JPS63296136A - Method for confirming validity of program - Google Patents

Method for confirming validity of program

Info

Publication number
JPS63296136A
JPS63296136A JP62132191A JP13219187A JPS63296136A JP S63296136 A JPS63296136 A JP S63296136A JP 62132191 A JP62132191 A JP 62132191A JP 13219187 A JP13219187 A JP 13219187A JP S63296136 A JPS63296136 A JP S63296136A
Authority
JP
Japan
Prior art keywords
program
execution
storage means
coincidence
information processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP62132191A
Other languages
Japanese (ja)
Inventor
Yukio Mizuno
幸男 水野
Keiji Tagishi
田岸 啓司
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp filed Critical NEC Corp
Priority to JP62132191A priority Critical patent/JPS63296136A/en
Publication of JPS63296136A publication Critical patent/JPS63296136A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

PURPOSE:To prevent the destruction of a data file due to the execution of an unauthorized program from being generated, by detecting coincidence between permission information included in a program and discrimination information stored in a storage means, and continuing the normal execution of the program only when the coincidence is obtained. CONSTITUTION:When the transfer of a desired application program is instructed to an execution means 11 via an input means 14, a designated application program is read out from a storage device 2, and the confirmation routine part of the program is executed. In other words, the discrimination information stored in a second storage means 13 is read out, and the coincidence of the discrimination information with the permission information included in the routine part is checked. At this time, it is decided that the program is an authorized program when the coincidence is obtained, then, the execution of the routine part of a program main body is performed. Thus, it is possible to prevent the destruction of the content of a file due to the execution of the unauthorized program from being generated.

Description

【発明の詳細な説明】 〔産業上の利用分野〕 本発明はプログラムの正当性確認方法に関する。[Detailed description of the invention] [Industrial application field] The present invention relates to a program validation method.

〔従来技術および発明が解決しようとする問題点〕利用
者が各種の情報処理装置を所有する場合には、これらの
情報処理装置で使用される多数のアプリケーク璽ン・プ
ログラムやオペレーティング・システム・プログラムを
も同時に所有することになる。このような状況の下では
、利用者が、ある情報処理装置に他の情報処理装置で実
行されるべきプログラムを誤って与えて実行させてしま
い。
[Prior Art and Problems to be Solved by the Invention] When a user owns various information processing devices, there are many application programs and operating systems used in these information processing devices. You will also own the program at the same time. Under such circumstances, a user mistakenly gives one information processing device a program that should be executed by another information processing device and causes it to execute it.

この結果、外部記憶装置内に格納され几データファイル
の内容の破壊等の障害を引き起こす可能性が高い、しか
しながら、従来、このような障害の発生を防止するため
の対策は全く講じられていない。
As a result, there is a high possibility that failures such as destruction of the contents of the data files stored in the external storage device will occur.However, no measures have been taken to prevent the occurrence of such failures.

〔問題点を解決するための手段〕[Means for solving problems]

本発明の方法は、プログラム実行手段と第1の記憶手段
と装置固有の識別情報を予め記憶した第2の記憶手段と
を含む情報処理装置の前記第1の記憶手段に外部記憶装
置からロードし几プログラムの正当性を確認する正当性
確認方法において、前記第1の記憶手段にロードされた
前記プログラムの実行中に前記実行手段は、前記プログ
ラムに含まれる許可情報と前記第2の記憶手段に記憶さ
れた前記情報処理装置固有の前記識別情報とが一致する
か否かを検出し一致を検出したときだけ前記プログラム
の実行を正常に継続させる。
The method of the present invention includes loading a program from an external storage device into the first storage device of an information processing device, which includes a program execution device, a first storage device, and a second storage device in which device-specific identification information is stored in advance. In the validity confirmation method for confirming the validity of a program, during execution of the program loaded into the first storage means, the execution means stores permission information included in the program and the second storage means. It is detected whether or not the stored identification information unique to the information processing apparatus matches, and only when a match is detected, the execution of the program is allowed to continue normally.

〔実施例〕〔Example〕

次に本発明について図面を参照して詳細に説明する。 Next, the present invention will be explained in detail with reference to the drawings.

第2図を参照すると、本発明の方法に用いろ情報処理シ
ステムは、情報処理装置1と、a気ディスク装積等の外
部記憶装[2とから構成されている。前記処理製攬1は
、プログラム実行子□段11と、′R出しおよび書込み
が可能なMlの記憶手段12と、読出し専用のWJ2の
記憶手段13と、キーボード等の入力手段14と、ディ
スプレイ装置等の出力手段15とを含む。
Referring to FIG. 2, the information processing system used in the method of the present invention is comprised of an information processing device 1 and an external storage device [2] such as an a-disc storage device. The processing unit 1 includes a program executor □ stage 11, a storage unit 12 for Ml that can read and write data, a storage unit 13 for a read-only WJ2, an input unit 14 such as a keyboard, and a display device. and output means 15 such as.

前記第2の記憶手段13には、オペレーティング・シス
テム・プログラムが予め記憶されており。
The second storage means 13 stores an operating system program in advance.

このプログラムの制御下で実行手段11はアプリケージ
冒ン・プログラム(応用プログラム)を実行する。前記
第2の記憶手段13は、さら#lc、予め定め次アドレ
スAに前記装置1に固有の識別情報を記憶している。前
記記憶装置2は、複数のアプリケージ冒ン・プログラム
お工びデータをファイル形式で格納しており、必要に応
じて所望のファイルが前記第1の記憶手段12に転送さ
れる。
Under the control of this program, the execution means 11 executes an application program (application program). The second storage means 13 further stores identification information unique to the device 1 at a predetermined next address #lc. The storage device 2 stores a plurality of application application program data in a file format, and a desired file is transferred to the first storage means 12 as necessary.

第3図を参照すると、本発明の一実施例に用いるアプリ
ケージ璽ン・プログラムは、確認ルーチン部分3と、プ
ログラム本体ルーチン部分4とから構図される。
Referring to FIG. 3, the application program used in one embodiment of the present invention is composed of a confirmation routine section 3 and a program main routine section 4.

次に本発明の一実施例について第2図および確認ルーチ
ン部分3の処理を示す第1図を参照して説明する。
Next, an embodiment of the present invention will be described with reference to FIG. 2 and FIG. 1 showing the processing of confirmation routine portion 3.

まず、前記入力手段14t″介して所望のアプリケージ
璽ン・プログラムの転送を前記実行手段11に指示する
と、この実行手段11は指定され九アプリケージ冒ン・
プログラムを前記記憶装置2から読み出して前記第1の
記憶手段12にロードする。このロード終了に応答して
前記実行手段11は、最初に、このプログラムの[認ル
ーチン部分3を実行する。すなわち、第1図に示すよう
に。
First, when the execution means 11 is instructed to transfer a desired application program through the input means 14t'', the execution means 11 is designated and transfers a desired application program.
A program is read from the storage device 2 and loaded into the first storage means 12. In response to the completion of this loading, the execution means 11 first executes the [authentication routine portion 3] of this program. That is, as shown in FIG.

前記第2の記憶手段13のアドレスAに記憶されている
識別情報を読み出しくステップA1)、この識別情報と
このルーチン部分に含まれる許可情報との一致の有無を
調べる(ステップA2)。このとき1両者が一致してい
ればこのプログラムは正当な(すなわち前記装置1で実
行されてよい)プログラムであると判断しプログラム本
体ルーチン部分4の実行に移る(ステップA3)一方、
ステップA2において両者が一致しないときにはこのプ
ログラムは不当なプログラムであると判断して前記出力
子[15にこの旨を表示する等の適当な処理を行ない、
プログラム本体ルーチン部分の実行を禁止する(ステッ
プA4)。このようにして、不当なプログラムが実行さ
れることによるファイルの内容の破壊等全防止できる。
The identification information stored at address A of the second storage means 13 is read out (step A1), and whether or not this identification information matches the permission information included in this routine part is checked (step A2). At this time, if both 1 and 1 match, it is determined that this program is a valid program (that is, it can be executed by the device 1), and the program moves to execution of the main routine part 4 (step A3).
If the two do not match in step A2, it is determined that this program is an invalid program, and appropriate processing such as displaying this on the output child [15] is performed.
Execution of the routine portion of the program body is prohibited (step A4). In this way, it is possible to completely prevent file contents from being destroyed due to execution of an illegal program.

なお、前記識別情報として、前記第2の記憶手段13の
特定の一つま几は複数のアドレスに格納され九一つまた
は複数の命令(オペレーティング・システム・プログラ
ムに含まれる)(+−用い、これらをアプリケージ1ン
−プログラム内の確認ルーチン部分で比較するようにし
てもよい(通常。
Note that, as the identification information, a specific piece of the second storage means 13 is stored at a plurality of addresses and one or more instructions (included in the operating system program) (using +-) are stored in a plurality of addresses. may be compared in the confirmation routine part of the application program (usually).

オペレーティング・システム拳プログラムは各種装置毎
に異なるため)、ま几、オペレーティングeシステム・
プログラムを外部記憶装置から情報処理装置にロードす
るようなシステムでは、このオペレーティング・システ
ムプログラムに前記確認ルーチン部分を付加して同様の
比較を行っても工い。
Since the operating system program is different for each type of device), the operating system
In a system in which a program is loaded from an external storage device to an information processing device, a similar comparison may be performed by adding the confirmation routine portion to the operating system program.

〔発明の効果〕〔Effect of the invention〕

以上1本発明には、常に正当なプログラムのみを実行で
きるため不当なプログラムの実行に起因するデータファ
イルの破壊等の障害を除去できるという効果がある。
One advantage of the present invention as described above is that since only legitimate programs can be executed at all times, failures such as destruction of data files caused by execution of unauthorized programs can be eliminated.

【図面の簡単な説明】[Brief explanation of drawings]

11g1図は本発明の一実施例を説明する几めの流れ図
、第2図および第3図はそれぞれ本発明の一実施例に用
いる情報処理システムのブロック囚およびプログラムの
桐5y、を示す図である。 1・・−・・・情報処理装置、2・・・・・・外部記憶
装[3・・・・・・確認ルーチン部分、4・・・・・・
プログラム本体ルーチン部分、11・・・・・・実行手
段、12.13・・・・・・記憶手段、14・・・・・
・入力手段、15・・・・・・出力手段。 ++1゜ $  /   I!2T
Figure 11g1 is a detailed flowchart explaining an embodiment of the present invention, and Figures 2 and 3 are diagrams showing a block prisoner of an information processing system and a program Kiri5y, respectively, used in an embodiment of the present invention. be. 1... Information processing device, 2... External storage device [3... Confirmation routine part, 4...
Program body routine part, 11...execution means, 12.13...storage means, 14...
- Input means, 15... Output means. ++1゜$/I! 2T

Claims (1)

【特許請求の範囲】 プログラム実行手段と第1の記憶手段と装置固有の識別
情報を予め記憶した第2の記憶手段とを含む情報処理装
置の前記第1の記憶手段に外部記憶装置からロードした
プログラムの正当性を確認する正当性確認方法において
、 前記第1の記憶手段にロードされた前記プログラムの実
行中に前記実行手段は、前記プログラムに含まれる許可
情報と前記第2の記憶手段に記憶された前記情報処理装
置固有の前記識別情報とが一致するか否かを検出し一致
を検出したときだけ前記プログラムの実行を正常に継続
させるようにしたことを特徴とするプログラムの正当性
確認方法。
[Scope of Claims] A program loaded from an external storage device into the first storage means of an information processing device including a program execution means, a first storage means, and a second storage means in which identification information unique to the device is stored in advance. In the validity checking method for checking the validity of a program, during execution of the program loaded into the first storage means, the execution means stores permission information included in the program into the second storage means. A method for verifying the validity of a program, characterized in that the method detects whether or not the identified information unique to the information processing device matches the information processing device, and continues the execution of the program normally only when a match is detected. .
JP62132191A 1987-05-27 1987-05-27 Method for confirming validity of program Pending JPS63296136A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP62132191A JPS63296136A (en) 1987-05-27 1987-05-27 Method for confirming validity of program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP62132191A JPS63296136A (en) 1987-05-27 1987-05-27 Method for confirming validity of program

Publications (1)

Publication Number Publication Date
JPS63296136A true JPS63296136A (en) 1988-12-02

Family

ID=15075525

Family Applications (1)

Application Number Title Priority Date Filing Date
JP62132191A Pending JPS63296136A (en) 1987-05-27 1987-05-27 Method for confirming validity of program

Country Status (1)

Country Link
JP (1) JPS63296136A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1991019250A1 (en) * 1990-06-08 1991-12-12 Omron Corporation Information processing device having function of preventing program from being unjustly used
JPH0855062A (en) * 1994-07-27 1996-02-27 Internatl Business Mach Corp <Ibm> System and method for limitation of access to medium storagedevice
US6049670A (en) * 1995-01-10 2000-04-11 Fujitsu Limited Identifier managing device and method in software distribution system
JP2004265422A (en) * 2003-03-03 2004-09-24 Microsoft Corp Compact hardware identification for connecting software package to computer system having tolerance of hardware change
JP2004295871A (en) * 2003-03-03 2004-10-21 Microsoft Corp Verbose hardware identification for binding software package to computer system having tolerance for hardware change

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS61220030A (en) * 1985-03-26 1986-09-30 Toshiba Corp Software discriminating system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS61220030A (en) * 1985-03-26 1986-09-30 Toshiba Corp Software discriminating system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1991019250A1 (en) * 1990-06-08 1991-12-12 Omron Corporation Information processing device having function of preventing program from being unjustly used
JPH0855062A (en) * 1994-07-27 1996-02-27 Internatl Business Mach Corp <Ibm> System and method for limitation of access to medium storagedevice
US6049670A (en) * 1995-01-10 2000-04-11 Fujitsu Limited Identifier managing device and method in software distribution system
JP2004265422A (en) * 2003-03-03 2004-09-24 Microsoft Corp Compact hardware identification for connecting software package to computer system having tolerance of hardware change
JP2004295871A (en) * 2003-03-03 2004-10-21 Microsoft Corp Verbose hardware identification for binding software package to computer system having tolerance for hardware change
JP4652702B2 (en) * 2003-03-03 2011-03-16 マイクロソフト コーポレーション Detailed hardware identification for linking software packages to computer systems with hardware change tolerance
JP4652701B2 (en) * 2003-03-03 2011-03-16 マイクロソフト コーポレーション Compact hardware identification for linking software packages to computer systems with hardware change tolerance

Similar Documents

Publication Publication Date Title
US5668945A (en) Data security apparatus and method
JP3074639B2 (en) Method and apparatus for validating system operation
TWI433033B (en) System and method for execution of a secured environment initialization instruction
JPH0388052A (en) Secrecy protection processing system
JPH06324858A (en) Software use amount managing system and storage medium with software used amount managing function
JPS63213027A (en) Software copy protection system
JPS63296136A (en) Method for confirming validity of program
JPH0235549A (en) Loading system for program
JPS61134836A (en) Limiting system for application of software
JPH1049493A (en) Computer system
Magruder High-level language computer viruses—a new threat?
JP2000339154A (en) Computer software illegal install detection system and its method
JP3706647B2 (en) Information processing apparatus and information processing method
JPH0449423A (en) Method for preventing software from being illegally copied
JPH08147159A (en) Information processor
JPH06176209A (en) Program writer for ic card
JPH0317760A (en) Data write confirming system
JPS63276125A (en) System for detecting propriety of registered program
JPH07253931A (en) Destruction prevention system for program data storage area
JP2001034539A (en) Floppy disk, system and method for illegal use prevention, and medium
JP2776370B2 (en) Illegal command input prevention method
JPS62242237A (en) Preventing method for unauthorized use of program
JPS63300322A (en) System for preventing illegal use of paid program
JPS62290956A (en) Protection system for on-line entry system
JPH10187433A (en) Electronic equipment and storage medium