WO1985002696A1 - Computer system - Google Patents
Computer system Download PDFInfo
- Publication number
- WO1985002696A1 WO1985002696A1 PCT/GB1984/000419 GB8400419W WO8502696A1 WO 1985002696 A1 WO1985002696 A1 WO 1985002696A1 GB 8400419 W GB8400419 W GB 8400419W WO 8502696 A1 WO8502696 A1 WO 8502696A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- computer
- data
- program
- security
- card
- Prior art date
Links
- 238000004590 computer program Methods 0.000 claims abstract description 16
- 230000002401 inhibitory effect Effects 0.000 claims abstract description 5
- 108010080511 serum sodium transport inhibitor Proteins 0.000 claims 1
- KKEBXNMGHUCPEZ-UHFFFAOYSA-N 4-phenyl-1-(2-sulfanylethyl)imidazolidin-2-one Chemical compound N1C(=O)N(CCS)CC1C1=CC=CC=C1 KKEBXNMGHUCPEZ-UHFFFAOYSA-N 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
Definitions
- This invention relates to computer systems. At the present time it is very easy to copy computer programs without authority and to use the unauthorised copy in a computer. This is undesirable and it is therefore an object of the present invention to obviate or mitigate this disadvantage.
- a computer system characterised by the combination of a computer program recorded on a machine-readable medium, a computer, means for loading said program into said computer, a card reader coupled to said computer, and a pre-programmed security card capable of being loaded into said card reader, wherein said computer program comprises program data for operating said computer and security data for inhibiting unauthorised use of the computer program in said computer, said security data being formed by interrogation data for interrogating the card reader via -the computer, identification data for effecting a comparison with the pre-programmed security card data, and disablement data for inhibiting further operation of the computer program in the computer in the absence of concurrence in said comparison.
- each program may be recorded on magnetic tape or disc and the program distributor issues with each program an appropriate security card so that when the program is in use in a computer the computer will only run in the presence of the .security card which is correct for the particular program.
- the security card may conveniently be in the form of a plastic carrier with read-only pre-programmed magnetic strips, generally similar to cards conventionally used nowadays for banking and cheque encashment purposes, or alternatively may take the form of a plastic carrier incorporating a signal processing chip with pre-programmed memory.
- the security data interrupt the program data to interrogate the security card and compare some or all of the pre-programmed data therein with the identification data within the program. If the returned data message does not agree with that of the identification data the disablement data inhibits further operation of the computer so that the computer program does not run any further and effectively is worthless to the user. If the returned data message does agree with the identification data the disablement data is inhibited from operating and the computer program continues to run.
- the reader for the security card may be used to read more than one security card at any one time where more than one program is used concurrently in the computer (e.g. operating systems software, application software, compiler software, interpreter software) .
- the reader may be of the type which reads a security card statically, or dynamically during insertion of the security card, and conveniently is attached to the serial printer or TTY port of the computer.
- the identification data and preferably the entire security data, is encrypted in such a way as to make it difficult to decode.
- the security data is in the form of disguised calls to a program data routine.
- Fig. 1 illustrates the computer system in block format
- Fig. 2 illustrates a detail of the Fig. 1 system
- Fig. 3 illustrates the organisation of the software used in the Fig. 1 system.
- a computer system 10 comprises a magnetic disc 11 on which is recorded a computer program, the disc 11 being removably mounted in a disc-reading device 12 coupled to a computer 13 by way of a data trans- mission path 14.
- a card reader 15 Connected to computer 13 by way of its serial printer port is a card reader 15 releasably containing a security card 16 having pre-recorded or
- Fig. 2 illustrates card reader 15 in greater detail in order to illustrate its preferred ability to house concurrently several cards 16 respectively associated with several programs which may operate concurrently within computer 13 having been sequentially loaded therein from a pertaining disc 11 by way of the device 12.
- Fig. 3 schematically illustrates the organisation of the security data software provided by a single program on a disc 11.
- the computer 13 is in its RUN mode whereby the program of disc 11 is rendered operational (or at least quasi-operational by virtue of the present invention) there intermittently occurs during the program data the security data which initiates, via computer 13, the sequence of events denoted by blocks 20 to 30.
- block 20 arranges interrogation of card reader 15 to determine the presence or absence of a specifically identified card 16 as indicated by blocks 21, 22.
- a password identified in block 20 is applied to the card 16 to determine whether or not that password is meaningful as indicated by block 23.
- a card response indicated by block 24 is established which is checked comparatively by computer 13 with the identification data of the program as denoted by block 25.
- the computer 13 is signalled to permit the program to continue running, as indicated by block 27.
- a 'NO* signal is returned to the computer 13 as indicated by block 28 which results in the computer 13 displaying a standard shut-down message on its VDU as denoted by block 29 the program is rejected, that is inhibited from further operation within the computer "13 as indicated by block 30.
Abstract
A computer system (10) comprises a computer (13) associated with a disc reader (12) for loading a program recorded on magnetic disc (11) into the computer (13). A pre-programmed security card (16) is loaded into a card reader (15) which is coupled to the computer (13) and the program encoded on disc (11) is formed by program data for operating the computer (13) and security data for inhibiting unauthorised use of the computer program in the computer (13). The security data is formed by interrogation data arranged to interrogate the card reader (15) via the computer (13), identification data for effecting a comparison with the pre-programmed security card data and disablement data for inhibiting further operation of the computer program in the computer (13) in the absence of concurrence in the comparison.
Description
COMPUTER SYSTEM
This invention relates to computer systems. At the present time it is very easy to copy computer programs without authority and to use the unauthorised copy in a computer. This is undesirable and it is therefore an object of the present invention to obviate or mitigate this disadvantage.
According to the present invention there is provided a computer system characterised by the combination of a computer program recorded on a machine-readable medium, a computer, means for loading said program into said computer, a card reader coupled to said computer, and a pre-programmed security card capable of being loaded into said card reader, wherein said computer program comprises program data for operating said computer and security data for inhibiting unauthorised use of the computer program in said computer, said security data being formed by interrogation data for interrogating the card reader via -the computer, identification data for effecting a comparison with the pre-programmed security card data, and disablement data for inhibiting further operation of the computer program in the computer in the absence of concurrence in said comparison.
It will be understood that in accordance with the present invention each program may be recorded on magnetic tape or disc and the program distributor issues with each program an appropriate security card so that when the program is in use in a computer the computer will only run in the presence of the .security card which is correct for the particular program.
The security card may conveniently be in the form of a plastic carrier with read-only pre-programmed magnetic strips, generally similar to cards conventionally used nowadays for banking and cheque encashment purposes, or alternatively may take the form of a plastic carrier incorporating a signal processing chip with pre-programmed memory.
When the computer is operating in accordance with the program data of the computer program, and at intervals while the software is running, the security data interrupt the program data to interrogate the security card and compare some or all of the pre-programmed data therein with the identification data within the program. If the returned data message does not agree with that of the identification data the disablement data inhibits further operation of the computer so that the computer program does not run any further and effectively is worthless to the user. If the returned data message does agree with the identification data the disablement data is inhibited from operating and the computer program continues to run.
With the system of the present invention as many copies of the computer program may be made as the user desires but because only one security card exists (being associated with the originally distributed program) only one of the copies can be used at a time. If multiple machine operation is required multiple security cards are required and can be purchased from the program distributor In this connection it will be appreciated that unauthorise copying of the security card whilst not entirely impossibl is very substantially more complicated than unauthorised copying of a program recorded on magnetic tape or disc
and is well beyond the abilities of the average program user.
It will be understood that the reader for the security card may be used to read more than one security card at any one time where more than one program is used concurrently in the computer (e.g. operating systems software, application software, compiler software, interpreter software) . The reader may be of the type which reads a security card statically, or dynamically during insertion of the security card, and conveniently is attached to the serial printer or TTY port of the computer.
It will also be understood that the identification data, and preferably the entire security data, is encrypted in such a way as to make it difficult to decode. Preferably also the security data is in the form of disguised calls to a program data routine.
An embodiment of the present invention will now be described by way of example with reference to the accompanying drawings, in which:
Fig. 1 illustrates the computer system in block format;
Fig. 2 illustrates a detail of the Fig. 1 system; and Fig. 3 illustrates the organisation of the software used in the Fig. 1 system.
As is shown in Fig. 1 a computer system 10 comprises a magnetic disc 11 on which is recorded a computer program, the disc 11 being removably mounted in a disc-reading device 12 coupled to a computer 13 by way of a data trans- mission path 14. Connected to computer 13 by way of its serial printer port is a card reader 15 releasably containing a security card 16 having pre-recorded or
"BUREAU
OMPI WIPO *J
programmed data thereon.
Fig. 2 illustrates card reader 15 in greater detail in order to illustrate its preferred ability to house concurrently several cards 16 respectively associated with several programs which may operate concurrently within computer 13 having been sequentially loaded therein from a pertaining disc 11 by way of the device 12.
Fig. 3 schematically illustrates the organisation of the security data software provided by a single program on a disc 11. Thus, when the computer 13 is in its RUN mode whereby the program of disc 11 is rendered operational (or at least quasi-operational by virtue of the present invention) there intermittently occurs during the program data the security data which initiates, via computer 13, the sequence of events denoted by blocks 20 to 30.
Accordingly block 20 arranges interrogation of card reader 15 to determine the presence or absence of a specifically identified card 16 as indicated by blocks 21, 22. In the event of the required card 16 being present a password identified in block 20 is applied to the card 16 to determine whether or not that password is meaningful as indicated by block 23. In the event that the password is meaningful a card response, indicated by block 24 is established which is checked comparatively by computer 13 with the identification data of the program as denoted by block 25. In the event of concurrence in the comparison as denoted by block 26 the computer 13 is signalled to permit the program to continue running, as indicated by block 27. In any case where a negative response is achieved a 'NO* signal is returned to the computer 13 as indicated by block 28 which results in the computer 13 displaying a standard shut-down message on its VDU as denoted by block 29 the program is rejected, that is inhibited from further operation within the computer "13 as indicated by block 30.
Claims
1. A computer system characterised by the combination of a computer program recorded on a machine-readable medium (11) , a computer (13) , means (12) for loading said program into said computer (13), a card reader (15) coupled to said computer (13) , and a pre-programmed security card (16) capable of being loaded into said card reader (15) , wherein said computer program comprises program data for operating said computer (13) and security data for inhibitin unauthorised use of the computer program in said computer (13), said security data being formed by interrogation data for interrogating the card reader (15) via the computer (13) , identification data for effecting a comparison with the pre-programmed security card data, and disablement data for inhibiting further operation of the computer program in the computer (13) in the absence of concurrence in said σomparison.
2. A computer system as claimed in claim 1, characterised in that the security card (16) is in the form of a plastic carrier with read-only pre-programmed magnetic strips.
3. A computer system as claimed in claim 1, characterised in that the security card (16) is in the form of a plastic carrier incorporating a single processing chip with pre¬ programmed memory.
4. A computer system as claimed in claim 1 and substantially as hereinbefore described with reference to the accompanying drawings.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB8332532 | 1983-12-06 | ||
GB8332532 | 1983-12-06 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1985002696A1 true WO1985002696A1 (en) | 1985-06-20 |
Family
ID=10552902
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB1984/000419 WO1985002696A1 (en) | 1983-12-06 | 1984-12-06 | Computer system |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP0163715A1 (en) |
WO (1) | WO1985002696A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4794470A (en) * | 1986-06-25 | 1988-12-27 | Media Security Incorporated And Associates | Security system for protecting information |
FR2622319A1 (en) * | 1987-10-27 | 1989-04-28 | Guerri Jean | Software medium with protection against copying and device for using software with protection against copying |
FR2647937A2 (en) * | 1988-11-30 | 1990-12-07 | Vernois Goulven | IMPROVED DISKETTE INCORPORATING INTEGRATED CIRCUITS AND CONNECTORS, OR ARRANGEMENT FOR RECEIVING INTEGRATED CIRCUITS AND CONNECTORS, AND CONNECTION DEVICES WITH A COMPUTER |
DE4239865A1 (en) * | 1992-11-27 | 1994-06-01 | Heinz Johann | Unauthorised program use prevention method - inserting installation chip card data carrier into test appts. before starting, interrogating card to check program addresses, and interrupting program with incorrect answer |
WO1995026028A1 (en) * | 1994-03-23 | 1995-09-28 | Gms (Recordings) Limited | Interactive compact disc system |
WO1995032479A1 (en) * | 1994-05-25 | 1995-11-30 | Vincent Lorphelin | Protected software rental using smart cards |
GB2320597A (en) * | 1997-10-08 | 1998-06-24 | Powerdesk Plc | Card-controlled personal computer |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3806882A (en) * | 1971-11-22 | 1974-04-23 | A Clarke | Security for computer systems |
US3996449A (en) * | 1975-08-25 | 1976-12-07 | International Business Machines Corporation | Operating system authenticator |
EP0089876A1 (en) * | 1982-03-18 | 1983-09-28 | Bull S.A. | Method and device for the protection of software delivered by a supplyer to a user |
-
1984
- 1984-12-06 EP EP19850900149 patent/EP0163715A1/en not_active Withdrawn
- 1984-12-06 WO PCT/GB1984/000419 patent/WO1985002696A1/en unknown
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3806882A (en) * | 1971-11-22 | 1974-04-23 | A Clarke | Security for computer systems |
US3996449A (en) * | 1975-08-25 | 1976-12-07 | International Business Machines Corporation | Operating system authenticator |
EP0089876A1 (en) * | 1982-03-18 | 1983-09-28 | Bull S.A. | Method and device for the protection of software delivered by a supplyer to a user |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4794470A (en) * | 1986-06-25 | 1988-12-27 | Media Security Incorporated And Associates | Security system for protecting information |
FR2622319A1 (en) * | 1987-10-27 | 1989-04-28 | Guerri Jean | Software medium with protection against copying and device for using software with protection against copying |
FR2647937A2 (en) * | 1988-11-30 | 1990-12-07 | Vernois Goulven | IMPROVED DISKETTE INCORPORATING INTEGRATED CIRCUITS AND CONNECTORS, OR ARRANGEMENT FOR RECEIVING INTEGRATED CIRCUITS AND CONNECTORS, AND CONNECTION DEVICES WITH A COMPUTER |
DE4239865A1 (en) * | 1992-11-27 | 1994-06-01 | Heinz Johann | Unauthorised program use prevention method - inserting installation chip card data carrier into test appts. before starting, interrogating card to check program addresses, and interrupting program with incorrect answer |
WO1995026028A1 (en) * | 1994-03-23 | 1995-09-28 | Gms (Recordings) Limited | Interactive compact disc system |
WO1995032479A1 (en) * | 1994-05-25 | 1995-11-30 | Vincent Lorphelin | Protected software rental using smart cards |
US5870726A (en) * | 1994-05-25 | 1999-02-09 | Lorphelin; Vincent | Protected software rental using smart cards |
GB2320597A (en) * | 1997-10-08 | 1998-06-24 | Powerdesk Plc | Card-controlled personal computer |
Also Published As
Publication number | Publication date |
---|---|
EP0163715A1 (en) | 1985-12-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US4462078A (en) | Computer program protection method | |
US5452431A (en) | Microcircuit for a chip card comprising a protected programmable memory | |
US5379433A (en) | Protection against unauthorized use of software recorded on recording medium | |
US4446519A (en) | Method and apparatus for providing security for computer software | |
US4646234A (en) | Anti-piracy system using separate storage and alternate execution of selected proprietary and public portions of computer programs | |
JP3243331B2 (en) | Method for creating layered medium for software management, apparatus for creating layered medium for software management, and layered medium for software management | |
EP0265183A2 (en) | Billing system for computer software | |
JPS623459B2 (en) | ||
WO1985002696A1 (en) | Computer system | |
JPS5992500A (en) | Protection system for data processor | |
EP0470163A1 (en) | Improved security for machine-writeable data storage systems | |
JP2007140961A (en) | Device for preventing usage of fraudulent copied file, and its program | |
JPS61105657A (en) | Processor and use thereof | |
GB2145856A (en) | Copyright protection device | |
WO1994006071A1 (en) | A dongle | |
US5212602A (en) | Magnetic head having fuse within head case | |
JPS59123954A (en) | Prevention system for illegal use of stored data | |
JP2009524879A (en) | Combining protected application programs with shellcode | |
JPS60157787A (en) | Storage medium | |
IE914474A1 (en) | Security of stored data | |
JPS61226837A (en) | Free use preventing method for program | |
JPH0331949A (en) | Information processor | |
JP2733374B2 (en) | Memory module data concealment device | |
JPS6279526A (en) | Software protecting system | |
JPS6167161A (en) | System for inhibiting universal use of software |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Designated state(s): JP US |
|
AL | Designated countries for regional patents |
Designated state(s): AT BE CH DE FR GB LU NL SE |