Browse Prior Art Database

Access Protection Mechanism

IP.com Disclosure Number: IPCOM000043831D
Original Publication Date: 1984-Sep-01
Included in the Prior Art Database: 2005-Feb-05
Document File: 2 page(s) / 34K

Publishing Venue

IBM

Related People

Abernathy, RE: AUTHOR [+2]

Abstract

This article describes a software method for restricting access to software other than in association with specific hardware. This protection is achieved without use of special hardware. When providing both hardware and software to access a particular data base, it is desirable to ensure that the software is used on the provided hardware and not taken to another system. Existing schemes provide a hardware feature that can be interrogated by the host for this purpose. In the method disclosed herein each user of the data base has an identification and probably a password, to establish connection to the host. These can be transported to another system. The protection mechanism has a special location in the program file that contains an additional access code. This code is not known by the user, only by the host program.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 73% of the total text.

Page 1 of 2

Access Protection Mechanism

This article describes a software method for restricting access to software other than in association with specific hardware. This protection is achieved without use of special hardware. When providing both hardware and software to access a particular data base, it is desirable to ensure that the software is used on the provided hardware and not taken to another system. Existing schemes provide a hardware feature that can be interrogated by the host for this purpose. In the method disclosed herein each user of the data base has an identification and probably a password, to establish connection to the host. These can be transported to another system. The protection mechanism has a special location in the program file that contains an additional access code. This code is not known by the user, only by the host program. After the user has logged on, the host interrogates this code, and allows access only if the code matches the value maintained by the host. This program file is kept on the fixed disk, so it cannot be transported to another machine. To ensure that the user does not make multiple copies of the program file on several machines, the host will modify the access code after each successful logon. Thus, only the system that did the last logon can do the next, and so on. The first logon will be done when the machine is first installed. Accordingly, that machine must be used by that user from then on. Of course, the host will ensur...