Security system for computer software
First Claim
Patent Images
1. A computer system comprising:
- a permanent memory;
a program stored in said permanent memory;
a computer having a second memory, and instructions for loading said program into said second memory;
means for securing said program from use by an unauthorized user, comprising an input port of said computer system, a key for releasably attaching to said input port, said key including means for generating a coded signal wherein said generation of said coded signal is independent of said program;
means for commencing execution of said program;
means for transmitting said coded signal to said second memory;
means for evaluating said coded signal according to security criteria;
means for generating a command signal which causes said computer to complete execution of said program only if said coded signal satisfies the security criteria.
0 Assignments
0 Petitions
Accused Products
Abstract
The disclosure relates to a security system for computer software. A plug-in circuit accompanies each legitimately purchased softward package. The software includes a communication system to decode signals generated by the plug-in circuit. Where the appropriate signal is sensed the program is executed. If the proper code is not sensed the program shuts down.
88 Citations
13 Claims
-
1. A computer system comprising:
-
a permanent memory; a program stored in said permanent memory; a computer having a second memory, and instructions for loading said program into said second memory; means for securing said program from use by an unauthorized user, comprising an input port of said computer system, a key for releasably attaching to said input port, said key including means for generating a coded signal wherein said generation of said coded signal is independent of said program; means for commencing execution of said program; means for transmitting said coded signal to said second memory; means for evaluating said coded signal according to security criteria; means for generating a command signal which causes said computer to complete execution of said program only if said coded signal satisfies the security criteria. - View Dependent Claims (2, 3)
-
-
4. A method for securing software used in a computer having a memory, comprising the steps of:
-
(1) attaching a key for generating a predetermined coded signal to an input port of said computer said generation of said coded signal being independent of said software; (2) loading a program into said memory, said program containing an algorithm for evaluating said signal generated by said key, and instructions for (i) accessing the signal being evaluated and (ii) allowing execution of said program according to predetermined security criteria; (3) commencing execution of said program; (4) transmitting said coded signal from said key to said memory; (5) evaluating said coded signal according to the security criteria; and (6) allowing said computer to complete the execution of said program only if said coded signal from said key satisfies the predetermined security criteria. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of protecting software where a user accesses a host system, comprising the steps of:
-
(1) attaching a key for generating a predetermined coded signal to an input port of a user terminal or computer; (2) transmitting said coded signal from the user port to which the key is attached to said host system wherein said host system is coded such that accesses to various software program/databases are determined by said coded signal generated by said key; (3) evaluating the coded signal for permission for program execution by said host; and (4) once evaluation of step (3) is completed evaluating said coded signal to determine access to said data bases.
-
Specification