Protection of software from physical and electronic interrogation by sealing and checking password
First Claim
Patent Images
1. A soft-ware protection (i.e. protection from to be interrogated) system for a dedicated computer comprising:
- (a) a software-auto-destroying board (SAD board) mounted in an expansion slot of the computer;
(b) a memory for storing the software to be protected on the SAD board;
(c) a sealed detector, for detecting any unallowable electronical and physical interrogating (i.e. any physical and electronic interrogation which is not set up by those who designed the software protection system) externally upon the main information parts (including BIOS chip) of the computer, the detector itself, and the memory storing the software, and for generating a destruction signal in response to such detection;
(d) means responsive to the destruction signal, for destroying the function of the memory which storing the software, so that the software stored in the memory is destroyed.(e) means for blocking the ways of controlling the computer to perform work other than that which is set up within the software stored in the memory;
(f) means for sealing all the main information parts (including the BIOS chip) of the computer, the memory which storing the software, the detector mentioned above, and all vacant slots;
(g) means for converting monitor-signals of the computer to video-signals, and inputting them into a video-printer to print out the outputs; and
(h) means for, using an electronic key, starting execution of the software stored in the memory to be working, when a password input by a user is compatible with the electronic key.
0 Assignments
0 Petitions
Accused Products
Abstract
Software in a dedicated computer is protected from physical and electronic unallowable interrogation (i.e. any physical and electronic interrogation which is not set up by the designer). When the unallowable interrogation is attempted, a destruction signal is generated to destroy the software protected, so that the unallowable interrogation can not be realized, therefore the unallowable interrogation is forbidden.
14 Citations
16 Claims
-
1. A soft-ware protection (i.e. protection from to be interrogated) system for a dedicated computer comprising:
-
(a) a software-auto-destroying board (SAD board) mounted in an expansion slot of the computer; (b) a memory for storing the software to be protected on the SAD board; (c) a sealed detector, for detecting any unallowable electronical and physical interrogating (i.e. any physical and electronic interrogation which is not set up by those who designed the software protection system) externally upon the main information parts (including BIOS chip) of the computer, the detector itself, and the memory storing the software, and for generating a destruction signal in response to such detection; (d) means responsive to the destruction signal, for destroying the function of the memory which storing the software, so that the software stored in the memory is destroyed. (e) means for blocking the ways of controlling the computer to perform work other than that which is set up within the software stored in the memory; (f) means for sealing all the main information parts (including the BIOS chip) of the computer, the memory which storing the software, the detector mentioned above, and all vacant slots; (g) means for converting monitor-signals of the computer to video-signals, and inputting them into a video-printer to print out the outputs; and (h) means for, using an electronic key, starting execution of the software stored in the memory to be working, when a password input by a user is compatible with the electronic key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 15, 16)
-
-
11. A method of protecting software, comprising the steps of:
-
(a) mounting a SAD board in an expansion slot of a computer; (b) storing the software to be protected on the SAD board; (c) using a sealed detector for detecting any unallowable electronical and physical interrogating (i.e. any physical and electronic interrogation which is not set up by those who designed the software protection system) externally upon the main information parts (including BIOS chip) of the computer, the detector itself, and the memory storing the software, and generating a destructing signal in response to such detection; (d) destroying the stored software in response to generation of the destruction signal which destroying the function of the memory storing the software, so that the software stored in the memory is destroyed. (e) sealing all the main information parts (including the BIOS chip) of the computer, the memory which storing the software, the detector mentioned above, and all the vacant slots; (f) blocking all the way of controlling the computer to perform work other than that which is set up within the software stored in the memory; (g) using converting monitor-signals of the computer to video-signals, and inputting them into a video-printer to print out the output; and (h) using an electronic key starting execution of the software stored in the memory, when a password input by a user is compatible with the electronic key. - View Dependent Claims (12, 13, 14)
-
Specification