WO1985002696A1 - Computer system - Google Patents

Computer system Download PDF

Info

Publication number
WO1985002696A1
WO1985002696A1 PCT/GB1984/000419 GB8400419W WO8502696A1 WO 1985002696 A1 WO1985002696 A1 WO 1985002696A1 GB 8400419 W GB8400419 W GB 8400419W WO 8502696 A1 WO8502696 A1 WO 8502696A1
Authority
WO
WIPO (PCT)
Prior art keywords
computer
data
program
security
card
Prior art date
Application number
PCT/GB1984/000419
Other languages
French (fr)
Inventor
Alexander Battison Gardiner
Original Assignee
Alexander Battison Gardiner
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alexander Battison Gardiner filed Critical Alexander Battison Gardiner
Publication of WO1985002696A1 publication Critical patent/WO1985002696A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress

Definitions

  • This invention relates to computer systems. At the present time it is very easy to copy computer programs without authority and to use the unauthorised copy in a computer. This is undesirable and it is therefore an object of the present invention to obviate or mitigate this disadvantage.
  • a computer system characterised by the combination of a computer program recorded on a machine-readable medium, a computer, means for loading said program into said computer, a card reader coupled to said computer, and a pre-programmed security card capable of being loaded into said card reader, wherein said computer program comprises program data for operating said computer and security data for inhibiting unauthorised use of the computer program in said computer, said security data being formed by interrogation data for interrogating the card reader via -the computer, identification data for effecting a comparison with the pre-programmed security card data, and disablement data for inhibiting further operation of the computer program in the computer in the absence of concurrence in said comparison.
  • each program may be recorded on magnetic tape or disc and the program distributor issues with each program an appropriate security card so that when the program is in use in a computer the computer will only run in the presence of the .security card which is correct for the particular program.
  • the security card may conveniently be in the form of a plastic carrier with read-only pre-programmed magnetic strips, generally similar to cards conventionally used nowadays for banking and cheque encashment purposes, or alternatively may take the form of a plastic carrier incorporating a signal processing chip with pre-programmed memory.
  • the security data interrupt the program data to interrogate the security card and compare some or all of the pre-programmed data therein with the identification data within the program. If the returned data message does not agree with that of the identification data the disablement data inhibits further operation of the computer so that the computer program does not run any further and effectively is worthless to the user. If the returned data message does agree with the identification data the disablement data is inhibited from operating and the computer program continues to run.
  • the reader for the security card may be used to read more than one security card at any one time where more than one program is used concurrently in the computer (e.g. operating systems software, application software, compiler software, interpreter software) .
  • the reader may be of the type which reads a security card statically, or dynamically during insertion of the security card, and conveniently is attached to the serial printer or TTY port of the computer.
  • the identification data and preferably the entire security data, is encrypted in such a way as to make it difficult to decode.
  • the security data is in the form of disguised calls to a program data routine.
  • Fig. 1 illustrates the computer system in block format
  • Fig. 2 illustrates a detail of the Fig. 1 system
  • Fig. 3 illustrates the organisation of the software used in the Fig. 1 system.
  • a computer system 10 comprises a magnetic disc 11 on which is recorded a computer program, the disc 11 being removably mounted in a disc-reading device 12 coupled to a computer 13 by way of a data trans- mission path 14.
  • a card reader 15 Connected to computer 13 by way of its serial printer port is a card reader 15 releasably containing a security card 16 having pre-recorded or
  • Fig. 2 illustrates card reader 15 in greater detail in order to illustrate its preferred ability to house concurrently several cards 16 respectively associated with several programs which may operate concurrently within computer 13 having been sequentially loaded therein from a pertaining disc 11 by way of the device 12.
  • Fig. 3 schematically illustrates the organisation of the security data software provided by a single program on a disc 11.
  • the computer 13 is in its RUN mode whereby the program of disc 11 is rendered operational (or at least quasi-operational by virtue of the present invention) there intermittently occurs during the program data the security data which initiates, via computer 13, the sequence of events denoted by blocks 20 to 30.
  • block 20 arranges interrogation of card reader 15 to determine the presence or absence of a specifically identified card 16 as indicated by blocks 21, 22.
  • a password identified in block 20 is applied to the card 16 to determine whether or not that password is meaningful as indicated by block 23.
  • a card response indicated by block 24 is established which is checked comparatively by computer 13 with the identification data of the program as denoted by block 25.
  • the computer 13 is signalled to permit the program to continue running, as indicated by block 27.
  • a 'NO* signal is returned to the computer 13 as indicated by block 28 which results in the computer 13 displaying a standard shut-down message on its VDU as denoted by block 29 the program is rejected, that is inhibited from further operation within the computer "13 as indicated by block 30.

Abstract

A computer system (10) comprises a computer (13) associated with a disc reader (12) for loading a program recorded on magnetic disc (11) into the computer (13). A pre-programmed security card (16) is loaded into a card reader (15) which is coupled to the computer (13) and the program encoded on disc (11) is formed by program data for operating the computer (13) and security data for inhibiting unauthorised use of the computer program in the computer (13). The security data is formed by interrogation data arranged to interrogate the card reader (15) via the computer (13), identification data for effecting a comparison with the pre-programmed security card data and disablement data for inhibiting further operation of the computer program in the computer (13) in the absence of concurrence in the comparison.

Description

COMPUTER SYSTEM
This invention relates to computer systems. At the present time it is very easy to copy computer programs without authority and to use the unauthorised copy in a computer. This is undesirable and it is therefore an object of the present invention to obviate or mitigate this disadvantage.
According to the present invention there is provided a computer system characterised by the combination of a computer program recorded on a machine-readable medium, a computer, means for loading said program into said computer, a card reader coupled to said computer, and a pre-programmed security card capable of being loaded into said card reader, wherein said computer program comprises program data for operating said computer and security data for inhibiting unauthorised use of the computer program in said computer, said security data being formed by interrogation data for interrogating the card reader via -the computer, identification data for effecting a comparison with the pre-programmed security card data, and disablement data for inhibiting further operation of the computer program in the computer in the absence of concurrence in said comparison.
It will be understood that in accordance with the present invention each program may be recorded on magnetic tape or disc and the program distributor issues with each program an appropriate security card so that when the program is in use in a computer the computer will only run in the presence of the .security card which is correct for the particular program. The security card may conveniently be in the form of a plastic carrier with read-only pre-programmed magnetic strips, generally similar to cards conventionally used nowadays for banking and cheque encashment purposes, or alternatively may take the form of a plastic carrier incorporating a signal processing chip with pre-programmed memory.
When the computer is operating in accordance with the program data of the computer program, and at intervals while the software is running, the security data interrupt the program data to interrogate the security card and compare some or all of the pre-programmed data therein with the identification data within the program. If the returned data message does not agree with that of the identification data the disablement data inhibits further operation of the computer so that the computer program does not run any further and effectively is worthless to the user. If the returned data message does agree with the identification data the disablement data is inhibited from operating and the computer program continues to run.
With the system of the present invention as many copies of the computer program may be made as the user desires but because only one security card exists (being associated with the originally distributed program) only one of the copies can be used at a time. If multiple machine operation is required multiple security cards are required and can be purchased from the program distributor In this connection it will be appreciated that unauthorise copying of the security card whilst not entirely impossibl is very substantially more complicated than unauthorised copying of a program recorded on magnetic tape or disc and is well beyond the abilities of the average program user.
It will be understood that the reader for the security card may be used to read more than one security card at any one time where more than one program is used concurrently in the computer (e.g. operating systems software, application software, compiler software, interpreter software) . The reader may be of the type which reads a security card statically, or dynamically during insertion of the security card, and conveniently is attached to the serial printer or TTY port of the computer.
It will also be understood that the identification data, and preferably the entire security data, is encrypted in such a way as to make it difficult to decode. Preferably also the security data is in the form of disguised calls to a program data routine.
An embodiment of the present invention will now be described by way of example with reference to the accompanying drawings, in which:
Fig. 1 illustrates the computer system in block format;
Fig. 2 illustrates a detail of the Fig. 1 system; and Fig. 3 illustrates the organisation of the software used in the Fig. 1 system.
As is shown in Fig. 1 a computer system 10 comprises a magnetic disc 11 on which is recorded a computer program, the disc 11 being removably mounted in a disc-reading device 12 coupled to a computer 13 by way of a data trans- mission path 14. Connected to computer 13 by way of its serial printer port is a card reader 15 releasably containing a security card 16 having pre-recorded or
"BUREAU
OMPI WIPO *J programmed data thereon.
Fig. 2 illustrates card reader 15 in greater detail in order to illustrate its preferred ability to house concurrently several cards 16 respectively associated with several programs which may operate concurrently within computer 13 having been sequentially loaded therein from a pertaining disc 11 by way of the device 12.
Fig. 3 schematically illustrates the organisation of the security data software provided by a single program on a disc 11. Thus, when the computer 13 is in its RUN mode whereby the program of disc 11 is rendered operational (or at least quasi-operational by virtue of the present invention) there intermittently occurs during the program data the security data which initiates, via computer 13, the sequence of events denoted by blocks 20 to 30.
Accordingly block 20 arranges interrogation of card reader 15 to determine the presence or absence of a specifically identified card 16 as indicated by blocks 21, 22. In the event of the required card 16 being present a password identified in block 20 is applied to the card 16 to determine whether or not that password is meaningful as indicated by block 23. In the event that the password is meaningful a card response, indicated by block 24 is established which is checked comparatively by computer 13 with the identification data of the program as denoted by block 25. In the event of concurrence in the comparison as denoted by block 26 the computer 13 is signalled to permit the program to continue running, as indicated by block 27. In any case where a negative response is achieved a 'NO* signal is returned to the computer 13 as indicated by block 28 which results in the computer 13 displaying a standard shut-down message on its VDU as denoted by block 29 the program is rejected, that is inhibited from further operation within the computer "13 as indicated by block 30.

Claims

1. A computer system characterised by the combination of a computer program recorded on a machine-readable medium (11) , a computer (13) , means (12) for loading said program into said computer (13), a card reader (15) coupled to said computer (13) , and a pre-programmed security card (16) capable of being loaded into said card reader (15) , wherein said computer program comprises program data for operating said computer (13) and security data for inhibitin unauthorised use of the computer program in said computer (13), said security data being formed by interrogation data for interrogating the card reader (15) via the computer (13) , identification data for effecting a comparison with the pre-programmed security card data, and disablement data for inhibiting further operation of the computer program in the computer (13) in the absence of concurrence in said σomparison.
2. A computer system as claimed in claim 1, characterised in that the security card (16) is in the form of a plastic carrier with read-only pre-programmed magnetic strips.
3. A computer system as claimed in claim 1, characterised in that the security card (16) is in the form of a plastic carrier incorporating a single processing chip with pre¬ programmed memory.
4. A computer system as claimed in claim 1 and substantially as hereinbefore described with reference to the accompanying drawings.
PCT/GB1984/000419 1983-12-06 1984-12-06 Computer system WO1985002696A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB8332532 1983-12-06
GB8332532 1983-12-06

Publications (1)

Publication Number Publication Date
WO1985002696A1 true WO1985002696A1 (en) 1985-06-20

Family

ID=10552902

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1984/000419 WO1985002696A1 (en) 1983-12-06 1984-12-06 Computer system

Country Status (2)

Country Link
EP (1) EP0163715A1 (en)
WO (1) WO1985002696A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4794470A (en) * 1986-06-25 1988-12-27 Media Security Incorporated And Associates Security system for protecting information
FR2622319A1 (en) * 1987-10-27 1989-04-28 Guerri Jean Software medium with protection against copying and device for using software with protection against copying
FR2647937A2 (en) * 1988-11-30 1990-12-07 Vernois Goulven IMPROVED DISKETTE INCORPORATING INTEGRATED CIRCUITS AND CONNECTORS, OR ARRANGEMENT FOR RECEIVING INTEGRATED CIRCUITS AND CONNECTORS, AND CONNECTION DEVICES WITH A COMPUTER
DE4239865A1 (en) * 1992-11-27 1994-06-01 Heinz Johann Unauthorised program use prevention method - inserting installation chip card data carrier into test appts. before starting, interrogating card to check program addresses, and interrupting program with incorrect answer
WO1995026028A1 (en) * 1994-03-23 1995-09-28 Gms (Recordings) Limited Interactive compact disc system
WO1995032479A1 (en) * 1994-05-25 1995-11-30 Vincent Lorphelin Protected software rental using smart cards
GB2320597A (en) * 1997-10-08 1998-06-24 Powerdesk Plc Card-controlled personal computer

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3806882A (en) * 1971-11-22 1974-04-23 A Clarke Security for computer systems
US3996449A (en) * 1975-08-25 1976-12-07 International Business Machines Corporation Operating system authenticator
EP0089876A1 (en) * 1982-03-18 1983-09-28 Bull S.A. Method and device for the protection of software delivered by a supplyer to a user

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3806882A (en) * 1971-11-22 1974-04-23 A Clarke Security for computer systems
US3996449A (en) * 1975-08-25 1976-12-07 International Business Machines Corporation Operating system authenticator
EP0089876A1 (en) * 1982-03-18 1983-09-28 Bull S.A. Method and device for the protection of software delivered by a supplyer to a user

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4794470A (en) * 1986-06-25 1988-12-27 Media Security Incorporated And Associates Security system for protecting information
FR2622319A1 (en) * 1987-10-27 1989-04-28 Guerri Jean Software medium with protection against copying and device for using software with protection against copying
FR2647937A2 (en) * 1988-11-30 1990-12-07 Vernois Goulven IMPROVED DISKETTE INCORPORATING INTEGRATED CIRCUITS AND CONNECTORS, OR ARRANGEMENT FOR RECEIVING INTEGRATED CIRCUITS AND CONNECTORS, AND CONNECTION DEVICES WITH A COMPUTER
DE4239865A1 (en) * 1992-11-27 1994-06-01 Heinz Johann Unauthorised program use prevention method - inserting installation chip card data carrier into test appts. before starting, interrogating card to check program addresses, and interrupting program with incorrect answer
WO1995026028A1 (en) * 1994-03-23 1995-09-28 Gms (Recordings) Limited Interactive compact disc system
WO1995032479A1 (en) * 1994-05-25 1995-11-30 Vincent Lorphelin Protected software rental using smart cards
US5870726A (en) * 1994-05-25 1999-02-09 Lorphelin; Vincent Protected software rental using smart cards
GB2320597A (en) * 1997-10-08 1998-06-24 Powerdesk Plc Card-controlled personal computer

Also Published As

Publication number Publication date
EP0163715A1 (en) 1985-12-11

Similar Documents

Publication Publication Date Title
US4462078A (en) Computer program protection method
US5452431A (en) Microcircuit for a chip card comprising a protected programmable memory
US5379433A (en) Protection against unauthorized use of software recorded on recording medium
US4446519A (en) Method and apparatus for providing security for computer software
US4646234A (en) Anti-piracy system using separate storage and alternate execution of selected proprietary and public portions of computer programs
JP3243331B2 (en) Method for creating layered medium for software management, apparatus for creating layered medium for software management, and layered medium for software management
EP0265183A2 (en) Billing system for computer software
JPS623459B2 (en)
WO1985002696A1 (en) Computer system
JPS5992500A (en) Protection system for data processor
EP0470163A1 (en) Improved security for machine-writeable data storage systems
JP2007140961A (en) Device for preventing usage of fraudulent copied file, and its program
JPS61105657A (en) Processor and use thereof
GB2145856A (en) Copyright protection device
WO1994006071A1 (en) A dongle
US5212602A (en) Magnetic head having fuse within head case
JPS59123954A (en) Prevention system for illegal use of stored data
JP2009524879A (en) Combining protected application programs with shellcode
JPS60157787A (en) Storage medium
IE914474A1 (en) Security of stored data
JPS61226837A (en) Free use preventing method for program
JPH0331949A (en) Information processor
JP2733374B2 (en) Memory module data concealment device
JPS6279526A (en) Software protecting system
JPS6167161A (en) System for inhibiting universal use of software

Legal Events

Date Code Title Description
AK Designated states

Designated state(s): JP US

AL Designated countries for regional patents

Designated state(s): AT BE CH DE FR GB LU NL SE