Implementing a shared higher level of privilege on personal computers for copy protection of software
First Claim
Patent Images
1. A software copy-protection apparatus, which is operable with a host computer system, comprising:
- a magnetic medium having tracks formed thereon which are divided into sectors, with each sector being comprised of a plurality of bit storage location, with indicia being formed in at least a portion of at least one sector, with at least some of said indicia not being modifiable by the medium write process;
a product program stored on said medium, at least a portion of which is in an encrypted form which identifies the program for use only on said host computer system;
a support computing system operable with said host computer system, including a decryption key for identifying product programs which may be executed on said host computer system;
means for ascertaining said indicia are present on said medium;
means included in said support computing system for utilizing said decryption key to decrypt said encrypted portion of said program; and
means responsive to the ascertaining that said indicia are on said medium, and said encrypted portion of said program has been decrypted, to permit said host computer system to execute said program product.
0 Assignments
0 Petitions
Accused Products
Abstract
Method and apparatus which restricts software, distributed on magnetic media, to use on a single computing machine. The original medium is functionally uncopyable, until it is modified by the execution of a program stored in a tamper proof co-processor which forms a part of the computing machine. The modified software on the original medium may then be copied, but the copy is operable only on the computing machine containing the co-processor that performed the modification.
168 Citations
4 Claims
-
1. A software copy-protection apparatus, which is operable with a host computer system, comprising:
-
a magnetic medium having tracks formed thereon which are divided into sectors, with each sector being comprised of a plurality of bit storage location, with indicia being formed in at least a portion of at least one sector, with at least some of said indicia not being modifiable by the medium write process; a product program stored on said medium, at least a portion of which is in an encrypted form which identifies the program for use only on said host computer system; a support computing system operable with said host computer system, including a decryption key for identifying product programs which may be executed on said host computer system; means for ascertaining said indicia are present on said medium; means included in said support computing system for utilizing said decryption key to decrypt said encrypted portion of said program; and means responsive to the ascertaining that said indicia are on said medium, and said encrypted portion of said program has been decrypted, to permit said host computer system to execute said program product.
-
-
2. A software copy-protection apparatus, which is operable with a host computer system, comprising:
-
a magnetic medium having tracks formed thereon which are divided into sectors, with each sector being comprised of a plurality of bit storage location, with physical marks being coextensive with domain pattern marks in at least a portion of at least one sector to copy protect said medium; a product program stored on said medium, at least a portion of which is in an encrypted form which identifies the program for use only on said host computer system; a support computing system operable with said host computer system, including a decryption key for identifying product programs which may be executed on said host computer system;
means for ascertaining that said physical marks and said domain pattern marks are present on said medium;means included in said support computing system for utilizing said decryption key to decrypt said encrypted portion of said program; and means responsive to the ascertaining that said physical and said domain pattern marks are on said medium, and decryption of said encrypted portion of said program to permit said host computer system to execute said program product.
-
-
3. In a computing system, the combination comprising:
-
a host computer system connected to a host computer bus; a processor connected to a support computer bus, which communicates with said host computing system, and which executes a particular set of instructions, with the execution and results of predetermined ones of said particular set of instructions being inaccessible to said host computer system; a read-only memory, connected to said support computer bus, addressable by said processor, and not addressable by said host computer system;
a first read-write memory, connected to said support computer bus, addressable by said processor, and not addressable by said host computer system;a second read-write memory, connected to each of said host computer bus and said support computer bus, addressable by each of said processor and said host computer system; a set of communicating registers, connected to each of said host computer bus and said support computer bus, addressable by each of said processor and said host computer system for transferring data between each other; and
a set of bus receivers, connected from said host computer bus to said support computer bus, which enable the state of said host system bus to be monitored from said support computer bus. - View Dependent Claims (4)
-
Specification