invention allows copying of software for backup purposes and rejects copying for unauthorized use of software supplied to equipment that requires the software. The present invention relates to a method for preventing unauthorized copying of software.

(従来の技術) ソフトウェアが必要な機器はソフトウェアの交換により
種種異なった動作をし得るため、個々のソフトウェアが
単独で商取引の対象となり得る。
(Prior Art) Since devices that require software can operate in different ways by exchanging software, individual pieces of software can be the subject of commercial transactions.

通例ではソフトウェアの著作権者と使用者の間に使用機
器を特定した使用契約が結ばれ、使用者はそのソフトウ
ェアが使用できるにいたる。以下この使用契約に基づい
てソフトウェアは本質的に無形物であって複写したもの
でも全く同等の機能を発揮する。そのため前述の使用契
約を結ばず複写したソフトウェアを使用する(以下非合
法の使用と呼ぶ)使用者が後を絶たない。さらに合法的
使用者であっても使用契約によって特定された機械以外
では使用できないはずであるが、これは非常に遵守され
にくい。
Usually, a usage contract is concluded between the copyright holder of the software and the user, specifying the equipment to be used, and the user can use the software. Based on this usage agreement, the software is essentially an intangible product, and copies thereof will perform exactly the same functions. Therefore, there is no end to the number of users who use the copied software without signing the aforementioned usage agreement (hereinafter referred to as illegal use). Furthermore, even legal users cannot use machines other than those specified in the usage contract, but this is extremely difficult to comply with.

そこで従来は複写そのものが尋常な手段・方法では゛行
えないような方策が講じられてきた。なすわち、まずソ
フトウェア供給媒体全体の物理的な複写を防ぐために供
給媒体上に故意に物理フォーマット不良領域を作り、そ
のうえで被供給ソフトウェアをオペレーティング・シス
テム(以下O8と呼ぶ)からみてファイルとして取り扱
えない形、例えばO8の管理範囲外におかれるとかディ
レクトリに登録されないとか論理フォーマットを無視す
るとかにしてO8から読めないようにしていた。
Therefore, in the past, measures have been taken to make copying itself impossible by ordinary means and methods. That is, in order to prevent physical copying of the entire software supply medium, a physically formatted area is intentionally created on the supply medium, and then the supplied software cannot be treated as a file from the perspective of the operating system (hereinafter referred to as O8). For example, they were placed outside the O8's management range, were not registered in the directory, or ignored the logical format, so that they could not be read from the O8.

(発明が解決しようとする問題点) ソフトウェア供給媒体の信頼度、耐久性は絶対的なもの
とはいえないのでいかなるソフトウェア使用契約でもバ
ック・アップのための複写は本来的に認められるべきも
のであるが、前述の従来方法では複写そのものが拒絶さ
れておりバック・アップを行えない。これは合法的使用
者の本来的な権利を著しく損なうものである。
(Problem to be solved by the invention) Since the reliability and durability of software supply media cannot be said to be absolute, copying for backup purposes should be inherently permitted in any software usage contract. However, in the conventional method described above, copying itself is rejected and backup cannot be performed. This seriously undermines the inherent rights of legitimate users.

本発明はかかる点に鑑みてなされたものであり、特定の
機械上でのみ動作する複写可能なソフトウェアを供給で
きるようにする事を目的とする。
The present invention has been made in view of this problem, and it is an object of the present invention to provide copyable software that operates only on a specific machine.

(問題点を解決するための手段) ソフトウェアが必要な機器にその製造段階で、個体間で
必ずしも同一でない符号を記憶する不揮発性の読み出し
専用記憶手段を組み込んでおく。
(Means for solving the problem) Non-volatile read-only storage means for storing codes that are not necessarily the same between devices is incorporated into devices that require software at the manufacturing stage.

被供給ソフトウェアはインストウールを行うインストウ
ール・プログラムと共に従来の複写を阻止する技術を用
いて供給媒体上に固定される。
The supplied software is fixed onto the supply medium using conventional copy-resistant techniques along with an install program that performs the installation.

そして被供給ソフトウェアはそのインストウール時にO
8が取り扱えるファイルに変換されると同時に前述記憶
手段の記憶する符号をインストウール・プログラムから
教えられ、以後実行開始ごとに前述記憶手段の記憶する
符号との一致を確認し、一致しなければ実行を放棄する
And the supplied software is O when it is installed.
8 is converted into a file that can be handled by the installer program, and at the same time the code stored in the storage means is taught by the install program. From then on, each time execution starts, it is checked to see if it matches the code stored in the storage means, and if they do not match, the program is executed. abandon.

(作 用) 記憶手段が記憶する符号は非合法の使用を試みる者が同
一の符号を持つ機械に接触する事が事実上不可能な程度
に不一致であれば良い。
(Operation) The codes stored in the storage means need only be mismatched to the extent that it is virtually impossible for a person attempting illegal use to come into contact with a machine with the same code.

被供給ソフトウェアは供給される時点では従来の複写阻
止の技術によって保護され、かつ機械に依存しない。そ
れ故著作権者は被供給ソフトウニアを機械に依存させて
多種用意する必要はない。
The supplied software is protected by conventional anti-copying techniques at the time of supply and is machine independent. Therefore, the copyright holder does not need to prepare a wide variety of supplied software depending on the machine.

しかし被供給ソフトウェアを実行に移すためにはインス
トウールする必要があり、これを行うとその被供給ソフ
トウェアはインストウールを機械上でのみ実行可能とな
るので非合法の使用が行えず、しかも通常のファイル複
写の手段でバック・アップ・コピーが取れる。
However, in order to execute the supplied software, it is necessary to install it, and when this is done, the supplied software can only be executed on a machine, so it cannot be used illegally, and moreover, it cannot be used normally. Backup copies can be made by file copying.

従って結果的に不正複写を防止した事になる。Therefore, as a result, unauthorized copying is prevented.

(実施例) 実施例を示すために8インチ片面単密度、1セクタ12
8バイトのフロッピー・ディスク・ベースのO8を1つ
想定し、以下AO8と呼ぶ。
(Example) To show an example, 8 inch single-sided single density, 1 sector 12
One 8-byte floppy disk-based O8 is assumed, hereinafter referred to as AO8.

第1表 第1表にAO8によるディスク上の領域割当を示す。A
O8が動く機械はリセット後トラック0セクタ1にある
コールド・スタート・ローダを読み込んでそれに制御を
渡す。コールド・スタート・ローダは入出力機器の初期
設定を行い、システム・プログラムをローディングして
システムを立ち上げる。
Table 1 Table 1 shows the area allocation on the disk by AO8. A
After reset, the machine running O8 reads the cold start loader in track 0 sector 1 and passes control to it. The cold start loader initializes input/output devices, loads the system program, and starts the system.

第2表 第2表に本発明実施例のソフトウェア供給ディスク上の
領域割当を示す。トラック15以降の奇番号トラックは
すべて不良トラックである。A○Sが動く機械に第2表
で示すディスクをセラ1〜してリセットする事でインス
トウール・プログラム・ローダが動き出す。インストウ
ール・プログラムは各バイトごとに貝と排他的論理和が
取られて一トーラック8セクタ1〜5に格納されている
。これがインストウール・プログラム・ローダによって
復元されながら読み込まれてインストウールが開始され
る。
Table 2 Table 2 shows the area allocation on the software supply disk according to the embodiment of the present invention. All odd-numbered tracks after track 15 are defective tracks. The installation program loader starts operating by inserting the discs shown in Table 2 into the machine where A○S operates and resetting it. The install program is exclusive-ORed with the shell for each byte and stored in eight sectors 1 to 5 of one rack. This is restored and read by the install program loader to start the install.

インストウール・プログラムはまず最初にインストウー
ル・プログラム・ローダ領域を破壊する。
The install program first destroys the install program loader area.

次に、各バイトごとに川と排他的論理和が取られてトラ
ック22セクタ3以降に格納された被供給ソフトウェア
を復元しながらトラック2セクタ1以降に格納し直す。
Next, each byte is subjected to an exclusive OR operation and the supplied software stored in sector 3 of track 22 and thereafter is restored and stored again in sector 1 of track 2 and subsequent areas.

その際機械が持つ本発明に関る読み出し専用記憶手段を
読み出して、観と排他的論理和を取って被供給ソフトウ
ェアの先頭から1286バイト目にそれを置く。さらに
トラック1にディレクトリを形成し被供給ソフトウェア
を登録する。
At that time, the machine reads out the read-only storage means related to the present invention that the machine has, performs an exclusive OR with the result, and places it at the 1286th byte from the beginning of the supplied software. Furthermore, a directory is created in track 1 and the supplied software is registered.

これで被供給ソフトウェアはAO8から通常のファイル
として見えるようになる。
The supplied software will now be visible from the AO8 as a normal file.

被供給ソフトウェアは実行開始にあたって機械が持つ本
発明に関する読み出し専用記憶手段を読み出して観と排
他的論理を取って自分自身の先頭から1286バイト目
と比較する。これらが一致すれば実行を開始し、異なれ
ば実行を放棄する。
At the start of execution, the supplied software reads out the read-only storage means related to the present invention that the machine has, takes the view and exclusive logic, and compares it with the 1286th byte from the beginning of itself. If these match, execution will start; if they do not match, execution will be abandoned.

以」二の文中で下線を施した数値は被供給ソフトウェア
の供給者が任意に設定するものであるので、その被供給
ソフトウェア供給者しか知る由もない数値で、被供給ラ
フ1ヘウエアが実行開始にあたって行うチェックを回避
させようとするのは現実的には極めて困難である。
The underlined values in the following sentences are arbitrarily set by the supplier of the supplied software, so the supplied rough 1 software starts execution with values that only the supplier of the supplied software knows. In reality, it is extremely difficult to try to avoid such checks.

本発明に関する読み出し専用記憶手段は、不良のマスク
ROM等を利用すれば安価に構成できる。
The read-only storage means according to the present invention can be constructed at low cost by using a defective mask ROM or the like.

(発明の効果) 本発明のソフトウェア不正複写防止方法によると、比較
的簡単な手順を付加するだけで従来どちらかが犠牲にな
っていた著作権者と合法的使用者の権益がともに保全さ
れる効果がある。
(Effects of the Invention) According to the software unauthorized copying prevention method of the present invention, the rights and interests of both the copyright holder and the legal user, which were traditionally sacrificed to one or the other, can be preserved by adding a relatively simple procedure. effective.

Claims (1)

【特許請求の範囲】[Claims] 1組1組が必ずしも同一でない符号を記憶する不揮発性
読み出し専用記憶手段1組を予め機器に組み込んでおき
、被供給ソフトウェアを複写阻止方法で保護してインス
トウール手段と共に供給し、前記インストウール手段を
用いて前記被供給ソフトウェアを、複写が可能な形でし
かもインストウールを行っている機械が持つ前記記憶手
段が記憶する符号を認知した形に変換し、前記被供給ソ
フトウェアに認知された符号と同じ符号を記憶する前記
記憶手段を持つ機械上でしか前記被供給ソフトウェアの
実行が開始されないソフトウェア不正複写防止方法。
A set of non-volatile read-only storage means for storing codes that are not necessarily the same in each set is installed in advance in the device, the software to be supplied is protected by a copy prevention method and supplied together with the install wool means, and the software is supplied together with the install wool means. is used to convert the supplied software into a form that can be copied and that recognizes the code stored in the storage means of the machine that performs the installation, and converts the supplied software into a form that recognizes the code recognized by the supplied software. A method for preventing unauthorized copying of software, in which execution of the supplied software is started only on machines having the storage means for storing the same code.
JP61007181A 1986-01-18 1986-01-18 Preventing method against illegal copying of software Pending JPS62166428A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP61007181A JPS62166428A (en) 1986-01-18 1986-01-18 Preventing method against illegal copying of software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP61007181A JPS62166428A (en) 1986-01-18 1986-01-18 Preventing method against illegal copying of software

Publications (1)

Publication Number Publication Date
JPS62166428A true JPS62166428A (en) 1987-07-22

Family

ID=11658895

Family Applications (1)

Application Number Title Priority Date Filing Date
JP61007181A Pending JPS62166428A (en) 1986-01-18 1986-01-18 Preventing method against illegal copying of software

Country Status (1)

Country Link
JP (1) JPS62166428A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH01274239A (en) * 1988-04-26 1989-11-02 Ricoh Co Ltd Data processor

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0312744A (en) * 1989-06-09 1991-01-21 Nec Field Service Ltd Error detecting circuit

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0312744A (en) * 1989-06-09 1991-01-21 Nec Field Service Ltd Error detecting circuit

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH01274239A (en) * 1988-04-26 1989-11-02 Ricoh Co Ltd Data processor

Similar Documents

Publication Publication Date Title
US4573119A (en) Computer software protection system
US6226747B1 (en) Method for preventing software piracy during installation from a read only storage medium
KR20040077435A (en) Data copy-protecting system for creating a copy-secured optical disc and corresponding protecting method
JP2004503856A (en) System and method for verifying the existence of a complete data set under multiple control scenarios
JPS63213027A (en) Software copy protection system
JPH07325712A (en) Illicit copy preventing device for program
JPS62166428A (en) Preventing method against illegal copying of software
EA001371B1 (en) A cd-rom software protection system
US7529973B2 (en) Method of and apparatus for taking back-up and checking alteration of data, and computer product
JP4875498B2 (en) How to manage digital rights
JP3834241B2 (en) Software recording unit separation type information processing apparatus and software management method
JPH0244448A (en) Floppy disk
JP3755900B2 (en) RECORDING MEDIUM HAVING ILLEGAL USE PREVENTING FUNCTION, ITS MANUFACTURING METHOD, AND ITS MANUFACTURING DEVICE
JPS6326413B2 (en)
US20030005318A1 (en) Data protection via reversible data damage
JPH0449423A (en) Method for preventing software from being illegally copied
JPH03105525A (en) Program control system
JPH02244353A (en) Copying prevention system for program
JPH0612521B2 (en) Program execution prohibition method
JPS63289660A (en) Software illegal use preventing system
JP2004295388A (en) Method for installing and protecting software
JPS63296136A (en) Method for confirming validity of program
JPS6231458A (en) Method for preventing unfair use of software
JPH08129486A (en) Method for protecting software copyright
US20060136733A1 (en) Anti-pirating system