최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0050749 (1993-04-20) |
발명자 / 주소 |
|
출원인 / 주소 |
|
인용정보 | 피인용 횟수 : 332 인용 특허 : 0 |
Remote control of the use of computer data is described in a system for renting computer software which derives use and billing information, prevents unauthorized use, maintains integrity of the software and controls related intercomputer communications. A user at a target computer “downloads”progra
Remote control of the use of computer data is described in a system for renting computer software which derives use and billing information, prevents unauthorized use, maintains integrity of the software and controls related intercomputer communications. A user at a target computer “downloads”programs or data, via a telephone line and remote control modules, from a host computer. Usage of the programs or data by the target computer or other accounting data are recorded and stored and, at predetermined times, the host computer “uploads”the usage data for processing. Other features include: (1) software and usage security for rental programs; (2) a polynomial generator/checker for generating block check characters for assuring integrity of data transmitted and received; (3) a voice-data switch for switching between data communication and normal telephone communication; and (4) an audio amplifier and speaker for monitoring of activity on the communication line during data transfers.
A method of protecting the security of a computer program comprising the steps of: selecting at least one portion of said computer program essential to the correct operation of the computer program, said computer program not operable without said portion; encrypting said portion with a first encrypt
A method of protecting the security of a computer program comprising the steps of: selecting at least one portion of said computer program essential to the correct operation of the computer program, said computer program not operable without said portion; encrypting said portion with a first encryption key utilized by an encryption means; adding a decryption program to the operating system of a computer in which said computer program is to be run, said decryption program including a procedure for initiating the decryption of said portion of said computer program; fetching the encrypted version of said portion of said computer program; sending the encrypted version of said portion of said computer program to a decryption means associated with said computer in which said computer program is to be run; decrypting said encrypted portion under the control of said decryption program to form a decrypted module, utilizing said first encryption key in said decryption means of said computer on which said computer program is to be run; transferring said decrypted module from said decryption means to said computer for execution along with said computer program; and deleting said decrypted module from said computer when execution of said computer program is complete, said decryption program initiating said deletion of said decrypted module.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.