DE3828573A1 - Method of protecting computer programs from illegal use - Google Patents
Method of protecting computer programs from illegal useInfo
- Publication number
- DE3828573A1 DE3828573A1 DE3828573A DE3828573A DE3828573A1 DE 3828573 A1 DE3828573 A1 DE 3828573A1 DE 3828573 A DE3828573 A DE 3828573A DE 3828573 A DE3828573 A DE 3828573A DE 3828573 A1 DE3828573 A1 DE 3828573A1
- Authority
- DE
- Germany
- Prior art keywords
- diskette
- key
- program
- programs
- modifications
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 238000004590 computer program Methods 0.000 title claims abstract description 8
- 238000000034 method Methods 0.000 title claims abstract description 8
- 238000012986 modification Methods 0.000 abstract 3
- 230000004048 modification Effects 0.000 abstract 3
- 230000002950 deficient Effects 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0092—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which are linked to media defects or read/write errors
- G11B20/00927—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which are linked to media defects or read/write errors wherein said defects or errors are generated on purpose, e.g. intended scratches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
- G11B20/00123—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers the record carrier being identified by recognising some of its unique characteristics, e.g. a unique defect pattern serving as a physical signature of the record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
Abstract
Description
Die Erfindung betrifft ein technisches Verfahren zum Schutz von Computerprogrammen gegen unrechtmäßige Nutzung. Die Erfindung soll die rechtmäßige Nutzung nicht erschweren und andererseits dem Hersteller genügend Schutz gegen unrechtmäßige Nutzung bieten für Computersysteme, die eine Diskettenlesestation besitzen.The invention relates to a technical method for protecting Computer programs against unlawful use. The invention should not complicate the lawful use and on the other hand provide the manufacturer with sufficient protection against unlawful use for computer systems that have a disk reading station.
Es ist bekannt, daß Computerprogramme durch Kopierschutz von unrechtmäßiger Nutzung ausgeschlossen werden sollen. Weiter werden Verfahren eingesetzt, die die Benutzung der Programme von der Existenz eines bestimmten Hardwarebauteils abhängig machen wie Kanalstecker oder Integrierte Schaltkreise.It is known that computer programs are protected by copy protection from unlawful use should be excluded. Continue Procedures are used to control the use of the programs depends on the existence of a certain hardware component make like channel plugs or integrated circuits.
Kopierschutz hat sich in der Praxis nicht etablieren können weil einerseits kein ausreichender Schutz oder eine wesentlich erschwerte Handhabung das Resultat ist. Die Kombination von Programmen mit Integrierten Schaltkreisen und Kanalsteckern bieten ausreichenden Schutz, setzen aber eine technische Änderung des Computersystems voraus und erfordert zusätzliche Bauteile.Copy protection has not been able to establish itself in practice because on the one hand insufficient protection or essential difficult handling is the result. The combination of Programs with integrated circuits and channel plugs offer adequate protection, but provide technical protection Computer system change ahead and requires additional Components.
Die Erfindung hat zur Aufgabe, ein Computerprogramm gegen un rechtmäßige Nutzung ausreichend zu schützen und andererseits die Handhabung nicht wesentlich zu beeinträchtigen ohne, daß Änderungen oder Ergänzungen an Computer - und Externen Bauteilen nötig sind. The invention aims to protect a computer program to un lawful use acceptable as well as not to significantly affect the handling without that changes or additions to your computer - and external components are needed.
Diese Aufgabe wird Erfindungsmäßig dadurch gelöst, daß auf einer Schlüsseldiskette durch die Anordnung unbrauchbarer Stellen (mechanische Veränderungen) ein Kode abgelegt ist. Dieser Kode bildet den Schlüssel, der beim Start des Computerprogramms durch Schreib- oder Formatierversuche ermittelt wird und zu einem im Programm abgelegten Kode in einer Beziehung stehen bzw. übereinstimmen muß. Der Start des zugehörigen Programms wird auf der Schlüsseldiskette vermerkt wodurch weitere Programmstarts davon abhängig gemacht werden können, daß der vorherige Programmlauf mit Schlüsseldiskette beendet wurde bzw. eine bestimmte Zeitspanne verstrichen ist.This object is achieved according to the invention in that on a Key diskette by the arrangement of useless places (mechanical changes) a code is stored. This code forms the key that is used when starting the computer program Attempts to write or format are determined and an im Program stored code are in a relationship or must match. The start of the associated program is on the key diskette notes further program starts can be made dependent on the previous Program run with key diskette was ended or a certain period of time has passed.
Die erzielbaren Vorteile bestehen darin, daß die Schlüssel diskette ohne erheblichen mechanischen Aufwand nicht zu vervielfältigen ist. Die Erstellung der Schlüsseldiskette aber dadurch einfach und kostengünstig geschehen kann, indem die Diskette punktuell beschädigt wird, dann der so entstandene Kode gelesen und in ein Computerprogramm eingebaut wird. Eine anspruchsvolle Mechanik wird nicht benötigt. Außer der Schlüsseldiskette werden keine weiteren Teile benötigt, sofern ein Diskettenlaufwerk vorhanden ist. The achievable advantages are that the keys diskette without considerable mechanical effort is duplicate. The creation of the key diskette, however can be done easily and inexpensively by the diskette is damaged at certain points, then the resulting code read and built into a computer program. There is no need for sophisticated mechanics. Except for the Key diskette no further parts are required, if there is a floppy disk drive.
Die Erfindung wird anhand einer Zeichnung näher beschrieben. Es zeigen:The invention is described in more detail with reference to a drawing. It demonstrate:
Fig. 1 Beispiel für den Aufbau einer Diskette. Fig. 1 example of the structure of a floppy disk.
Fig. 2 Beispiel für die Kodierung eines Schlüssels. Fig. 2 example of the coding of a key.
In Fig. 1 wird der prinzipielle Aufbau einer Diskette dargestellt. Dabei wird die Darstellung idealisiert, die Spuren - konzen trische Kreise - sind als Strecken dargestellt. Die Spuren werden in Sektoren, im Beispiel neun, unterteilt, wobei der 1. Sektor jeder Spur beim Indexloch beginnt. Ein Sektor, nach Spurnummer und Sektornummer identifizierbar, ist eine adressierbarer Speicherbereich auf der Diskette. Im Beispiel Fig. 1 stehen 40 · 9 Sektoren = 360 Sektoren zur Verfügung. Jeder Bereich kann brauchbar oder aber unbrauchbar sein. Diese Aussage bildet den binären Schlüsselkode. Ein Sektor hat für den Schlüssel den Informationsgehalt von einem Bit.In Fig. 1 the basic structure of a disk is shown. The display is idealized, the tracks - concentric circles - are shown as lines. The tracks are divided into sectors, nine in the example, with the 1st sector of each track starting at the index hole. A sector, identifiable by track number and sector number, is an addressable memory area on the diskette. In the example in FIG. 1, 40 × 9 sectors = 360 sectors are available. Each area can be useful or unusable. This statement forms the binary key code. A sector has the information content of one bit for the key.
Fig. 2 zeigt in einem Ausschnitt eine Diskette mit den Spuren 29, 30 und 31. Dieser Ausschnitt soll beispielhaft die Schlüssel bildung zeigen. Die mit "XXX" gekennzeichneten Sektoren sind mechanisch defekt. Ein defekter Sektor wird logisch mit "0" und ein intakter Sektor mit "1" bewertet. Von Spur 29 Sektor 1 nach Spur 31 Sektor 9 gelesen ergibt der so gewonnene Schlüssel den Wert 403706403 oktal wie Tabelle 1 verdeutlicht. In einem beliebigen Sektor, der von der Schlüsselbildung ausgenommen ist wird ein Kennzeichen dafür gesetzt, daß mit diesem Schlüssel das zugehörige Programm gestartet wurde. Nach Maßgabe des Programmherstellers kann vorgegeben werden, daß das Programm mit Schlüsseldiskette beendet werden muß oder eine bestimmte Zeit verstreichen muß bevor das Programm ein weiteres Mal mit dem zugehörigen Schlüssel gestartet werden kann. Fig. 2 shows in a section of a disk with the tracks 29, 30 and 31. This section is intended to show the key formation as an example. The sectors marked with "XXX" are mechanically defective. A defective sector is logically rated "0" and an intact sector is rated "1". Read from track 29 sector 1 to track 31 sector 9 , the key obtained in this way gives the value 403706403 octal as shown in table 1. In any sector that is excluded from key generation, an indicator is set that the associated program was started with this key. According to the program manufacturer, it can be specified that the program must be ended with a key diskette or that a certain time must elapse before the program can be started again with the associated key.
Claims (1)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE3828573A DE3828573A1 (en) | 1988-08-23 | 1988-08-23 | Method of protecting computer programs from illegal use |
DE8810638U DE8810638U1 (en) | 1988-08-23 | 1988-08-23 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE3828573A DE3828573A1 (en) | 1988-08-23 | 1988-08-23 | Method of protecting computer programs from illegal use |
DE8810638U DE8810638U1 (en) | 1988-08-23 | 1988-08-23 |
Publications (1)
Publication Number | Publication Date |
---|---|
DE3828573A1 true DE3828573A1 (en) | 1990-03-08 |
Family
ID=25871389
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE8810638U Expired DE8810638U1 (en) | 1988-08-23 | 1988-08-23 | |
DE3828573A Ceased DE3828573A1 (en) | 1988-08-23 | 1988-08-23 | Method of protecting computer programs from illegal use |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE8810638U Expired DE8810638U1 (en) | 1988-08-23 | 1988-08-23 |
Country Status (1)
Country | Link |
---|---|
DE (2) | DE8810638U1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0522332A1 (en) * | 1991-07-12 | 1993-01-13 | M.A.N.-ROLAND Druckmaschinen Aktiengesellschaft | Computer for controlling a machine, especially a printing press |
EP0704844A1 (en) * | 1994-09-30 | 1996-04-03 | Victor Company Of Japan, Limited | Optical disc and information management system for the same |
EP0711479A1 (en) * | 1993-07-26 | 1996-05-15 | Elonex Technologies, Inc. | Cd prom encryption system |
EP0969348A1 (en) * | 1998-07-01 | 2000-01-05 | Iomega Corporation | Readable indelible mark on storage media |
US6259575B1 (en) | 1998-07-01 | 2001-07-10 | Iomega Corporation | Readable indelible mark on storage media |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4584641A (en) * | 1983-08-29 | 1986-04-22 | Paul Guglielmino | Copyprotecting system for software protection |
-
1988
- 1988-08-23 DE DE8810638U patent/DE8810638U1/de not_active Expired
- 1988-08-23 DE DE3828573A patent/DE3828573A1/en not_active Ceased
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4584641A (en) * | 1983-08-29 | 1986-04-22 | Paul Guglielmino | Copyprotecting system for software protection |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0522332A1 (en) * | 1991-07-12 | 1993-01-13 | M.A.N.-ROLAND Druckmaschinen Aktiengesellschaft | Computer for controlling a machine, especially a printing press |
EP0711479A1 (en) * | 1993-07-26 | 1996-05-15 | Elonex Technologies, Inc. | Cd prom encryption system |
EP0711479A4 (en) * | 1993-07-26 | 1996-10-02 | Elonex Technologies Inc | Cd prom encryption system |
EP0704844A1 (en) * | 1994-09-30 | 1996-04-03 | Victor Company Of Japan, Limited | Optical disc and information management system for the same |
US5809545A (en) * | 1994-09-30 | 1998-09-15 | Victor Company Of Japan, Ltd. | Optical disc for a master key, and a method and apparatus for optical-disc information management which inhibit and permit reproduction of main information from an illegal copy disc by using physical and logical security information |
EP0969348A1 (en) * | 1998-07-01 | 2000-01-05 | Iomega Corporation | Readable indelible mark on storage media |
WO2000002117A1 (en) * | 1998-07-01 | 2000-01-13 | Iomega Corporation | Readable indelible mark on storage media |
FR2783962A1 (en) * | 1998-07-01 | 2000-03-31 | Iomega Corp | INDELEBILE MARKING READABLE ON A STORAGE MEDIUM |
NL1012487C2 (en) * | 1998-07-01 | 2000-04-13 | Iomega Corp | Readable indelible mark on storage medium. |
US6259575B1 (en) | 1998-07-01 | 2001-07-10 | Iomega Corporation | Readable indelible mark on storage media |
US6324026B1 (en) | 1998-07-01 | 2001-11-27 | Iomega Corporation | Readable indelible mark on storage media |
US6445523B2 (en) | 1998-07-01 | 2002-09-03 | Iomega Corporation | Readable indelible mark on storage media |
Also Published As
Publication number | Publication date |
---|---|
DE8810638U1 (en) | 1989-01-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69831275T2 (en) | Copy protection method for a record carrier with a pattern of logical errors | |
DE69333964T2 (en) | Device for recording and playback | |
DE69736919T2 (en) | INFORMATION CARRIER WITH ADDITIONAL INFORMATION, PLAYBACK DEVICE AND METHOD FOR PRODUCING SUCH INFORMATION CARRIER | |
US4785361A (en) | Method and apparatus for frustrating the unauthorized copying of recorded data | |
DE60130779T2 (en) | METHOD AND DEVICE FOR CONTROLLING THE DISTRIBUTION AND USE OF DIGITAL WORKS | |
DE69935124T2 (en) | SYSTEM FOR COPY PROTECTION OF RECORDED INFORMATION | |
DE60109160T2 (en) | DESCRIPTIVE STORAGE MEDIUM WITH PROTECTED DATA AREA | |
DE3319343A1 (en) | METHOD AND DEVICE FOR THE IMPOSSIBILITY OF UNAUTHORIZED COPIES OF RECORDED DATA | |
EP0172439A2 (en) | Copy protected disk | |
DE4308680A1 (en) | Preventing unauthorised use of optical disc e.g. CD-ROM - comparing first information read out from area of disc inaccessible to user with second information concerning authentic disk | |
DE69934812T2 (en) | METHOD AND DEVICE FOR DETERMINING THE ORIGIN OF A DATA CARRIER PLATE | |
DE69836100T2 (en) | METHOD AND DEVICE FOR DETERMINING THE ORIGIN OF A DATA CARRIER PLATE | |
DE60024754T2 (en) | recorder | |
DE3828573A1 (en) | Method of protecting computer programs from illegal use | |
DE3320378C2 (en) | ||
DE3434418C2 (en) | ||
DE69932308T2 (en) | Playback device for information carriers containing record carriers | |
EP0609295A1 (en) | Storage arrangement for magnetic tape cassettes. | |
WO2003049107A2 (en) | A copy-protected compact disc and method for producing same | |
EP0428528B1 (en) | Data security device | |
EP0080244B1 (en) | Method of identifying a system - allied, physically separableprogramme memory, and a data processing system using this method. | |
DE69627303T2 (en) | CD-ROM SOFTWARE PROTECTION SYSTEM | |
DE10140237A1 (en) | Copy protection device | |
DE69914723T2 (en) | METHOD FOR SECURING SAVED DATA IN A MEMORY ARRANGEMENT OF A COMPUTER SYSTEM AND DEVICE FOR ITS IMPLEMENTATION | |
DE102006030512B4 (en) | Visible copy protection of programs or data stored on a CD or DVD of any format |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
OP8 | Request for examination as to paragraph 44 patent law | ||
8122 | Nonbinding interest in granting licences declared | ||
8131 | Rejection |