Processing

Please wait...

Settings

Settings

Goto Application

1. WO1988002142 - DATA PROCESSING SYSTEM SECURITY

Publication Number WO/1988/002142
Publication Date 24.03.1988
International Application No. PCT/GB1987/000662
International Filing Date 21.09.1987
IPC
G06F 1/00 2006.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
1Details not covered by groups G06F3/-G06F13/82
G06F 21/12 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
12Protecting executable software
G06F 21/80 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
78to assure secure storage of data
80in storage media based on magnetic or optical technology, e.g. disks with sectors
G06F 9/445 2006.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
9Arrangements for program control, e.g. control units
06using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
44Arrangements for executing specific programs
445Program loading or initiating
CPC
G06F 21/12
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
12Protecting executable software
G06F 21/80
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
78to assure secure storage of data
80in storage media based on magnetic or optical technology, e.g. disks with sectors
G06F 2221/0744
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
2221Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
07Indexing scheme relating to G06F21/10, protecting distributed programs or content
0722Content
0744Unique instance
G06F 8/60
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
8Arrangements for software engineering
60Software deployment
Applicants
  • LOOPFINISH LIMITED [GB]/[GB] (AllExceptUS)
  • RUSSELL, Roger [GB]/[GB] (UsOnly)
  • CHARRINGTON, Neil, Tracey, Wignall [GB]/[GB] (UsOnly)
Inventors
  • RUSSELL, Roger
  • CHARRINGTON, Neil, Tracey, Wignall
Agents
  • JACKSON, David, Spence
Priority Data
862257219.09.1986GB
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) DATA PROCESSING SYSTEM SECURITY
(FR) PROTECTION DE SYSTEMES DE TRAITEMENT DE DONNEES
Abstract
(EN)
A first security program (Y) is initially installed in the long-term storage region (16) together with a second security program (Z). A date item (X) is also installed in another long-term storage region (15). The first security program (Y) tests whether the current date provided by a calendar (C) is the same as the installation date in item (X) and, only if true, creates a copy (X') in a region (11) of long-term storage. The copy (X') is arranged to not allow copying of itself. The security program (Y) finally deletes itself. The second security program (Z) requires absence of the program (Y) and presence of an accurate copy (X') in the region (11) before user access to the main contents of regions (15) and (16) is allowed.
(FR)
Un premier programme de sécurité (Y) est initialement installé dans une zone de mémoire à long terme (16) avec un deuxième programme de sécurité (Z). Un élément à date (X) est également installé dans une autre zone de mémoire à long terme (15). Le premier programme de sécurité (Y) vérifie si la date du jour fournie par un calendrier (C) correspond à la date d'installation l'élément (X), et dans le cas affirmatif, crée une copie (X') dans la région (11) de la mémoire à long terme. La copie (X') est conçue de façon à ne pas être reproduisible. Finalement, le programme de sécurité (Y) s'efface soi-même. Le deuxième programme de sécurité (Z) exige l'absence du programme (Y) et la présence d'une copie fidéle (X') dans le région (11) avant de permettre à l'utilisateur d'accéder au contenu principal des zones (15) et (16).
Also published as
Latest bibliographic data on file with the International Bureau