Apparatus and method for preventing unauthorized use of computer programs
First Claim
1. An apparatus for detecting unauthorized use of a computer program having first key information stored therein, comprising,means physically separate from said computer program but which may be associated with a computer in which said program is to be processed, for storing second key information,means which is operable before substantial processing of said program has occurred for comparing said first and second key information, andmeans for generating an error signal if said first and second key information do not bear a predetermined relationship to each other.
2 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and method for detecting and preventing the unauthorized use of computer programs. The program to be protected is arranged to store first key information and a key means which is physically separate from the program is provided to the customer with each program which is sold. The key means stores second key information, and is adapted for association with a computer in which the program is to be processed. Either the first program routine, or one which is performed before a significant part of the program, is arranged to access the first and second key information and to perform a comparison operation. If the first and second information bear a predetermined relationship to each other, then it is known that the appropriate key means has been deployed by the customer on the computer, and that the use of the program is authorized. However, if the first and second key information do not bear said predetermined relationship, it is concluded that use of the program is not authorized, and processing of the program may be terminated.
394 Citations
12 Claims
-
1. An apparatus for detecting unauthorized use of a computer program having first key information stored therein, comprising,
means physically separate from said computer program but which may be associated with a computer in which said program is to be processed, for storing second key information, means which is operable before substantial processing of said program has occurred for comparing said first and second key information, and means for generating an error signal if said first and second key information do not bear a predetermined relationship to each other.
-
10. A method of preventing unauthorized use of a computer program, comprising the steps of,
storing first key information in said computer program, providing a device which is connectable to a computer in which said program is to be processed, which stores second key information, arranging for said first and second key information to be accessed and compared by said computer before a substantial part of said program has been processed, and, arranging for the processing of said program to be terminated if said first and second key information does not bear a predetermined relationship to each other.
-
11. A hardware or firmware-based key device for preventing unauthorized use of a computer program which stores first key information, comprising
means for storing second key information which bears a predetermined relationship to said first key information, and means for connecting said means for storing said second key information to a computer for processing said program, to permit accessing of said means for storing and retrieval of said stored second key information by said computer.
Specification