SOFTWARE COPY PROTECTION BY CONTROLLED UNRELIABILITY.

C. A. Gaston

Research output: Contribution to journalArticle

Abstract

Unauthorized copying of software programs on a magnetic disk is prevented by deliberately creating on the disk a data area which cannot be reliably read. Multiple attempts to read the data area will not produce identical results. A routine is embedded within the software which performs multiple reads on the data area every time a program is loaded from the disk. If multiple reads on the data area produce identical results, then this is an indication that the disk being read is a copy and not the original disk.

Original languageEnglish (US)
Pages (from-to)4791
Number of pages1
JournalIBM Tech Disclosure Bull
Volume27
Issue number8
StatePublished - Jan 1985

Fingerprint

Copying

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Cite this

Gaston, C. A. / SOFTWARE COPY PROTECTION BY CONTROLLED UNRELIABILITY. In: IBM Tech Disclosure Bull. 1985 ; Vol. 27, No. 8. pp. 4791.
@article{695e86583d334ae28089d20fa548eedc,
title = "SOFTWARE COPY PROTECTION BY CONTROLLED UNRELIABILITY.",
abstract = "Unauthorized copying of software programs on a magnetic disk is prevented by deliberately creating on the disk a data area which cannot be reliably read. Multiple attempts to read the data area will not produce identical results. A routine is embedded within the software which performs multiple reads on the data area every time a program is loaded from the disk. If multiple reads on the data area produce identical results, then this is an indication that the disk being read is a copy and not the original disk.",
author = "Gaston, {C. A.}",
year = "1985",
month = "1",
language = "English (US)",
volume = "27",
pages = "4791",
journal = "IBM Tech Disclosure Bull",
issn = "0018-8689",
number = "8",

}

SOFTWARE COPY PROTECTION BY CONTROLLED UNRELIABILITY. / Gaston, C. A.

In: IBM Tech Disclosure Bull, Vol. 27, No. 8, 01.1985, p. 4791.

Research output: Contribution to journalArticle

TY - JOUR

T1 - SOFTWARE COPY PROTECTION BY CONTROLLED UNRELIABILITY.

AU - Gaston, C. A.

PY - 1985/1

Y1 - 1985/1

N2 - Unauthorized copying of software programs on a magnetic disk is prevented by deliberately creating on the disk a data area which cannot be reliably read. Multiple attempts to read the data area will not produce identical results. A routine is embedded within the software which performs multiple reads on the data area every time a program is loaded from the disk. If multiple reads on the data area produce identical results, then this is an indication that the disk being read is a copy and not the original disk.

AB - Unauthorized copying of software programs on a magnetic disk is prevented by deliberately creating on the disk a data area which cannot be reliably read. Multiple attempts to read the data area will not produce identical results. A routine is embedded within the software which performs multiple reads on the data area every time a program is loaded from the disk. If multiple reads on the data area produce identical results, then this is an indication that the disk being read is a copy and not the original disk.

UR - http://www.scopus.com/inward/record.url?scp=0021817271&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0021817271&partnerID=8YFLogxK

M3 - Article

VL - 27

SP - 4791

JO - IBM Tech Disclosure Bull

JF - IBM Tech Disclosure Bull

SN - 0018-8689

IS - 8

ER -