DE3828573A1 - Method of protecting computer programs from illegal use - Google Patents

Method of protecting computer programs from illegal use

Info

Publication number
DE3828573A1
DE3828573A1 DE3828573A DE3828573A DE3828573A1 DE 3828573 A1 DE3828573 A1 DE 3828573A1 DE 3828573 A DE3828573 A DE 3828573A DE 3828573 A DE3828573 A DE 3828573A DE 3828573 A1 DE3828573 A1 DE 3828573A1
Authority
DE
Germany
Prior art keywords
diskette
key
program
programs
modifications
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
DE3828573A
Other languages
German (de)
Inventor
Bernd Hoehne
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HOEHNE BERND DIPL WIRTSCH ING
Original Assignee
HOEHNE BERND DIPL WIRTSCH ING
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HOEHNE BERND DIPL WIRTSCH ING filed Critical HOEHNE BERND DIPL WIRTSCH ING
Priority to DE3828573A priority Critical patent/DE3828573A1/en
Priority to DE8810638U priority patent/DE8810638U1/de
Publication of DE3828573A1 publication Critical patent/DE3828573A1/en
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0092Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which are linked to media defects or read/write errors
    • G11B20/00927Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which are linked to media defects or read/write errors wherein said defects or errors are generated on purpose, e.g. intended scratches
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00094Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
    • G11B20/00123Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers the record carrier being identified by recognising some of its unique characteristics, e.g. a unique defect pattern serving as a physical signature of the record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress

Abstract

For protecting computer programs from illegal use, known methods such as copy protection and linkage of programs with computer components have been unsuccessful. They have disadvantages such as incompatibility, expensive modifications, difficult handling or failure. The new method permits copying of programs without restriction. The protection is in the combination of the program with a physical key. The medium is a diskette, which has mechanical modifications, which are decoded using a diskette station. The program to be protected can be started, after the user has been authorised, only by inserting the key diskette. It is also possible to record the program start on the key diskette, to prevent other starts of the program on other devices. The mechanical modifications are unusable sectors, the position of which defines the key. Key diskettes can be manufactured without great cost, but cannot be reproduced without considerable mechanical cost. The security method is particularly suitable for programs for personal computers or stand-alone computer systems. No additional equipment is necessary, since diskette drives are standard on personal computers. However, the method can be used anywhere where a diskette station can be connected.

Description

Die Erfindung betrifft ein technisches Verfahren zum Schutz von Computerprogrammen gegen unrechtmäßige Nutzung. Die Erfindung soll die rechtmäßige Nutzung nicht erschweren und andererseits dem Hersteller genügend Schutz gegen unrechtmäßige Nutzung bieten für Computersysteme, die eine Diskettenlesestation besitzen.The invention relates to a technical method for protecting Computer programs against unlawful use. The invention should not complicate the lawful use and on the other hand provide the manufacturer with sufficient protection against unlawful use for computer systems that have a disk reading station.

Es ist bekannt, daß Computerprogramme durch Kopierschutz von unrechtmäßiger Nutzung ausgeschlossen werden sollen. Weiter werden Verfahren eingesetzt, die die Benutzung der Programme von der Existenz eines bestimmten Hardwarebauteils abhängig machen wie Kanalstecker oder Integrierte Schaltkreise.It is known that computer programs are protected by copy protection from unlawful use should be excluded. Continue Procedures are used to control the use of the programs depends on the existence of a certain hardware component make like channel plugs or integrated circuits.

Kopierschutz hat sich in der Praxis nicht etablieren können weil einerseits kein ausreichender Schutz oder eine wesentlich erschwerte Handhabung das Resultat ist. Die Kombination von Programmen mit Integrierten Schaltkreisen und Kanalsteckern bieten ausreichenden Schutz, setzen aber eine technische Änderung des Computersystems voraus und erfordert zusätzliche Bauteile.Copy protection has not been able to establish itself in practice because on the one hand insufficient protection or essential difficult handling is the result. The combination of Programs with integrated circuits and channel plugs offer adequate protection, but provide technical protection Computer system change ahead and requires additional Components.

Die Erfindung hat zur Aufgabe, ein Computerprogramm gegen un­ rechtmäßige Nutzung ausreichend zu schützen und andererseits die Handhabung nicht wesentlich zu beeinträchtigen ohne, daß Änderungen oder Ergänzungen an Computer - und Externen Bauteilen nötig sind. The invention aims to protect a computer program to un lawful use acceptable as well as not to significantly affect the handling without that changes or additions to your computer - and external components are needed.

Diese Aufgabe wird Erfindungsmäßig dadurch gelöst, daß auf einer Schlüsseldiskette durch die Anordnung unbrauchbarer Stellen (mechanische Veränderungen) ein Kode abgelegt ist. Dieser Kode bildet den Schlüssel, der beim Start des Computerprogramms durch Schreib- oder Formatierversuche ermittelt wird und zu einem im Programm abgelegten Kode in einer Beziehung stehen bzw. übereinstimmen muß. Der Start des zugehörigen Programms wird auf der Schlüsseldiskette vermerkt wodurch weitere Programmstarts davon abhängig gemacht werden können, daß der vorherige Programmlauf mit Schlüsseldiskette beendet wurde bzw. eine bestimmte Zeitspanne verstrichen ist.This object is achieved according to the invention in that on a Key diskette by the arrangement of useless places (mechanical changes) a code is stored. This code forms the key that is used when starting the computer program Attempts to write or format are determined and an im Program stored code are in a relationship or must match. The start of the associated program is on the key diskette notes further program starts can be made dependent on the previous Program run with key diskette was ended or a certain period of time has passed.

Die erzielbaren Vorteile bestehen darin, daß die Schlüssel­ diskette ohne erheblichen mechanischen Aufwand nicht zu vervielfältigen ist. Die Erstellung der Schlüsseldiskette aber dadurch einfach und kostengünstig geschehen kann, indem die Diskette punktuell beschädigt wird, dann der so entstandene Kode gelesen und in ein Computerprogramm eingebaut wird. Eine anspruchsvolle Mechanik wird nicht benötigt. Außer der Schlüsseldiskette werden keine weiteren Teile benötigt, sofern ein Diskettenlaufwerk vorhanden ist. The achievable advantages are that the keys diskette without considerable mechanical effort is duplicate. The creation of the key diskette, however can be done easily and inexpensively by the diskette is damaged at certain points, then the resulting code read and built into a computer program. There is no need for sophisticated mechanics. Except for the Key diskette no further parts are required, if there is a floppy disk drive.  

Die Erfindung wird anhand einer Zeichnung näher beschrieben. Es zeigen:The invention is described in more detail with reference to a drawing. It demonstrate:

Fig. 1 Beispiel für den Aufbau einer Diskette. Fig. 1 example of the structure of a floppy disk.

Fig. 2 Beispiel für die Kodierung eines Schlüssels. Fig. 2 example of the coding of a key.

In Fig. 1 wird der prinzipielle Aufbau einer Diskette dargestellt. Dabei wird die Darstellung idealisiert, die Spuren - konzen­ trische Kreise - sind als Strecken dargestellt. Die Spuren werden in Sektoren, im Beispiel neun, unterteilt, wobei der 1. Sektor jeder Spur beim Indexloch beginnt. Ein Sektor, nach Spurnummer und Sektornummer identifizierbar, ist eine adressierbarer Speicherbereich auf der Diskette. Im Beispiel Fig. 1 stehen 40 · 9 Sektoren = 360 Sektoren zur Verfügung. Jeder Bereich kann brauchbar oder aber unbrauchbar sein. Diese Aussage bildet den binären Schlüsselkode. Ein Sektor hat für den Schlüssel den Informationsgehalt von einem Bit.In Fig. 1 the basic structure of a disk is shown. The display is idealized, the tracks - concentric circles - are shown as lines. The tracks are divided into sectors, nine in the example, with the 1st sector of each track starting at the index hole. A sector, identifiable by track number and sector number, is an addressable memory area on the diskette. In the example in FIG. 1, 40 × 9 sectors = 360 sectors are available. Each area can be useful or unusable. This statement forms the binary key code. A sector has the information content of one bit for the key.

Fig. 2 zeigt in einem Ausschnitt eine Diskette mit den Spuren 29, 30 und 31. Dieser Ausschnitt soll beispielhaft die Schlüssel­ bildung zeigen. Die mit "XXX" gekennzeichneten Sektoren sind mechanisch defekt. Ein defekter Sektor wird logisch mit "0" und ein intakter Sektor mit "1" bewertet. Von Spur 29 Sektor 1 nach Spur 31 Sektor 9 gelesen ergibt der so gewonnene Schlüssel den Wert 403706403 oktal wie Tabelle 1 verdeutlicht. In einem beliebigen Sektor, der von der Schlüsselbildung ausgenommen ist wird ein Kennzeichen dafür gesetzt, daß mit diesem Schlüssel das zugehörige Programm gestartet wurde. Nach Maßgabe des Programmherstellers kann vorgegeben werden, daß das Programm mit Schlüsseldiskette beendet werden muß oder eine bestimmte Zeit verstreichen muß bevor das Programm ein weiteres Mal mit dem zugehörigen Schlüssel gestartet werden kann. Fig. 2 shows in a section of a disk with the tracks 29, 30 and 31. This section is intended to show the key formation as an example. The sectors marked with "XXX" are mechanically defective. A defective sector is logically rated "0" and an intact sector is rated "1". Read from track 29 sector 1 to track 31 sector 9 , the key obtained in this way gives the value 403706403 octal as shown in table 1. In any sector that is excluded from key generation, an indicator is set that the associated program was started with this key. According to the program manufacturer, it can be specified that the program must be ended with a key diskette or that a certain time must elapse before the program can be started again with the associated key.

Tabelle 1 Table 1

Claims (1)

Schutzverfahren für Computerprogramme gegen unrechtmäßige Nutzung, dadurch gekennzeichnet, daß eine separate, mechanisch veränderte Diskette als Schlüssel dient, der das Starten des Programms erlaubt.Protection method for computer programs against unlawful use, characterized in that a separate, mechanically modified floppy disk serves as a key that allows the program to be started.
DE3828573A 1988-08-23 1988-08-23 Method of protecting computer programs from illegal use Ceased DE3828573A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
DE3828573A DE3828573A1 (en) 1988-08-23 1988-08-23 Method of protecting computer programs from illegal use
DE8810638U DE8810638U1 (en) 1988-08-23 1988-08-23

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE3828573A DE3828573A1 (en) 1988-08-23 1988-08-23 Method of protecting computer programs from illegal use
DE8810638U DE8810638U1 (en) 1988-08-23 1988-08-23

Publications (1)

Publication Number Publication Date
DE3828573A1 true DE3828573A1 (en) 1990-03-08

Family

ID=25871389

Family Applications (2)

Application Number Title Priority Date Filing Date
DE8810638U Expired DE8810638U1 (en) 1988-08-23 1988-08-23
DE3828573A Ceased DE3828573A1 (en) 1988-08-23 1988-08-23 Method of protecting computer programs from illegal use

Family Applications Before (1)

Application Number Title Priority Date Filing Date
DE8810638U Expired DE8810638U1 (en) 1988-08-23 1988-08-23

Country Status (1)

Country Link
DE (2) DE8810638U1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0522332A1 (en) * 1991-07-12 1993-01-13 M.A.N.-ROLAND Druckmaschinen Aktiengesellschaft Computer for controlling a machine, especially a printing press
EP0704844A1 (en) * 1994-09-30 1996-04-03 Victor Company Of Japan, Limited Optical disc and information management system for the same
EP0711479A1 (en) * 1993-07-26 1996-05-15 Elonex Technologies, Inc. Cd prom encryption system
EP0969348A1 (en) * 1998-07-01 2000-01-05 Iomega Corporation Readable indelible mark on storage media
US6259575B1 (en) 1998-07-01 2001-07-10 Iomega Corporation Readable indelible mark on storage media

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4584641A (en) * 1983-08-29 1986-04-22 Paul Guglielmino Copyprotecting system for software protection

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4584641A (en) * 1983-08-29 1986-04-22 Paul Guglielmino Copyprotecting system for software protection

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0522332A1 (en) * 1991-07-12 1993-01-13 M.A.N.-ROLAND Druckmaschinen Aktiengesellschaft Computer for controlling a machine, especially a printing press
EP0711479A1 (en) * 1993-07-26 1996-05-15 Elonex Technologies, Inc. Cd prom encryption system
EP0711479A4 (en) * 1993-07-26 1996-10-02 Elonex Technologies Inc Cd prom encryption system
EP0704844A1 (en) * 1994-09-30 1996-04-03 Victor Company Of Japan, Limited Optical disc and information management system for the same
US5809545A (en) * 1994-09-30 1998-09-15 Victor Company Of Japan, Ltd. Optical disc for a master key, and a method and apparatus for optical-disc information management which inhibit and permit reproduction of main information from an illegal copy disc by using physical and logical security information
EP0969348A1 (en) * 1998-07-01 2000-01-05 Iomega Corporation Readable indelible mark on storage media
WO2000002117A1 (en) * 1998-07-01 2000-01-13 Iomega Corporation Readable indelible mark on storage media
FR2783962A1 (en) * 1998-07-01 2000-03-31 Iomega Corp INDELEBILE MARKING READABLE ON A STORAGE MEDIUM
NL1012487C2 (en) * 1998-07-01 2000-04-13 Iomega Corp Readable indelible mark on storage medium.
US6259575B1 (en) 1998-07-01 2001-07-10 Iomega Corporation Readable indelible mark on storage media
US6324026B1 (en) 1998-07-01 2001-11-27 Iomega Corporation Readable indelible mark on storage media
US6445523B2 (en) 1998-07-01 2002-09-03 Iomega Corporation Readable indelible mark on storage media

Also Published As

Publication number Publication date
DE8810638U1 (en) 1989-01-05

Similar Documents

Publication Publication Date Title
DE69831275T2 (en) Copy protection method for a record carrier with a pattern of logical errors
DE69333964T2 (en) Device for recording and playback
DE69736919T2 (en) INFORMATION CARRIER WITH ADDITIONAL INFORMATION, PLAYBACK DEVICE AND METHOD FOR PRODUCING SUCH INFORMATION CARRIER
US4785361A (en) Method and apparatus for frustrating the unauthorized copying of recorded data
DE60130779T2 (en) METHOD AND DEVICE FOR CONTROLLING THE DISTRIBUTION AND USE OF DIGITAL WORKS
DE69935124T2 (en) SYSTEM FOR COPY PROTECTION OF RECORDED INFORMATION
DE60109160T2 (en) DESCRIPTIVE STORAGE MEDIUM WITH PROTECTED DATA AREA
DE3319343A1 (en) METHOD AND DEVICE FOR THE IMPOSSIBILITY OF UNAUTHORIZED COPIES OF RECORDED DATA
EP0172439A2 (en) Copy protected disk
DE4308680A1 (en) Preventing unauthorised use of optical disc e.g. CD-ROM - comparing first information read out from area of disc inaccessible to user with second information concerning authentic disk
DE69934812T2 (en) METHOD AND DEVICE FOR DETERMINING THE ORIGIN OF A DATA CARRIER PLATE
DE69836100T2 (en) METHOD AND DEVICE FOR DETERMINING THE ORIGIN OF A DATA CARRIER PLATE
DE60024754T2 (en) recorder
DE3828573A1 (en) Method of protecting computer programs from illegal use
DE3320378C2 (en)
DE3434418C2 (en)
DE69932308T2 (en) Playback device for information carriers containing record carriers
EP0609295A1 (en) Storage arrangement for magnetic tape cassettes.
WO2003049107A2 (en) A copy-protected compact disc and method for producing same
EP0428528B1 (en) Data security device
EP0080244B1 (en) Method of identifying a system - allied, physically separableprogramme memory, and a data processing system using this method.
DE69627303T2 (en) CD-ROM SOFTWARE PROTECTION SYSTEM
DE10140237A1 (en) Copy protection device
DE69914723T2 (en) METHOD FOR SECURING SAVED DATA IN A MEMORY ARRANGEMENT OF A COMPUTER SYSTEM AND DEVICE FOR ITS IMPLEMENTATION
DE102006030512B4 (en) Visible copy protection of programs or data stored on a CD or DVD of any format

Legal Events

Date Code Title Description
OP8 Request for examination as to paragraph 44 patent law
8122 Nonbinding interest in granting licences declared
8131 Rejection