[go: up one dir, main page]

JPS5958545A - program protection device - Google Patents

program protection device

Info

Publication number
JPS5958545A
JPS5958545A JP57168950A JP16895082A JPS5958545A JP S5958545 A JPS5958545 A JP S5958545A JP 57168950 A JP57168950 A JP 57168950A JP 16895082 A JP16895082 A JP 16895082A JP S5958545 A JPS5958545 A JP S5958545A
Authority
JP
Japan
Prior art keywords
program
card
processing
identification code
section
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP57168950A
Other languages
Japanese (ja)
Other versions
JPH0833819B2 (en
Inventor
Fumio Akiyama
文男 秋山
Yuichi Takada
祐一 高田
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujitsu Ltd
Original Assignee
Fujitsu Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Ltd filed Critical Fujitsu Ltd
Priority to JP57168950A priority Critical patent/JPH0833819B2/en
Publication of JPS5958545A publication Critical patent/JPS5958545A/en
Publication of JPH0833819B2 publication Critical patent/JPH0833819B2/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

(57)【要約】本公報は電子出願前の出願データであるた
め要約のデータは記録されません。
(57) [Summary] This bulletin contains application data before electronic filing, so abstract data is not recorded.

Description

【発明の詳細な説明】 (aJ  発明の技術分野 本発明は登漕されたプログラムの乱用を防止するプログ
ラム保躾方式に関すを。
DETAILED DESCRIPTION OF THE INVENTION (aJ Technical Field of the Invention The present invention relates to a program maintenance method for preventing abuse of a registered program.

(b)  従来技術と間組点 処理システムにおいて、1面人専用のグログ2ム(例え
ばシステム開発用や応用プログラム等)を、予めシステ
ムに笠録しておき、これを該個人が利g:録済みの疏別
コードヶ入力する方法、或は紋織あ:」コードが記録も
れたIDカードを入力する方法などが採用されている。
(b) Between the conventional technology and the system point processing system, log files (for example, for system development or application programs, etc.) exclusively for one person are recorded in the system in advance, and the log files can be used and recorded by the individual. Methods that have been adopted include inputting an already-used shobetsu code, or inputting an ID card with an omitted code.

このような従来方式では、繊別コード?入力すること紀
よシ、1面人専用の登録プログラム葡、他者が容易に利
用できるので、プログラムの伏留性を保ち得ない欠点1
冶する。
In this conventional method, is there a sorting cord? Disadvantage 1: It is difficult to maintain the privacy of the program because it is easily used by others as it is a registered program only for one person.
cure

(C)  発明の目的 不発明は上記の欠点を解次するためになされたもので、
登踪プログラムの機密保持を容易とするノログラム保直
方式の提供を目的とする。
(C) Purpose of the invention The non-invention was made to solve the above drawbacks,
The purpose is to provide a nologram maintenance method that makes it easier to maintain the confidentiality of disappearance programs.

(d)@明の4敗 本発明は、識別コードが配球されたIDカードと、読取
部と、登録プログラムの格納装置と、処理装置とを有し
、IDカードの読取部への挿入によ!1lLt取られた
該識別コードに対応する登録プロクラムの利用と許もす
るシステムにおいて、前記登録プログラムは1lHf号
化されて成るとともに、該1唐号化さ九た登録プログラ
ムをブ4読処理プログラムが格納された記1腫郡を有す
るカードを使用し、該カードを前記1洗取部に挿入した
際、該IDカードの識別コードに対応する前記暗号化さ
れた登録プログラムk N 「′JfJ記処哩装置が該
IDカード内の前記処理プログラム音用いて解読せしめ
ることを4bRとするプログラム保護方式である。
(d) @ Ming's 4 losses The present invention includes an ID card on which an identification code is distributed, a reader, a storage device for a registered program, and a processing device. Yo! In a system that also allows the use of a registration program corresponding to the identification code that has been taken, the registration program is encoded with 1LHf, and the 1LHf-encoded registration program is processed by a 4-reading processing program. When a card having a stored ID card is used and the card is inserted into the washing unit, the encrypted registration program kN ''JfJ record corresponding to the identification code of the ID card is This is a 4bR program protection system that allows the device to decode the processing program using the sound of the processing program in the ID card.

(e)  元1男の実施例 以下、不発明を図面によって説明する。図面は本発明の
一実施例を説明するブロック図であり、lはIDカード
、2は読取部、3はフロッピィディス、り、4は処理部
、5は王メモリ、6は出力部、Ai、t)fυ用省コー
ド、A’I′i照合用オU用者コード、Cは変換プログ
ラム、Dはデータ、■はインタプリータ、Lはローダ、
Mは記゛1意部、Poはロードプログラム、Plは解読
処理プログラムNP2は暗号化された登録プログラム、
PSは解読された登録プログラム、Sはシステム識別コ
ード S/は照合用システム識別コード、Tはテーブル
、a、  b、 e、  fは領域でおる。図面におけ
るIDカード1は記憶部M(ICメモリ)を有し、これ
に利用者コードA1データD1 ロードプログラムP。
(e) Example of former first son The non-invention will be explained below with reference to drawings. The drawing is a block diagram illustrating an embodiment of the present invention, in which l is an ID card, 2 is a reading section, 3 is a floppy disk, 4 is a processing section, 5 is a memory, 6 is an output section, Ai, t) Save code for fυ, OU user code for A'I'i verification, C is conversion program, D is data, ■ is interpreter, L is loader,
M is a memory unique part, Po is a load program, Pl is a decryption processing program, NP2 is an encrypted registration program,
PS is the decoded registration program, S is the system identification code, S/ is the system identification code for verification, T is the table, and a, b, e, and f are the areas. The ID card 1 in the drawing has a storage section M (IC memory), in which a user code A1 data D1 and a load program P are stored.

、解読処理プログラムP、及びシステム識別コードSが
格納されている。一方フロソビイディスク3には暗号化
された登録プログラムP2と照合用利用者コードA′が
格納されておシ、また主メモリ5の領域すに照合用シス
テム識別コードS/が格納されている。
, a decoding processing program P, and a system identification code S are stored. On the other hand, the encrypted registration program P2 and the user code A' for verification are stored in the Frosov disk 3, and the system identification code S/ for verification is stored in the area of the main memory 5. .

図面において、IDカード1が読取部2に挿入されると
、記憶部M内のロードプログラムPGが処理部1によっ
て実行はれる。このロードプログラムP。Ii記1.低
部M内のシステム識別コードSと、主メモリ5の領域す
に格納された照合用システム識別コードS′と全比較、
照合する。両者が一致したとき、ロードプログラムP。
In the drawing, when an ID card 1 is inserted into a reading section 2, a load program PG in a storage section M is executed by a processing section 1. This load program P. II 1. A complete comparison of the system identification code S in the lower part M and the verification system identification code S' stored in the area S of the main memory 5;
Verify. When both match, load program P.

は、解読処理プログラムPIk主メモリ5の領域eにロ
ードせしめる。従って、とのm読処理プロゲラAP、が
処理部4によって実行されるが、その処理部J@は次の
ノts りである。IDカード1の記憶部M内の利用者
コードAと、フロップイディスク3内の照合用利用者コ
ードA′とを比較照合し、両者が一致したときには、フ
ロッピィディスク3内の暗号化された登録プログラムP
2全読出し、これを解読しながら主メモリ5の領域fに
格納せしめる。これによff1jl域fに解読された登
録プログラムP4カロードされたことになる。解読処理
プログラムP、は主メモリ5の領域eに示すように、ロ
ーダ” s 亥j4JlプログラムC1変換用のテーブ
ルTとで構成される。
causes the decoding processing program PIk to be loaded into the area e of the main memory 5. Therefore, the m-reading processing Progera AP is executed by the processing unit 4, but the processing unit J@ is as follows. The user code A in the storage section M of the ID card 1 is compared with the verification user code A' in the floppy disk 3, and when the two match, the encrypted registration in the floppy disk 3 is Program P
2, and stores it in the area f of the main memory 5 while decoding it. This means that the decrypted registration program P4 has been loaded into the ff1jl area f. The decoding processing program P, as shown in area e of the main memory 5, is composed of a loader "s 亥j4J1 program C1 conversion table T".

すなわち暗号の解読は、変換プログラムCがテーブル1
゛を用いて行う。なお解読処理プログラムP。
In other words, the conversion program C uses Table 1 to decrypt the code.
This is done using ゛. Note that the decoding processing program P.

はインタープリータlを内蔵するものであってもよい。may have a built-in interpreter l.

以上の処理により解読された登録プログラムP6は処理
部4によって実行され、例えはIDカード1の記1意部
M内のデータDについて所要の処理を行う。以上の実施
例では、各プログラムの実行は処理部4によって行った
が、IDカード1に記2の処j」部(1,SI化された
)を内蔵させ、これを用いて処理を代行させることもで
きる。
The registration program P6 decoded through the above processing is executed by the processing section 4, and performs necessary processing on the data D in the memory section M of the ID card 1, for example. In the above embodiment, each program was executed by the processing section 4, but the ID card 1 may have a built-in processing section (1, converted to SI) described in 2, and use this to perform the processing on behalf of the ID card 1. You can also do that.

(f)  発明の効果 以上のように不発8Atユ、1;u用省が専用する登録
プログラム金暗号化し、一方これ?]l?解読するプロ
グラムをIDカードに内蔵せしめることにより、登録プ
ログラムの振蜜保持全容易とする利点を有する。
(f) More than the effect of the invention, the unexploited 8Atyu, 1;U Ministry of Finance dedicated registration program gold encryption, while this? ]l? By incorporating the decoding program into the ID card, there is an advantage that the registration program can be easily maintained.

4、図m1の間年な直切 図面は不発明の一実施例全説明するブロック図フロッピ
ィディスク、4ilS1.処理部、5は主メモリ、6は
出力部、Aは利用者コード、A′は照合用利用者コード
、Ctri変換プログラム、Dはデータ、■はインタプ
リータ、Lはローダ、Mは記憶部、P。
4. The straight-cut drawing in Figure m1 is a block diagram floppy disk fully explaining an embodiment of the invention, 4ilS1. Processing section, 5 is main memory, 6 is output section, A is user code, A' is user code for verification, Ctri conversion program, D is data, ■ is interpreter, L is loader, M is storage section, P .

はロードプログラム、PIは解読処理プログラム、P、
は暗号化された登録プログラム、PGは解読された登録
プログラム、Sはシステム識別コード、S′は照合用シ
ステム識別コード、Tr/iテーブル、a、 b、 e
、  fI′i領域を示す。
is the loading program, PI is the decoding processing program, P,
is the encrypted registration program, PG is the decrypted registration program, S is the system identification code, S' is the system identification code for verification, Tr/i table, a, b, e
, indicates the fI'i region.

Claims (1)

【特許請求の範囲】[Claims] 識別コードが記録されたカードと、読取部と、登録プロ
グラムの格納装置と、処理装置とを有し、カードの読取
部への庫人によジ読取られた、該識別コードに対応する
登録プログラムの利用が許容゛されるシステムに2いて
、前記萱録プログラムは暗号化されてなるとおもに、眼
暗号化された登録プログラムを解読処理する処理プログ
ラムが格納された一1息部を有するカードを使用し、該
カードをMf記院*部に挿入した際、該カードの識別コ
ードに対応するhσ記Ilf号化された登録プログラム
を、biJ記処理装置が該カード内のA11記処理プロ
グラムτ用いて解ωシぜしめることを特徴とするプログ
ラム保禮方式。
A registration program corresponding to the identification code, which comprises a card on which an identification code is recorded, a reading section, a storage device for a registration program, and a processing device, and is read by a custodian into the reading section of the card. 2, the registration program is encrypted, and a card is used that has a storage section in which a processing program for decoding the encrypted registration program is stored. Then, when the card is inserted into the Mf register* section, the biJ processing device uses the A11 processing program τ in the card to register the hσ Ilf encoded registration program corresponding to the card's identification code. A programmable maintenance method characterized by solving problems.
JP57168950A 1982-09-28 1982-09-28 Program protector Expired - Lifetime JPH0833819B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP57168950A JPH0833819B2 (en) 1982-09-28 1982-09-28 Program protector

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP57168950A JPH0833819B2 (en) 1982-09-28 1982-09-28 Program protector

Publications (2)

Publication Number Publication Date
JPS5958545A true JPS5958545A (en) 1984-04-04
JPH0833819B2 JPH0833819B2 (en) 1996-03-29

Family

ID=15877541

Family Applications (1)

Application Number Title Priority Date Filing Date
JP57168950A Expired - Lifetime JPH0833819B2 (en) 1982-09-28 1982-09-28 Program protector

Country Status (1)

Country Link
JP (1) JPH0833819B2 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2596173A1 (en) * 1986-03-20 1987-09-25 Bull Sa OPTIONAL SYSTEM FOR PROTECTING ACCESS TO A COMPUTER, THE METHOD OF INITIALIZING AND IMPLEMENTING THE PROTECTION AND THE USE OF THE PROTECTION SYSTEM IN A METHOD OF ACCESSING THE MACHINE
JPS6435628A (en) * 1987-07-31 1989-02-06 Hitachi Ltd Security device
JP2007299400A (en) * 2006-05-01 2007-11-15 Internatl Business Mach Corp <Ibm> Method for runtime memory executable separation, computer program, and data processing system (method and apparatus for runtime memory executable separation)
US8186416B2 (en) 2007-06-01 2012-05-29 Sintokogio, Ltd. Equipment for molding mold with molding flask and method for molding mold with molding flask

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2596173A1 (en) * 1986-03-20 1987-09-25 Bull Sa OPTIONAL SYSTEM FOR PROTECTING ACCESS TO A COMPUTER, THE METHOD OF INITIALIZING AND IMPLEMENTING THE PROTECTION AND THE USE OF THE PROTECTION SYSTEM IN A METHOD OF ACCESSING THE MACHINE
JPS6435628A (en) * 1987-07-31 1989-02-06 Hitachi Ltd Security device
JP2007299400A (en) * 2006-05-01 2007-11-15 Internatl Business Mach Corp <Ibm> Method for runtime memory executable separation, computer program, and data processing system (method and apparatus for runtime memory executable separation)
US8695102B2 (en) 2006-05-01 2014-04-08 International Business Machines Corporation Controlling execution of executables between partitions in a multi-partitioned data processing system
US8186416B2 (en) 2007-06-01 2012-05-29 Sintokogio, Ltd. Equipment for molding mold with molding flask and method for molding mold with molding flask

Also Published As

Publication number Publication date
JPH0833819B2 (en) 1996-03-29

Similar Documents

Publication Publication Date Title
EP1050887B1 (en) Semiconductor memory card and data reading apparatus
US6230267B1 (en) IC card transportation key set
KR100287097B1 (en) Certification of cryptographic keys for chipcards
GB2354612A (en) Financial data store administrator validation by use of both a smart card and fingerprint checking
JP2006505045A (en) Biometric authentication system and method in delivery process
DE59209543D1 (en) Computer for the control center of a machine, especially a printing machine
JP3422502B2 (en) Data authentication method
CN100524256C (en) Method for storing and acquiring user data in data storage device and data security storage device
JPH11261550A (en) System and method for preventing electronic document forgery
JPS5958545A (en) program protection device
JP2000215280A (en) Identity certification system
JP2592856B2 (en) IC card issuing system
JPH10200522A (en) Ic card use enciphering method, system therefor and ic card
WO2006093238A1 (en) Authentication assisting device, authentication main device, integrated circuit, and authenticating method
JPH11282983A (en) Individual identification method by fingerprint data
JPS59123954A (en) Prevention system for illegal use of stored data
Ratha et al. Smartcard based authentication
US6708182B1 (en) Portable electronic apparatus and message processing method for decoding processing for message formats
JPS63184853A (en) Portable electronic apparatus
JP2002230511A (en) Multiple authentication portable information processing medium
FR2592502A1 (en) Authenticator with sequential memory storage
JPS6324339A (en) Card system
JP3108429B2 (en) Interface device for IC memory card
JPH05134863A (en) Method and apparatus for protecting data on recording medium
CN1987715A (en) A method of software protection