Tamper-resistant method for authorizing access to data between a host and a predetermined number of attached workstations

作者: James Lum , Michael A. Enescu

DOI:

关键词:

摘要: A tamper-resistant method is disclosed for controlling the number of users given authorized access to licensed software in a host-based, multiple terminal system by use an encrypted authorization list depth parameter. The embedded host-licensed can decrypt parameter only using key derived from its own CPU ID and offset.

参考文章(6)
Martyn P. Andrews, Nigel J. Wheatley, Memory protection system using capability registers ,(1980)
William E. Boebert, Richard Y. Kain, Secure data processing system architecture with format control ,(1985)
John Langlois, Michael J. Allen, Security system for microcomputers ,(1985)
Paul L. Ehlers, Thomas M. Dykstra, Michael D. Dunham, Donald W. Vahlsing, Apparatus for controlling the use of computer software ,(1984)
Michael F. Berger, Memory management system ,(1983)