KR970002625A - How to lock a program to prevent illegal copying of applications - Google Patents
How to lock a program to prevent illegal copying of applications Download PDFInfo
- Publication number
- KR970002625A KR970002625A KR1019950015912A KR19950015912A KR970002625A KR 970002625 A KR970002625 A KR 970002625A KR 1019950015912 A KR1019950015912 A KR 1019950015912A KR 19950015912 A KR19950015912 A KR 19950015912A KR 970002625 A KR970002625 A KR 970002625A
- Authority
- KR
- South Korea
- Prior art keywords
- program
- backup memory
- illegal copying
- authorized
- function
- Prior art date
Links
Abstract
본 발명은 응용 프로그램의 불법 복사 방지를 위한 잠금 방법에 관한 것으로서, 운영체제에서 백업 메모리에 저장되어 있는 시스템 고유의 아이디(ID)를 읽어 오는 기능과 패스워드를 검사하여 허가된 사용자 만이 시스템 ID를 백업 메모리에 쓸 수 있는 기능을 제공하는 시스템 호출을 만드는 제1과정; 사용자가 시스템 ID를 읽거나 쓸 수 있도록 하는 명령어를 만드는 제2과정; 백업 메모리에 시스템 ID를 저장하는 제3과정; 및 허가된 시스템 ID를 가진 시스템 상의 프로그램만 수행되도록 하는 제4과정을 포함함을 특징으로 하는 이루어진다.The present invention relates to a lock method for preventing illegal copying of an application program, wherein an authorized user checks a password and a function of reading a system-specific ID stored in a backup memory in an operating system, and only an authorized user backs up the system ID. Making a system call providing a function that can write to the system; Creating a command to allow a user to read or write a system ID; Storing a system ID in a backup memory; And a fourth step of performing only a program on a system having an authorized system ID.
본 발명은 응용 프로그램 내에서 기 작성된 시스템 호출을 사용하여 허가된 시스템이지를 체크하여 프로그램의 실행 여부를 결정하여 유닉스 내에서 불법 복사를 방지함으로써 응용 프로그램에서 별도의 잠금 기능의 구현없이도 손쉽게 불법 복사를 방지할 수 있게 된다.The present invention checks whether an authorized system is executed by using a system call made in an application program and determines whether to execute the program, thereby preventing illegal copying in Unix, thereby making it easy to copy illegally without implementing a separate locking function in the application program. It becomes possible to prevent it.
Description
본 내용은 요부공개 건이므로 전문내용을 수록하지 않았음Since this is an open matter, no full text was included.
제1도는 프로그램 잠금 기능 제공을 위한 시스템 호출 getstssid(buf)의 흐름도, 제2도는 프로그램 잠금 기능 제공을 위한 시스템 호출 setsysid(buf, passwd)의 흐름도, 제3도는 프로그램 잠금 기능 제공을 위한 명령어 sysid 흐름도.1 is a flowchart of a system call getstssid (buf) for providing a program lock function, FIG. 2 is a flowchart of a system call setsysid (buf, passwd) for providing a program lock function, and FIG. 3 is a flowchart of a sysid command for providing a program lock function. .
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1019950015912A KR970002625A (en) | 1995-06-15 | 1995-06-15 | How to lock a program to prevent illegal copying of applications |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1019950015912A KR970002625A (en) | 1995-06-15 | 1995-06-15 | How to lock a program to prevent illegal copying of applications |
Publications (1)
Publication Number | Publication Date |
---|---|
KR970002625A true KR970002625A (en) | 1997-01-28 |
Family
ID=66524057
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1019950015912A KR970002625A (en) | 1995-06-15 | 1995-06-15 | How to lock a program to prevent illegal copying of applications |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR970002625A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20000061393A (en) * | 1999-03-25 | 2000-10-16 | 정원호 | Preventing method for illegal copying of software |
KR100304191B1 (en) * | 1998-06-10 | 2001-11-22 | 윤종용 | Method of controlling operations of a computer system with learning function |
KR100344977B1 (en) * | 1999-11-22 | 2002-07-20 | 엘지정보통신주식회사 | Method for controlling a system call, and for changing kernel dynamically in an UNIX operating system |
KR100348027B1 (en) * | 2000-06-28 | 2002-08-07 | 류종렬 | Modification prevention system of program cooperated with operating system and compiler and method thereof |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS63129421A (en) * | 1986-11-19 | 1988-06-01 | Matsushita Graphic Commun Syst Inc | Software protecting method |
JPH01263724A (en) * | 1988-04-13 | 1989-10-20 | Nec Eng Ltd | Method for preventing unauthorized use of software |
KR100200443B1 (en) * | 1994-04-25 | 1999-06-15 | 포만 제프리 엘 | Method of distribution software object |
-
1995
- 1995-06-15 KR KR1019950015912A patent/KR970002625A/en not_active Application Discontinuation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS63129421A (en) * | 1986-11-19 | 1988-06-01 | Matsushita Graphic Commun Syst Inc | Software protecting method |
JPH01263724A (en) * | 1988-04-13 | 1989-10-20 | Nec Eng Ltd | Method for preventing unauthorized use of software |
KR100200443B1 (en) * | 1994-04-25 | 1999-06-15 | 포만 제프리 엘 | Method of distribution software object |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100304191B1 (en) * | 1998-06-10 | 2001-11-22 | 윤종용 | Method of controlling operations of a computer system with learning function |
KR20000061393A (en) * | 1999-03-25 | 2000-10-16 | 정원호 | Preventing method for illegal copying of software |
KR100344977B1 (en) * | 1999-11-22 | 2002-07-20 | 엘지정보통신주식회사 | Method for controlling a system call, and for changing kernel dynamically in an UNIX operating system |
KR100348027B1 (en) * | 2000-06-28 | 2002-08-07 | 류종렬 | Modification prevention system of program cooperated with operating system and compiler and method thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5289540A (en) | Computer file protection system | |
Karger | Limiting the damage potential of discretionary Trojan horses | |
US6266773B1 (en) | Computer security system | |
KR100486639B1 (en) | Method to use secure passwords in an unsecure program environment | |
US20040093506A1 (en) | Bubble-protected system for automatic decryption of file data on a per-use basis and automatic re-encryption | |
GB2303721A (en) | Safeguarding hard drive data | |
KR970012154A (en) | Personal computer with security device, security method thereof and installation and removal method of the security device | |
Ritchie | ‘On the Security of UNIX | |
KR980010772A (en) | How to prevent copying of computer software | |
KR100343069B1 (en) | Mandatory Object Access Control Method Using Multi-Level Security, and Computer Readable Recording Medium Having thereon Programmed Mandatory Object Access Control Method Using Multi-Level Security | |
KR960004734B1 (en) | Information protection method and information memory media | |
KR970002625A (en) | How to lock a program to prevent illegal copying of applications | |
JPH02181846A (en) | File protecting method | |
GB2230881A (en) | Data storage protection | |
Bishop | Race conditions, files, and security flaws; or the tortoise and the hare redux | |
RU2134931C1 (en) | Method of obtaining access to objects in operating system | |
KR940009706B1 (en) | Security apparatus protecting program copying and file transferring | |
JPH10187434A (en) | Security keeping system | |
CN112434285B (en) | File management method, device, electronic equipment and storage medium | |
JPS63279341A (en) | Memory integrated circuit | |
Clark et al. | Execution Policies Research and Implementation | |
Keedy et al. | Security and Protection in Timor Programs. | |
JPH0344750A (en) | Message file protection system | |
Wang | Local Privilege Elevation Using File Permissions | |
JPH01258052A (en) | Method for protecting file |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application |