×

Unauthorized usage prevention system and information processing apparatus

  • US 8,151,346 B2
  • Filed: 09/10/2007
  • Issued: 04/03/2012
  • Est. Priority Date: 09/11/2006
  • Status: Active Grant
First Claim
Patent Images

1. An unauthorized usage prevention system comprising:

  • at least one software item including an identification information item uniquely associated with the software item;

    at least one key module including a writable nonvolatile memory storing a key information item uniquely associated with the identification information item of the software item; and

    an information processing apparatus including,a central processing unit (CPU) to control execution of the software item and to perform the execution of the software item in an event of receiving permission based on the identification information item, the CPU enabling the execution of only the software item associated with the signal for permitting the execution received from an unauthorized use prevention control unit,the unauthorized use prevention control unit including a volatile memory that holds the key information item of the at least one key module and prevents the execution controlled by the CPU, and two ports, a one of the two ports to which the at least one key module is connected enables information to be exchanged between the unauthorized use prevention control unit and the at least one key module, recognizing that the at least one key module is connected to a one of the two ports, searching the volatile memory to determine whether the volatile memory holds the key information item in the at least one key module connected to the one of the two ports, and copying the key information item from the at least one key module to the volatile memory in the event that the at least one key module is connected to the one of the two ports,in an event that the at least one key module is connected to one of the two ports and the volatile memory does not hold the key information item in a key module connected to the one of the two ports, copy the key information item in the key module connected to the one of the two ports to the volatile memory,when there is more than one key module, detect, among the key modules connected to the ports, the number of key modules storing the key information items in proper statuses in the nonvolatile memory of each of the key modules,output to the CPU a signal for permitting the execution of the software item associated with the key information item held in the volatile memory,in an event that the key module is connected to at least one of the ports, and there are two key modules storing the key information items in proper statuses, the nonvolatile memory of a first one of the key modules connected to a first one of the ports is regarded as a key information storage unit, copy the key information item held in the nonvolatile memory of a second one of the key modules connected to a second one of the ports to the nonvolatile memory of the first one of the key modules connected to the first one of the two ports, and outputs, to the CPU, the signal for permitting the execution of all the software items associated with the key information items held in the nonvolatile memory of the first one of the key modules connected to the first one of the two ports,when there is one key module storing the key information item in a proper status, output, to the CPU, the signal for permitting the execution of the software item associated with the key information item held in the nonvolatile memory of the one key module,when there are no key modules storing the key information item in a proper status, the unauthorized use prevention control unit does not output, to the CPU, any signals for permitting the execution of the software item.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×