Unauthorized copying of programs on a magnetic disk is prevented by physically damaging some portion of the disk so that such area will not record any data. Attempts to read such damaged area always produce the same result regardless of any attempts to write in the damaged area. A routine is included within the program software to write and read at the damaged area. If the read pattern matches the written pattern, then the disk cannot be the original, but rather must be a copy of the original.
|Original language||English (US)|
|Number of pages||1|
|Journal||IBM Tech Disclosure Bull|
|State||Published - Jan 1985|
All Science Journal Classification (ASJC) codes