Affiliation:
1. Univ. of Birmingham, Birmingham, UK
2. U.C.W. Dyfed, UK
Abstract
A system that prevents illicit duplication of proprietary software is suggested. It entails the customization of the programs for each computer by encryption. The use of a public key cryptogram for this purpose means that anyone can customize programs, but neither other programmers nor the people having complete access to the target computer can obtain copies that will run on other machines. A possible implementation of the system is considered in some detail. It is based on a hardware security unit that is attached to the computer and that decrypts and obeys some parts of the program.
Publisher
Association for Computing Machinery (ACM)
Reference6 articles.
1. Spread spectrum communications--Myths and realities
2. de Visme G.H. Binary Sequences. English Univ. Press London 1971. de Visme G.H. Binary Sequences. English Univ. Press London 1971.
3. Implementation of Mitre public key cryptographic system
4. Cryptology in Transition
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献