Software protection method and apparatus

作者: Andrew Pickholtz

DOI:

关键词:

摘要: In a method of and apparatus for limiting program execution to only an authorized data processing system, proprietary program, together with first second authorization codes, is stored on magnetic disc or other storage medium. The codes are read. A hardware module containing pseudorandom number generator unique the system receives code as key. resultant generated by generator, which function key particular algorithm, compared in direct encrypted form. An enable signal response positive comparison be executed.

参考文章(8)
Richard Johnstone, Computer software security system ,(1977)
David W Terry, Ray H Thurmond, Parker R Blevins, Program security device ,(1968)
Laszlo Antal Belady, Clement Richard Attanasio, Operating system authenticator ,(1975)
Odo J. Struger, Theodore J. Markley, Lawrence W. Delong, Walter V. Casto, Program protection module for programmable controller ,(1977)
Walter L. Tuchman, William F. Ehrsam, Stephen M. Matyas, Robert C. Elander, John L. Smith, Carl H. W. Meyer, Cryptographic file security for single domain networks ,(1977)