JPS5958545A - program protection device - Google Patents
program protection deviceInfo
- Publication number
- JPS5958545A JPS5958545A JP57168950A JP16895082A JPS5958545A JP S5958545 A JPS5958545 A JP S5958545A JP 57168950 A JP57168950 A JP 57168950A JP 16895082 A JP16895082 A JP 16895082A JP S5958545 A JPS5958545 A JP S5958545A
- Authority
- JP
- Japan
- Prior art keywords
- program
- card
- processing
- identification code
- section
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
(57)【要約】本公報は電子出願前の出願データであるた
め要約のデータは記録されません。(57) [Summary] This bulletin contains application data before electronic filing, so abstract data is not recorded.
Description
【発明の詳細な説明】
(aJ 発明の技術分野
本発明は登漕されたプログラムの乱用を防止するプログ
ラム保躾方式に関すを。DETAILED DESCRIPTION OF THE INVENTION (aJ Technical Field of the Invention The present invention relates to a program maintenance method for preventing abuse of a registered program.
(b) 従来技術と間組点
処理システムにおいて、1面人専用のグログ2ム(例え
ばシステム開発用や応用プログラム等)を、予めシステ
ムに笠録しておき、これを該個人が利g:録済みの疏別
コードヶ入力する方法、或は紋織あ:」コードが記録も
れたIDカードを入力する方法などが採用されている。(b) Between the conventional technology and the system point processing system, log files (for example, for system development or application programs, etc.) exclusively for one person are recorded in the system in advance, and the log files can be used and recorded by the individual. Methods that have been adopted include inputting an already-used shobetsu code, or inputting an ID card with an omitted code.
このような従来方式では、繊別コード?入力すること紀
よシ、1面人専用の登録プログラム葡、他者が容易に利
用できるので、プログラムの伏留性を保ち得ない欠点1
冶する。In this conventional method, is there a sorting cord? Disadvantage 1: It is difficult to maintain the privacy of the program because it is easily used by others as it is a registered program only for one person.
cure
(C) 発明の目的
不発明は上記の欠点を解次するためになされたもので、
登踪プログラムの機密保持を容易とするノログラム保直
方式の提供を目的とする。(C) Purpose of the invention The non-invention was made to solve the above drawbacks,
The purpose is to provide a nologram maintenance method that makes it easier to maintain the confidentiality of disappearance programs.
(d)@明の4敗
本発明は、識別コードが配球されたIDカードと、読取
部と、登録プログラムの格納装置と、処理装置とを有し
、IDカードの読取部への挿入によ!1lLt取られた
該識別コードに対応する登録プロクラムの利用と許もす
るシステムにおいて、前記登録プログラムは1lHf号
化されて成るとともに、該1唐号化さ九た登録プログラ
ムをブ4読処理プログラムが格納された記1腫郡を有す
るカードを使用し、該カードを前記1洗取部に挿入した
際、該IDカードの識別コードに対応する前記暗号化さ
れた登録プログラムk N 「′JfJ記処哩装置が該
IDカード内の前記処理プログラム音用いて解読せしめ
ることを4bRとするプログラム保護方式である。(d) @ Ming's 4 losses The present invention includes an ID card on which an identification code is distributed, a reader, a storage device for a registered program, and a processing device. Yo! In a system that also allows the use of a registration program corresponding to the identification code that has been taken, the registration program is encoded with 1LHf, and the 1LHf-encoded registration program is processed by a 4-reading processing program. When a card having a stored ID card is used and the card is inserted into the washing unit, the encrypted registration program kN ''JfJ record corresponding to the identification code of the ID card is This is a 4bR program protection system that allows the device to decode the processing program using the sound of the processing program in the ID card.
(e) 元1男の実施例
以下、不発明を図面によって説明する。図面は本発明の
一実施例を説明するブロック図であり、lはIDカード
、2は読取部、3はフロッピィディス、り、4は処理部
、5は王メモリ、6は出力部、Ai、t)fυ用省コー
ド、A’I′i照合用オU用者コード、Cは変換プログ
ラム、Dはデータ、■はインタプリータ、Lはローダ、
Mは記゛1意部、Poはロードプログラム、Plは解読
処理プログラムNP2は暗号化された登録プログラム、
PSは解読された登録プログラム、Sはシステム識別コ
ード S/は照合用システム識別コード、Tはテーブル
、a、 b、 e、 fは領域でおる。図面におけ
るIDカード1は記憶部M(ICメモリ)を有し、これ
に利用者コードA1データD1 ロードプログラムP。(e) Example of former first son The non-invention will be explained below with reference to drawings. The drawing is a block diagram illustrating an embodiment of the present invention, in which l is an ID card, 2 is a reading section, 3 is a floppy disk, 4 is a processing section, 5 is a memory, 6 is an output section, Ai, t) Save code for fυ, OU user code for A'I'i verification, C is conversion program, D is data, ■ is interpreter, L is loader,
M is a memory unique part, Po is a load program, Pl is a decryption processing program, NP2 is an encrypted registration program,
PS is the decoded registration program, S is the system identification code, S/ is the system identification code for verification, T is the table, and a, b, e, and f are the areas. The ID card 1 in the drawing has a storage section M (IC memory), in which a user code A1 data D1 and a load program P are stored.
、解読処理プログラムP、及びシステム識別コードSが
格納されている。一方フロソビイディスク3には暗号化
された登録プログラムP2と照合用利用者コードA′が
格納されておシ、また主メモリ5の領域すに照合用シス
テム識別コードS/が格納されている。, a decoding processing program P, and a system identification code S are stored. On the other hand, the encrypted registration program P2 and the user code A' for verification are stored in the Frosov disk 3, and the system identification code S/ for verification is stored in the area of the main memory 5. .
図面において、IDカード1が読取部2に挿入されると
、記憶部M内のロードプログラムPGが処理部1によっ
て実行はれる。このロードプログラムP。Ii記1.低
部M内のシステム識別コードSと、主メモリ5の領域す
に格納された照合用システム識別コードS′と全比較、
照合する。両者が一致したとき、ロードプログラムP。In the drawing, when an ID card 1 is inserted into a reading section 2, a load program PG in a storage section M is executed by a processing section 1. This load program P. II 1. A complete comparison of the system identification code S in the lower part M and the verification system identification code S' stored in the area S of the main memory 5;
Verify. When both match, load program P.
は、解読処理プログラムPIk主メモリ5の領域eにロ
ードせしめる。従って、とのm読処理プロゲラAP、が
処理部4によって実行されるが、その処理部J@は次の
ノts りである。IDカード1の記憶部M内の利用者
コードAと、フロップイディスク3内の照合用利用者コ
ードA′とを比較照合し、両者が一致したときには、フ
ロッピィディスク3内の暗号化された登録プログラムP
2全読出し、これを解読しながら主メモリ5の領域fに
格納せしめる。これによff1jl域fに解読された登
録プログラムP4カロードされたことになる。解読処理
プログラムP、は主メモリ5の領域eに示すように、ロ
ーダ” s 亥j4JlプログラムC1変換用のテーブ
ルTとで構成される。causes the decoding processing program PIk to be loaded into the area e of the main memory 5. Therefore, the m-reading processing Progera AP is executed by the processing unit 4, but the processing unit J@ is as follows. The user code A in the storage section M of the ID card 1 is compared with the verification user code A' in the floppy disk 3, and when the two match, the encrypted registration in the floppy disk 3 is Program P
2, and stores it in the area f of the main memory 5 while decoding it. This means that the decrypted registration program P4 has been loaded into the ff1jl area f. The decoding processing program P, as shown in area e of the main memory 5, is composed of a loader "s 亥j4J1 program C1 conversion table T".
すなわち暗号の解読は、変換プログラムCがテーブル1
゛を用いて行う。なお解読処理プログラムP。In other words, the conversion program C uses Table 1 to decrypt the code.
This is done using ゛. Note that the decoding processing program P.
はインタープリータlを内蔵するものであってもよい。may have a built-in interpreter l.
以上の処理により解読された登録プログラムP6は処理
部4によって実行され、例えはIDカード1の記1意部
M内のデータDについて所要の処理を行う。以上の実施
例では、各プログラムの実行は処理部4によって行った
が、IDカード1に記2の処j」部(1,SI化された
)を内蔵させ、これを用いて処理を代行させることもで
きる。The registration program P6 decoded through the above processing is executed by the processing section 4, and performs necessary processing on the data D in the memory section M of the ID card 1, for example. In the above embodiment, each program was executed by the processing section 4, but the ID card 1 may have a built-in processing section (1, converted to SI) described in 2, and use this to perform the processing on behalf of the ID card 1. You can also do that.
(f) 発明の効果
以上のように不発8Atユ、1;u用省が専用する登録
プログラム金暗号化し、一方これ?]l?解読するプロ
グラムをIDカードに内蔵せしめることにより、登録プ
ログラムの振蜜保持全容易とする利点を有する。(f) More than the effect of the invention, the unexploited 8Atyu, 1;U Ministry of Finance dedicated registration program gold encryption, while this? ]l? By incorporating the decoding program into the ID card, there is an advantage that the registration program can be easily maintained.
4、図m1の間年な直切
図面は不発明の一実施例全説明するブロック図フロッピ
ィディスク、4ilS1.処理部、5は主メモリ、6は
出力部、Aは利用者コード、A′は照合用利用者コード
、Ctri変換プログラム、Dはデータ、■はインタプ
リータ、Lはローダ、Mは記憶部、P。4. The straight-cut drawing in Figure m1 is a block diagram floppy disk fully explaining an embodiment of the invention, 4ilS1. Processing section, 5 is main memory, 6 is output section, A is user code, A' is user code for verification, Ctri conversion program, D is data, ■ is interpreter, L is loader, M is storage section, P .
はロードプログラム、PIは解読処理プログラム、P、
は暗号化された登録プログラム、PGは解読された登録
プログラム、Sはシステム識別コード、S′は照合用シ
ステム識別コード、Tr/iテーブル、a、 b、 e
、 fI′i領域を示す。is the loading program, PI is the decoding processing program, P,
is the encrypted registration program, PG is the decrypted registration program, S is the system identification code, S' is the system identification code for verification, Tr/i table, a, b, e
, indicates the fI'i region.
Claims (1)
グラムの格納装置と、処理装置とを有し、カードの読取
部への庫人によジ読取られた、該識別コードに対応する
登録プログラムの利用が許容゛されるシステムに2いて
、前記萱録プログラムは暗号化されてなるとおもに、眼
暗号化された登録プログラムを解読処理する処理プログ
ラムが格納された一1息部を有するカードを使用し、該
カードをMf記院*部に挿入した際、該カードの識別コ
ードに対応するhσ記Ilf号化された登録プログラム
を、biJ記処理装置が該カード内のA11記処理プロ
グラムτ用いて解ωシぜしめることを特徴とするプログ
ラム保禮方式。A registration program corresponding to the identification code, which comprises a card on which an identification code is recorded, a reading section, a storage device for a registration program, and a processing device, and is read by a custodian into the reading section of the card. 2, the registration program is encrypted, and a card is used that has a storage section in which a processing program for decoding the encrypted registration program is stored. Then, when the card is inserted into the Mf register* section, the biJ processing device uses the A11 processing program τ in the card to register the hσ Ilf encoded registration program corresponding to the card's identification code. A programmable maintenance method characterized by solving problems.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP57168950A JPH0833819B2 (en) | 1982-09-28 | 1982-09-28 | Program protector |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP57168950A JPH0833819B2 (en) | 1982-09-28 | 1982-09-28 | Program protector |
Publications (2)
Publication Number | Publication Date |
---|---|
JPS5958545A true JPS5958545A (en) | 1984-04-04 |
JPH0833819B2 JPH0833819B2 (en) | 1996-03-29 |
Family
ID=15877541
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP57168950A Expired - Lifetime JPH0833819B2 (en) | 1982-09-28 | 1982-09-28 | Program protector |
Country Status (1)
Country | Link |
---|---|
JP (1) | JPH0833819B2 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2596173A1 (en) * | 1986-03-20 | 1987-09-25 | Bull Sa | OPTIONAL SYSTEM FOR PROTECTING ACCESS TO A COMPUTER, THE METHOD OF INITIALIZING AND IMPLEMENTING THE PROTECTION AND THE USE OF THE PROTECTION SYSTEM IN A METHOD OF ACCESSING THE MACHINE |
JPS6435628A (en) * | 1987-07-31 | 1989-02-06 | Hitachi Ltd | Security device |
JP2007299400A (en) * | 2006-05-01 | 2007-11-15 | Internatl Business Mach Corp <Ibm> | Method for runtime memory executable separation, computer program, and data processing system (method and apparatus for runtime memory executable separation) |
US8186416B2 (en) | 2007-06-01 | 2012-05-29 | Sintokogio, Ltd. | Equipment for molding mold with molding flask and method for molding mold with molding flask |
-
1982
- 1982-09-28 JP JP57168950A patent/JPH0833819B2/en not_active Expired - Lifetime
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2596173A1 (en) * | 1986-03-20 | 1987-09-25 | Bull Sa | OPTIONAL SYSTEM FOR PROTECTING ACCESS TO A COMPUTER, THE METHOD OF INITIALIZING AND IMPLEMENTING THE PROTECTION AND THE USE OF THE PROTECTION SYSTEM IN A METHOD OF ACCESSING THE MACHINE |
JPS6435628A (en) * | 1987-07-31 | 1989-02-06 | Hitachi Ltd | Security device |
JP2007299400A (en) * | 2006-05-01 | 2007-11-15 | Internatl Business Mach Corp <Ibm> | Method for runtime memory executable separation, computer program, and data processing system (method and apparatus for runtime memory executable separation) |
US8695102B2 (en) | 2006-05-01 | 2014-04-08 | International Business Machines Corporation | Controlling execution of executables between partitions in a multi-partitioned data processing system |
US8186416B2 (en) | 2007-06-01 | 2012-05-29 | Sintokogio, Ltd. | Equipment for molding mold with molding flask and method for molding mold with molding flask |
Also Published As
Publication number | Publication date |
---|---|
JPH0833819B2 (en) | 1996-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1050887B1 (en) | Semiconductor memory card and data reading apparatus | |
US6230267B1 (en) | IC card transportation key set | |
KR100287097B1 (en) | Certification of cryptographic keys for chipcards | |
GB2354612A (en) | Financial data store administrator validation by use of both a smart card and fingerprint checking | |
JP2006505045A (en) | Biometric authentication system and method in delivery process | |
DE59209543D1 (en) | Computer for the control center of a machine, especially a printing machine | |
JP3422502B2 (en) | Data authentication method | |
CN100524256C (en) | Method for storing and acquiring user data in data storage device and data security storage device | |
JPH11261550A (en) | System and method for preventing electronic document forgery | |
JPS5958545A (en) | program protection device | |
JP2000215280A (en) | Identity certification system | |
JP2592856B2 (en) | IC card issuing system | |
JPH10200522A (en) | Ic card use enciphering method, system therefor and ic card | |
WO2006093238A1 (en) | Authentication assisting device, authentication main device, integrated circuit, and authenticating method | |
JPH11282983A (en) | Individual identification method by fingerprint data | |
JPS59123954A (en) | Prevention system for illegal use of stored data | |
Ratha et al. | Smartcard based authentication | |
US6708182B1 (en) | Portable electronic apparatus and message processing method for decoding processing for message formats | |
JPS63184853A (en) | Portable electronic apparatus | |
JP2002230511A (en) | Multiple authentication portable information processing medium | |
FR2592502A1 (en) | Authenticator with sequential memory storage | |
JPS6324339A (en) | Card system | |
JP3108429B2 (en) | Interface device for IC memory card | |
JPH05134863A (en) | Method and apparatus for protecting data on recording medium | |
CN1987715A (en) | A method of software protection |