KR970002625A - How to lock a program to prevent illegal copying of applications - Google Patents

How to lock a program to prevent illegal copying of applications Download PDF

Info

Publication number
KR970002625A
KR970002625A KR1019950015912A KR19950015912A KR970002625A KR 970002625 A KR970002625 A KR 970002625A KR 1019950015912 A KR1019950015912 A KR 1019950015912A KR 19950015912 A KR19950015912 A KR 19950015912A KR 970002625 A KR970002625 A KR 970002625A
Authority
KR
South Korea
Prior art keywords
program
backup memory
illegal copying
authorized
function
Prior art date
Application number
KR1019950015912A
Other languages
Korean (ko)
Inventor
안승진
Original Assignee
김광호
삼선전자 주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 김광호, 삼선전자 주식회사 filed Critical 김광호
Priority to KR1019950015912A priority Critical patent/KR970002625A/en
Publication of KR970002625A publication Critical patent/KR970002625A/en

Links

Abstract

본 발명은 응용 프로그램의 불법 복사 방지를 위한 잠금 방법에 관한 것으로서, 운영체제에서 백업 메모리에 저장되어 있는 시스템 고유의 아이디(ID)를 읽어 오는 기능과 패스워드를 검사하여 허가된 사용자 만이 시스템 ID를 백업 메모리에 쓸 수 있는 기능을 제공하는 시스템 호출을 만드는 제1과정; 사용자가 시스템 ID를 읽거나 쓸 수 있도록 하는 명령어를 만드는 제2과정; 백업 메모리에 시스템 ID를 저장하는 제3과정; 및 허가된 시스템 ID를 가진 시스템 상의 프로그램만 수행되도록 하는 제4과정을 포함함을 특징으로 하는 이루어진다.The present invention relates to a lock method for preventing illegal copying of an application program, wherein an authorized user checks a password and a function of reading a system-specific ID stored in a backup memory in an operating system, and only an authorized user backs up the system ID. Making a system call providing a function that can write to the system; Creating a command to allow a user to read or write a system ID; Storing a system ID in a backup memory; And a fourth step of performing only a program on a system having an authorized system ID.

본 발명은 응용 프로그램 내에서 기 작성된 시스템 호출을 사용하여 허가된 시스템이지를 체크하여 프로그램의 실행 여부를 결정하여 유닉스 내에서 불법 복사를 방지함으로써 응용 프로그램에서 별도의 잠금 기능의 구현없이도 손쉽게 불법 복사를 방지할 수 있게 된다.The present invention checks whether an authorized system is executed by using a system call made in an application program and determines whether to execute the program, thereby preventing illegal copying in Unix, thereby making it easy to copy illegally without implementing a separate locking function in the application program. It becomes possible to prevent it.

Description

응용 프로그램의 불법 복사 방지를 위한 프로그램 잠금 방법How to lock a program to prevent illegal copying of applications

본 내용은 요부공개 건이므로 전문내용을 수록하지 않았음Since this is an open matter, no full text was included.

제1도는 프로그램 잠금 기능 제공을 위한 시스템 호출 getstssid(buf)의 흐름도, 제2도는 프로그램 잠금 기능 제공을 위한 시스템 호출 setsysid(buf, passwd)의 흐름도, 제3도는 프로그램 잠금 기능 제공을 위한 명령어 sysid 흐름도.1 is a flowchart of a system call getstssid (buf) for providing a program lock function, FIG. 2 is a flowchart of a system call setsysid (buf, passwd) for providing a program lock function, and FIG. 3 is a flowchart of a sysid command for providing a program lock function. .

Claims (1)

유닉스를 운영체제로 사용하는 컴퓨터 시스템에서 응용 프로그램의 불법 복사 방지를 위한 프로그램 잠금 방법에 있어서, 운영체제에서 백업 메모리에 저장되어 있는 시스템 고유의 아이디(ID)를 읽어 오는 기능과 패스워드를 검사하여 허가된 사용자 만이 시스템 ID를 백업 메모리에 쓸 수 있는 기능을 제공하는 시스템 호출(sustem call)을 만드는 제1과정; 상기 과정에서 제공하는 시스템 호출을 사용하여 사용자가 시스템 ID를 읽거나 쓸 수 있도록 하는 명령어를 만드는 제2과정; 컴퓨터 시스템에 고유의 시스템 ID를 부여하여 백업 메모리에 저장하는 제3과정; 및 보호를 받고자 하는 프로그램에서 상기 제1과정의 백업 메모리에 저장되어 있는 시스템고유의 ID를 읽어 오는 기능을 하는 시스템 호출을 사용하여, 컴퓨터 시스템이 백업 메모리에서 시스템 ID를읽어서 허가된 시스템 ID를 가진 시스템만이 프로그램이 수행 가능하도록 하는 제4과정을 포함함을 특징으로 하여 이루어지는 유닉스를 운영체제로 사용하는 컴퓨터 시스템에서 응용 프로그램의 불법 복사 방지를 위한프로그램 잠금 방법.A program lock method for preventing illegal copying of an application program on a computer system using Unix as an operating system, wherein the user is authorized by checking a password and a function of reading a system-specific ID stored in a backup memory. A first step of making a system call providing a function of only writing the system ID to the backup memory; A second step of making a command for allowing a user to read or write a system ID by using the system call provided in the step; Giving a unique system ID to the computer system and storing it in a backup memory; And by using a system call function that reads a system-specific ID stored in the backup memory of the first step in a program to be protected, the computer system reads the system ID from the backup memory and has a system ID authorized. A method for locking a program for preventing illegal copying of an application in a computer system using Unix as an operating system, wherein the system includes a fourth step of allowing only a program to be executed. ※ 참고사항 : 최초출원 내용에 의하여 공개하는 것임.※ Note: The disclosure is based on the initial application.
KR1019950015912A 1995-06-15 1995-06-15 How to lock a program to prevent illegal copying of applications KR970002625A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1019950015912A KR970002625A (en) 1995-06-15 1995-06-15 How to lock a program to prevent illegal copying of applications

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1019950015912A KR970002625A (en) 1995-06-15 1995-06-15 How to lock a program to prevent illegal copying of applications

Publications (1)

Publication Number Publication Date
KR970002625A true KR970002625A (en) 1997-01-28

Family

ID=66524057

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1019950015912A KR970002625A (en) 1995-06-15 1995-06-15 How to lock a program to prevent illegal copying of applications

Country Status (1)

Country Link
KR (1) KR970002625A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20000061393A (en) * 1999-03-25 2000-10-16 정원호 Preventing method for illegal copying of software
KR100304191B1 (en) * 1998-06-10 2001-11-22 윤종용 Method of controlling operations of a computer system with learning function
KR100344977B1 (en) * 1999-11-22 2002-07-20 엘지정보통신주식회사 Method for controlling a system call, and for changing kernel dynamically in an UNIX operating system
KR100348027B1 (en) * 2000-06-28 2002-08-07 류종렬 Modification prevention system of program cooperated with operating system and compiler and method thereof

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS63129421A (en) * 1986-11-19 1988-06-01 Matsushita Graphic Commun Syst Inc Software protecting method
JPH01263724A (en) * 1988-04-13 1989-10-20 Nec Eng Ltd Method for preventing unauthorized use of software
KR100200443B1 (en) * 1994-04-25 1999-06-15 포만 제프리 엘 Method of distribution software object

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS63129421A (en) * 1986-11-19 1988-06-01 Matsushita Graphic Commun Syst Inc Software protecting method
JPH01263724A (en) * 1988-04-13 1989-10-20 Nec Eng Ltd Method for preventing unauthorized use of software
KR100200443B1 (en) * 1994-04-25 1999-06-15 포만 제프리 엘 Method of distribution software object

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100304191B1 (en) * 1998-06-10 2001-11-22 윤종용 Method of controlling operations of a computer system with learning function
KR20000061393A (en) * 1999-03-25 2000-10-16 정원호 Preventing method for illegal copying of software
KR100344977B1 (en) * 1999-11-22 2002-07-20 엘지정보통신주식회사 Method for controlling a system call, and for changing kernel dynamically in an UNIX operating system
KR100348027B1 (en) * 2000-06-28 2002-08-07 류종렬 Modification prevention system of program cooperated with operating system and compiler and method thereof

Similar Documents

Publication Publication Date Title
US5289540A (en) Computer file protection system
Karger Limiting the damage potential of discretionary Trojan horses
US6266773B1 (en) Computer security system
KR100486639B1 (en) Method to use secure passwords in an unsecure program environment
US20040093506A1 (en) Bubble-protected system for automatic decryption of file data on a per-use basis and automatic re-encryption
GB2303721A (en) Safeguarding hard drive data
KR970012154A (en) Personal computer with security device, security method thereof and installation and removal method of the security device
Ritchie ‘On the Security of UNIX
KR980010772A (en) How to prevent copying of computer software
KR100343069B1 (en) Mandatory Object Access Control Method Using Multi-Level Security, and Computer Readable Recording Medium Having thereon Programmed Mandatory Object Access Control Method Using Multi-Level Security
KR960004734B1 (en) Information protection method and information memory media
KR970002625A (en) How to lock a program to prevent illegal copying of applications
JPH02181846A (en) File protecting method
GB2230881A (en) Data storage protection
Bishop Race conditions, files, and security flaws; or the tortoise and the hare redux
RU2134931C1 (en) Method of obtaining access to objects in operating system
KR940009706B1 (en) Security apparatus protecting program copying and file transferring
JPH10187434A (en) Security keeping system
CN112434285B (en) File management method, device, electronic equipment and storage medium
JPS63279341A (en) Memory integrated circuit
Clark et al. Execution Policies Research and Implementation
Keedy et al. Security and Protection in Timor Programs.
JPH0344750A (en) Message file protection system
Wang Local Privilege Elevation Using File Permissions
JPH01258052A (en) Method for protecting file

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E601 Decision to refuse application