SOFTWARE COPY PROTECTION BY CONTROLLED DAMAGE.

C. A. Gaston

Research output: Contribution to journalArticlepeer-review

Abstract

Unauthorized copying of programs on a magnetic disk is prevented by physically damaging some portion of the disk so that such area will not record any data. Attempts to read such damaged area always produce the same result regardless of any attempts to write in the damaged area. A routine is included within the program software to write and read at the damaged area. If the read pattern matches the written pattern, then the disk cannot be the original, but rather must be a copy of the original.

Original languageEnglish (US)
Pages (from-to)4788
Number of pages1
JournalIBM Tech Disclosure Bull
Volume27
Issue number8
StatePublished - Jan 1985

All Science Journal Classification (ASJC) codes

  • General Engineering

Fingerprint

Dive into the research topics of 'SOFTWARE COPY PROTECTION BY CONTROLLED DAMAGE.'. Together they form a unique fingerprint.

Cite this