WO1992021082A1 - Pointing device for a computer and computer cooperating with a pointing device - Google Patents

Pointing device for a computer and computer cooperating with a pointing device Download PDF

Info

Publication number
WO1992021082A1
WO1992021082A1 PCT/GB1992/000815 GB9200815W WO9221082A1 WO 1992021082 A1 WO1992021082 A1 WO 1992021082A1 GB 9200815 W GB9200815 W GB 9200815W WO 9221082 A1 WO9221082 A1 WO 9221082A1
Authority
WO
WIPO (PCT)
Prior art keywords
computer
pointing device
data
label
software
Prior art date
Application number
PCT/GB1992/000815
Other languages
French (fr)
Inventor
Peter James Langley
Original Assignee
Eden Group Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GB919109469A external-priority patent/GB9109469D0/en
Application filed by Eden Group Limited filed Critical Eden Group Limited
Publication of WO1992021082A1 publication Critical patent/WO1992021082A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/033Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
    • G06F3/0354Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor with detection of 2D relative movements between the device, or an operating part thereof, and a plane or surface, e.g. 2D mice, trackballs, pens or pucks
    • G06F3/03545Pens or stylus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/033Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
    • G06F3/038Control and interface arrangements therefor, e.g. drivers or device-embedded control circuitry

Definitions

  • This invention relates to a pointing device for a computer and to a computer cooperating with a pointing device.
  • the pointing device is one that is used both as a pointing device for the computer, for instance to provide graphics input to the computer or control the position of the cursor as well as provide further functions such as inhibiting software piracy and/or preventing unauthorised access to the computer.
  • This invention also relates to a method of inhibiting software piracy.
  • GUI graphical user interface
  • SUBSTITUTE SHEET extremely inconvenient to the user who has a computer with integral mass storage on which software would otherwise be copied onto for fast and convenient subsequent access. It also means that a disc drive of the machine is occupied.
  • Another solution is to provide a hardware protection device that is, typically, connected to the parallel port of the computer.
  • a hardware protection device typically contains a unique serial number that is known to a given piece of application software.
  • the system works by enabling the computer to query the protection device and compare the response with the serial number known to the software. Only when there is a match is the software useable.
  • a typical device is the Sentinel (TM) from Rainbow Technologies of Irvine, California.
  • TM Sentinel
  • the protection devices themselves are relatively expensive to manufacture. They are also unpopular with users since, as each copy protected program has an associated device, any user with several such programs has to either connect the protection devices in parallel, which is ungainly and somewhat physically vulnerable or permanendy install them within the casing of the computer, which is inconvenient.
  • Another problem is the difficulty in providing adequate security for stored data, for example protection from unauthorised access. It is known to solve this problem by providing a software access protocol to be satisfied when logging on to the system. Generally ,this requires certain code words to be keyed in by the user; this approach has the disadvantage of requiring the user to memorise the code word. Additionally, it is known to provide for each user to have a smart card that can be read by a peripheral smart card reader which can sanction use of the machine at a predetermined access level.
  • a further problem is to provide for valuable data to be protected from damage from hazards such as fire etc.
  • the mass storage medium of the computer has been arranged to be physically removable to a safe place to meet this need.
  • a further problem is in providing for the transfer of data between computers that are not linked by a data communications channel. Commonly, this can be met by downloading the data onto a floppy disc in the source machine and then physically taking the disc and loading it into the recipient machine. It will be appreciated that problems of adequate physical security and ease of physical transportability can overlap to some extent.
  • the objects of the present invention are to provide a pointing device for a computer and a computer cooperating with a pointing device that allows the above problems to be solved.
  • a pointing device for a computer comprises electronic memory means for storing stored data; and data transmission means for transmitting data or control signals between the memory means and the computer.
  • the stored data can include an access code that allows the user to enter the computer system to a predetermined level of confidentiality and the transmission means may then be operable to transmit the access code to the computer; and the computer may comprise electronic recognition means for recognising the access code and allowing access appropriate to the access code recognised.
  • a pointing devices e.g a pen-like stylus for a pen computer, that is not permanently connected to a computer: the user can simply take the stylus with him when s/he moves away from the computer, thereby disabling the computer.
  • This approach may be preferable to using a smart card since it removes the need for a smart card reader, thus reducing the cost of the system. Users may also find it more convenient since it means.
  • the present invention addresses this by providing that the data stored in the memory means comprises information that can be displayed on a display of the computer, the displayed information comprising a menu of false and true statements, whereby the user must select the true statement or statements displayed in order to access further data.
  • the user could program the pointing device with questions and related biographic data so that the computer would display a question e.g. "what was the name of your first pet?" and provide a menu of possible answers. The user would have to select the correct answer using the pointing device in order to gain further access to the system. Generally, there would be several such question and answers programmed into the pointing device so that the user would have to answer several correctly before access would be granted. The order in which the user would be asked questions would preferably be arranged to vary.
  • the computer may also be operable to download data to the pointing device. This may be useful if the user wants to keep a record of this data in a safe place. It will be appreciated that storing a pointing device in a place secure from thieves or hazards such as fire will be easier than removing and storing a bulk storage medium such as a removable hard disk assembly. This approach may be particularly convenient when the pointing device is a stylus.
  • the user may want to transfer data from one computer to another but either cannot physically connect them via a data line or chooses not to for security reasons.
  • the user need simply download the data to the pointing device from the source computer and then take the pointing device to the recipient machine and input the data.
  • This approach to transferring data will be particularly attractive where either of the source or recipient computers have no floppy disc drives, as is the case with the current generation of keyboardless computers. Again, this approach may be particularly convenient when the pointing device is a stylus.
  • the computer may then be operable to erase downloaded data from its own memory store, thereby rendering the data stored on the pointing device the sole store for that data. This may be useful in high security areas where the ease of concealment and safe keeping of the pointing device would be advantageous.
  • a further advantage in providing a memory in the pointing device is that if the pointing device does get lost, then if the personal details [i.e. name and address etc] of the user are stored in it, the pointing device may be easily returnable. By providing some information in non-erasable form, for instance the name of the owner, it will always subsequently be possible to identify the owner. Similarly, information that has to remain specific to the user and non-corruptable for security reasons can also be recorded in non-erasable form.
  • the computer may be arranged to write an identifier corresponding to that label, or data derived from that label, onto any software loaded onto the computer that is capable of being written to and does not already comprise any data recognisable to the computer as an identifier. This will generally occur when original [non-pirated] software is loaded onto the computer for the first time.
  • the computer rnay then be further adapted to check whether any identifier on the software program and the label (if any) of the pointing device correspond to one another and only allow the software to be accessed or run at a full level of functionality if the label and identifier do correspond correctly.
  • the software can still be run but only at a reduced level of functionality. For example, the user may be able to see the operation of the major program features but be unable to execute certain essential steps such as saving his input or printing it. In this way, the user can be given a disk that shows what the program can do but is of no practical use, i.e. a demonstration disk. Only when the user acquires a pointing device with a recognisable label will the disk become of practical use. Presently, demonstration disks are often of very limited functionality and would be disposed of if the program were purchased, which is clearly wasteful.
  • this process of user verification may also be arranged to take place at intervals, predetermined or random, during the actual use of the program. This avoids the problem of an authorised user starting the software with his own correctly labelled pointing device but then allowing an unauthorised user to continue by using an incorrectly labelled pointing device.
  • This process of labelling software with a label identical or derivable from a label installed in the pointing device is a process readily automated and one that can be made relatively inconspicuous to the user, who is therefore not inconvenienced by the process.
  • the pointing device is a mouse or a stylus.
  • the copy protection character of the device is masked by the utility to the user of the device. Consequently, it does not suffer from the perceived inconvenience that has made peripheral copy protection devices unattractive to purchasers and, therefore, software vendors.
  • by integrating the copy protection components into a device that has to connect to the computer anyway there are very significant cost savings since no new data connectors or casings have to be provided, unlike prior art systems. Additionally, the user is faced with no extra devices to incorporate or plug into the computer, again unlike prior art approaches.
  • the term 'pointing device' includes within its
  • scope any device that allows the user to input screen co-ordinate related information.
  • a computer cooperating with a pointing device, the pointing device being a pointing device in accordance with the first aspect of the invention.
  • the computer in this aspect comprises a pointing device, which pointing device comprises memory means capable of storing data; and further comprises data transmission means for transmitting data or control signals to or from the memory means.
  • the said data comprises an access code that allows the user to enter the computer to a predetermined level of confidentiality and the transmission means is operable to transmit the access code to the computer, then the computer
  • SUBSTITUTE SHEET comprises electronic recognition means for recognising the access code and allowing access appropriate to the access code recognised.
  • the computer may be operable to download data to the memory means via the transmission means.
  • the computer may comprise an internal memory store and be operable to erase data downloaded to a pointing device from the said internal memory store.
  • the computer may be adapted to write an identifier corresponding to that label, or data derived from that label, onto any software accessible to the computer that is capable of being written to and does not comprise any data recognisable to the computer as an identifier, and the computer may then be further adapted to check whether any identifier on the software program and the label of the pointing device corresponded to one another and only allow the software to be accessed or run at a full level of functionality if the label and identifier do correspond correctly.
  • the software can still be run but only at a reduced level of functionality. For example, the user may be able to see the operation of the major program features but be unable to execute certain essential steps such as saving his input or printing it.
  • the computer may be arranged to check that the label and identifier correspond correctly at intervals, either predetermined or random, during the actual use of the software.
  • a process of manufacturing, programming or formatting a programmable memory device which device comprises a software program, with the facility for the program be tagged with a first indentifying signal, which signal is derived from a code stored on a pointing device of a computer that the memory device is initially used in, and further providing that the device is adapted so that when the program of the device is subsequently run, the identifying signal of the program and the code of the then attached pointing device is obtained by the computer at least once and that the program is unusable only if the identifying signal corresponds to the code stored in the then attached pointing device.
  • SUBSTITUTE SHEET memory device manufactured by such a process is within the ambit of the present invention, «as is a programmable memory device manufactured to co-operate with the computer within the scope of the second aspect of the invention as outlined above.
  • a programmable memory device is a floppy disc magnetic storage medium.
  • the term 'stylus' may be considered as covering those pen like pointing or drawing devices that are used to co-operate with a digitising pad.
  • Such pads may be pressure sensitive, in which event the pointing device would be essentially empty or solid apart from the integers referenced above.
  • the pad may for example comprise current sensing loops that can have a current induced in them by electro-magnetic coupling to an A.C. energised coil in the pointing device.
  • the pointing device would therefore have an A.C. coil and associated power wires as well as those integers more specifically referenced as defining the invention.
  • the stylus to act as the pick up and for the pad to be the magnetic filed source.
  • Figure 1 is a schematic cross section through a pointing device for a computer in accordance with the first aspect of the invention
  • FIG. 2 is a schematic representation of a computer, cooperating with a pointing device, in accordance with the present invention
  • a pointing device for a keyboardless computer 21, shown at reduced scale.
  • Keyboardless computers are available from a number of sources, including Eden Group Ltd, England. Since they are known in the art, they will not be described in detail here.
  • the pointing device is a stylus, shaped as a hollow cylinder, with a tapering cone 2 at one end. The cone 2 terminates in a nylon tip 3.
  • the tip 3 is the pan of the pointing device that contacts the surface of the computer 21 to be 'written onto', which in the present embodiment , is the glass of the display panel 30 of the computer 21.
  • Within the body of the pointing device 1 is provided a winding 4 that forms an A.C. energisable coil.
  • a power link 5 provides power for the coil 4 and itself draws power, via cable connection 10, from the computer 21.
  • Pointing device 1 also contains a small circuit board (not shown) on which are located a memory chip 6 which may be either EPROM or DRAM. Memory 6 is connected via bi ⁇ directional data path 7 to a data interface 8. Cable connection 10 provides a data link between data interface 8 and the computer 21.
  • a memory chip 6 which may be either EPROM or DRAM.
  • Memory 6 is connected via bi ⁇ directional data path 7 to a data interface 8.
  • Cable connection 10 provides a data link between data interface 8 and the computer 21.
  • the input arrangement for the computer 21 comprises an electromagnetic induction digitising mat or tablet 20 underlying the display 30, together with the electromagnetic pointing device 1 as described with reference to Figure 1.
  • the digitising mat 20 comprises an electrically conducting grid with conductors running parallel to an X-axis, overlaying a similar grid with conductors running parallel to a Y-axis.
  • the pointing device 1 comprises an energisable coil 4 which can be excited with alternating current .
  • the amplitude of the voltages induced in the conductive grids provide an indication of the position of the pointing device 1 relative to the Cartesian co-ordinate system defined by the X and Y axes.
  • the detailed operation of this form of digitiser is well known in this field. Further reference may be made, for example, to US 4570033. Using this digitising system, the user can easily and naturally input graphical information for storage and virtually simultaneous display on the display 30.
  • the digitising pad 20 is shown schematically underlying the LCD type display 30, although it may in practice be embedded within it.
  • the pointing device 1 is touching the LCD 30 and electrical signals indicative of the position (X Y Co-ordinates) at which it contacts the LCD 30 are supplied to an A to D convener 11 feeding a data path or system bus 15.
  • a CPU 12 is connected for bi-directional data flow to the bus 15, as is a RAM 17.
  • a ROM 18 is also connected to bus 15, being programmed with the operating system for the apparatus, including the telecommunications procedures and the word processing and graphics software which allows users to input, amend and edit textual or graphic information on screen using the pointing device.
  • CPU 12 provides all control signals via bus 15.
  • CPU 12 may be a microprocessor such as the 80286 manufactured by Intel Corporation.
  • a display driver 14 is connected to bus 15 and drives the display 30.
  • a data interface 19 connected to bus 15 for sending and receiving data information.
  • Data interface 19 may incorporate a modem should the network with which it is designed to be used require it.
  • Pointing device 1 is connected via cable connection 10, which includes a bi-directional data path, to data interface 19.
  • CPU 12 is thus able to interrogate the memory 6 in the pointing device 1, via the data interface 8 and data path 7, for any data stored therein and that data can be transmitted back down to CPU 12 in response, via the data interface 8 and data path 7.
  • Data path 7 and data interface 8 can be thought of as a transmission means which enables data transfer to occur.
  • this process of intenogation would allow the CPU 12 to verify that the pointing device 1 had a recognised access code and accord appropriate access to the user.
  • a pointing device embodying the present invention can store and communicate data with a computer.
  • the pointing device can be programmed to generate a display of original user defined answers and questions to which the immediate user must select the conect answer in order to access the system.
  • a funher alternative is for the pointing device to contain a description of the true user's signature.
  • RAM 17 which may be an EEPROM or magnetic bubble memory
  • data from RAM 17, which may be an EEPROM or magnetic bubble memory may be downloaded to memory 6 in the pointing device under the control of CPU 12, and the information downloaded may then be erased from RAM 17, thus providing the pointing device 1 as the sole store of that data.
  • memory 6 is user programmable by, for instance, inputting specified data to the computer 21 which specified data can then be transferred to the memory 6, then the user may personalise the pointing device by storing personal information on it. This possibility is a major advantage since it may greatly lessen the chance of the user casually losing the pointing device.
  • memory 6 in the pointing device 1 will be non-erasably programmed with a label, generally a factory code that uniquely identifies that panicular pointing device.
  • Memory 6 may for example be the Dallas Semiconductor component serial DS 2400.
  • the code may not be a fixed code but instead one that merely satisfies a predetermined algorithm. For instance, the first 5 digits of the code could be random but the subsequent 5 depend on those first five according to a pre-programmed algorithm. In such an embodiment, then in addition to the memory means 6 there would also be provided in the pointing device 1 a maths processor (not shown) capable of performing the required algorithmic computations.
  • the distribution disk may be formatted in a way that renders it illegible to the (typically) MS-DOS utility that would otherwise read the disk. There are a number of ways to achieve this, for example by formatting the disc with one or more tracks wholly or partially missing.
  • the install utility When the user installs a newly acquired item of software, for instance by loading floppy disc 22 into the floppy disc drive 23, s/he causes a pre-existing utility , capable of reading the discs, to operate.
  • the install utility first searches for a labelled pointing device and for an identifier code on the new software program.
  • the install utility may be disabled if it detects that the new software program has an identifier code, but one that differs from that associated with the attached labelled pointing device. Further, if it detects that no labelled pointing device is attached, then it
  • SUBSTITUTE SHEET may either not install the program onto the system or only partially install it, allowing the user to operate the program at only a reduced level of functionality. If, however, it detects that a labelled pointing device is present and that the software program has no identifier code, it proceeds to alter the program on the distribution disc with an identifier code and then install the program onto the system.
  • a program is altered with an identifier code when it is first accessed or run on a computer in accordance with this embodiment of the invention, assuming it has not been altered previously.
  • the install utility firstly recognises the absence of any identifier on the program and then proceeds to alter the software.
  • the identifier code can either be a serial code which is written into a number of predetermined locations of the program. It may either be identical to or derived from the label that identifies the pointing device. Generally, it will be derived from it using an algorithm that is not publicly disclosed. Further, or alternatively, the identifier code can be that encryption code that is required to unscramble certain parts of the program.
  • the install utility installs the program into the system.
  • each machine can be arranged to incorporate a pointing device with the same label.
  • each machine can be arranged for each serial identifier code to be written onto the software, the distribution disc being factory formatted to allow X different serial identifier codes to be incorporated.
  • the install utility recognises the presence of the identifying alterations and the presence of a labelled pointing device 1 and then proceeds to compare it with a record of the label of the pointing device 1. If the label and the identifier conespond, i.e. if the software program was first run on a machine using the pointing device that is now being used, then the install utility will allow the program to continue.
  • the install utility can be arranged to perform this verification process not only whenever a piece of software is accessed but during subsequent operation too.

Abstract

The mouse or stylus typically used in a personal computer utilising a graphical user interface has hitherto been used solely as a position indicating device and to send basic control signals. This invention discloses providing the mouse or stylus with an internal data store, together with a data communications facility, enabling a variety of new features to be provided, including a software copy protection procedure and automatic access to a predefined security level.

Description

Pointing device for a Computer and Computer cooperating with a
Pointing Device
Field of the Invention
This invention relates to a pointing device for a computer and to a computer cooperating with a pointing device. In particular, in each aspect the pointing device is one that is used both as a pointing device for the computer, for instance to provide graphics input to the computer or control the position of the cursor as well as provide further functions such as inhibiting software piracy and/or preventing unauthorised access to the computer. This invention also relates to a method of inhibiting software piracy.
Description of the Prior Art
Computers that solely have keyboards for data entry are incompatible with software that uses a graphical user interface (GUI). It is necessary to provide some sort of pointing device to take advantage of GUIs and a variety of such pointing devices have been developed. For instance, one can commonly use a mouse, trackball or stylus with a digitising Jablet. The stylus is a particularly convenient tool since it can be used not only as a pointing device but also as a writing device too if used in conjunction with a digitising tablet.
It is also well known to provide computers with no keyboard at all, relying instead on all control inputs being made by touching a stylus to a digitiser, commonly overlying or underlying the display (PUI: pen user interface). Such computers allow the input of graphical data, such as handwriting, which may, for example, be stored as a bit mapped image.
There are a variety of problems associated with the prior art approaches to the design of computers. Most significant is the possibility of unauthorised copying or use of software. The commonest solution to this problem is to make software copy protected - i.e the purchaser is able only to use the original discs that s/he has bought. This is often
SUBSTITUTE SHEET extremely inconvenient to the user who has a computer with integral mass storage on which software would otherwise be copied onto for fast and convenient subsequent access. It also means that a disc drive of the machine is occupied.
Another solution is to provide a hardware protection device that is, typically, connected to the parallel port of the computer. Such a device typically contains a unique serial number that is known to a given piece of application software. The system works by enabling the computer to query the protection device and compare the response with the serial number known to the software. Only when there is a match is the software useable. A typical device is the Sentinel (TM) from Rainbow Technologies of Irvine, California. This approach has, however, several drawbacks. The protection devices themselves are relatively expensive to manufacture. They are also unpopular with users since, as each copy protected program has an associated device, any user with several such programs has to either connect the protection devices in parallel, which is ungainly and somewhat physically vulnerable or permanendy install them within the casing of the computer, which is inconvenient. As a further alternative, the user could connect the appropriate device up whenever it is needed, but this is again inconvenient. Further, purchasers of software are often reluctant to be forced to acquire any sort of peripheral that affords no advantage to themselves. The perceived inconvenience to the potential purchaser of this approach to copy protection can mean that non-copy protected software is purchased in preference. Consequently, this form of copy protection device has met with only limited commercial success, and even then only in high cost applications such as computer aided design.
Another problem is the difficulty in providing adequate security for stored data, for example protection from unauthorised access. It is known to solve this problem by providing a software access protocol to be satisfied when logging on to the system. Generally ,this requires certain code words to be keyed in by the user; this approach has the disadvantage of requiring the user to memorise the code word. Additionally, it is known to provide for each user to have a smart card that can be read by a peripheral smart card reader which can sanction use of the machine at a predetermined access level.
A further problem is to provide for valuable data to be protected from damage from hazards such as fire etc. The mass storage medium of the computer has been arranged to be physically removable to a safe place to meet this need. A further problem is in providing for the transfer of data between computers that are not linked by a data communications channel. Commonly, this can be met by downloading the data onto a floppy disc in the source machine and then physically taking the disc and loading it into the recipient machine. It will be appreciated that problems of adequate physical security and ease of physical transportability can overlap to some extent.
Aims of the Invention
The objects of the present invention are to provide a pointing device for a computer and a computer cooperating with a pointing device that allows the above problems to be solved.
Statement of the invention
In accordance with a first aspect of the present invention, a pointing device for a computer comprises electronic memory means for storing stored data; and data transmission means for transmitting data or control signals between the memory means and the computer.
By giving the pointing device a data storage and communications capability, many of the above problems may be solved or rendered less serious.
For instance, the stored data can include an access code that allows the user to enter the computer system to a predetermined level of confidentiality and the transmission means may then be operable to transmit the access code to the computer; and the computer may comprise electronic recognition means for recognising the access code and allowing access appropriate to the access code recognised. This may be useful for a pointing devices, e.g a pen-like stylus for a pen computer, that is not permanently connected to a computer: the user can simply take the stylus with him when s/he moves away from the computer, thereby disabling the computer. This approach may be preferable to using a smart card since it removes the need for a smart card reader, thus reducing the cost of the system. Users may also find it more convenient since it means. they do not have to carry an IC card with them. This security verification process is conveniently entirely automatic so that it passes unnoticed to the authorised user, further contributing to the desirability of the approach of this aspect of the invention in comparison to prior art systems which rely on physical or electronic keys that have no other purpose except to allow access. One drawback to such a system is that if the user inadvertently forgets to take the pointing device with him when s/he leaves the computer, then anyone can access his system. Conveniently, the present invention addresses this by providing that the data stored in the memory means comprises information that can be displayed on a display of the computer, the displayed information comprising a menu of false and true statements, whereby the user must select the true statement or statements displayed in order to access further data. For example, the user could program the pointing device with questions and related biographic data so that the computer would display a question e.g. "what was the name of your first pet?" and provide a menu of possible answers. The user would have to select the correct answer using the pointing device in order to gain further access to the system. Generally, there would be several such question and answers programmed into the pointing device so that the user would have to answer several correctly before access would be granted. The order in which the user would be asked questions would preferably be arranged to vary.
The computer may also be operable to download data to the pointing device. This may be useful if the user wants to keep a record of this data in a safe place. It will be appreciated that storing a pointing device in a place secure from thieves or hazards such as fire will be easier than removing and storing a bulk storage medium such as a removable hard disk assembly. This approach may be particularly convenient when the pointing device is a stylus.
Additionally, the user may want to transfer data from one computer to another but either cannot physically connect them via a data line or chooses not to for security reasons. With the present invention, the user need simply download the data to the pointing device from the source computer and then take the pointing device to the recipient machine and input the data. This approach to transferring data will be particularly attractive where either of the source or recipient computers have no floppy disc drives, as is the case with the current generation of keyboardless computers. Again, this approach may be particularly convenient when the pointing device is a stylus.
Further, the computer may then be operable to erase downloaded data from its own memory store, thereby rendering the data stored on the pointing device the sole store for that data. This may be useful in high security areas where the ease of concealment and safe keeping of the pointing device would be advantageous.
A further advantage in providing a memory in the pointing device is that if the pointing device does get lost, then if the personal details [i.e. name and address etc] of the user are stored in it, the pointing device may be easily returnable. By providing some information in non-erasable form, for instance the name of the owner, it will always subsequently be possible to identify the owner. Similarly, information that has to remain specific to the user and non-corruptable for security reasons can also be recorded in non-erasable form.
If the pointing device has recorded in it a label such as a code or other data unique to that particular pointing device, then the computer may be arranged to write an identifier corresponding to that label, or data derived from that label, onto any software loaded onto the computer that is capable of being written to and does not already comprise any data recognisable to the computer as an identifier. This will generally occur when original [non-pirated] software is loaded onto the computer for the first time. The computer rnay then be further adapted to check whether any identifier on the software program and the label (if any) of the pointing device correspond to one another and only allow the software to be accessed or run at a full level of functionality if the label and identifier do correspond correctly. Thus, because software can be given a pointing device specific identifier and will not then function in a computer with a different pointing device, the current common practice of software piracy, i.e. making and using unlicensed copies of software, will be eliminated. It will be appreciated that all software using GUI or PUI is protectable in this way.
In one embodiment, if no correct label match is found, then the software can still be run but only at a reduced level of functionality. For example, the user may be able to see the operation of the major program features but be unable to execute certain essential steps such as saving his input or printing it. In this way, the user can be given a disk that shows what the program can do but is of no practical use, i.e. a demonstration disk. Only when the user acquires a pointing device with a recognisable label will the disk become of practical use. Presently, demonstration disks are often of very limited functionality and would be disposed of if the program were purchased, which is clearly wasteful. Conveniently, this process of user verification may also be arranged to take place at intervals, predetermined or random, during the actual use of the program. This avoids the problem of an authorised user starting the software with his own correctly labelled pointing device but then allowing an unauthorised user to continue by using an incorrectly labelled pointing device.
This process of labelling software with a label identical or derivable from a label installed in the pointing device is a process readily automated and one that can be made relatively inconspicuous to the user, who is therefore not inconvenienced by the process.
Preferably, the pointing device is a mouse or a stylus. This is a particularly convenient embodiment since the copy protection character of the device is masked by the utility to the user of the device. Consequently, it does not suffer from the perceived inconvenience that has made peripheral copy protection devices unattractive to purchasers and, therefore, software vendors. Additionally, by integrating the copy protection components into a device that has to connect to the computer anyway, there are very significant cost savings since no new data connectors or casings have to be provided, unlike prior art systems. Additionally, the user is faced with no extra devices to incorporate or plug into the computer, again unlike prior art approaches.
For the avoidance of doubt, however, the term 'pointing device' includes within its
« scope any device that allows the user to input screen co-ordinate related information.
In accordance with a second aspect of the invention, there is provided a computer cooperating with a pointing device, the pointing device being a pointing device in accordance with the first aspect of the invention.
More specifically, the computer in this aspect comprises a pointing device, which pointing device comprises memory means capable of storing data; and further comprises data transmission means for transmitting data or control signals to or from the memory means.
Conveniently, where the said data comprises an access code that allows the user to enter the computer to a predetermined level of confidentiality and the transmission means is operable to transmit the access code to the computer, then the computer
SUBSTITUTE SHEET comprises electronic recognition means for recognising the access code and allowing access appropriate to the access code recognised.
The computer may be operable to download data to the memory means via the transmission means.
Further, the computer may comprise an internal memory store and be operable to erase data downloaded to a pointing device from the said internal memory store.
Advantageously, where the data stored in the memory means of the pointing device comprises a label such as a code or other data unique to that particular pointing device, then the computer may be adapted to write an identifier corresponding to that label, or data derived from that label, onto any software accessible to the computer that is capable of being written to and does not comprise any data recognisable to the computer as an identifier, and the computer may then be further adapted to check whether any identifier on the software program and the label of the pointing device corresponded to one another and only allow the software to be accessed or run at a full level of functionality if the label and identifier do correspond correctly. Conveniently, if no correct label match is found, then the software can still be run but only at a reduced level of functionality. For example, the user may be able to see the operation of the major program features but be unable to execute certain essential steps such as saving his input or printing it.
Also, the computer may be arranged to check that the label and identifier correspond correctly at intervals, either predetermined or random, during the actual use of the software.
In still further aspects of the invention, there is provided a process of manufacturing, programming or formatting a programmable memory device, which device comprises a software program, with the facility for the program be tagged with a first indentifying signal, which signal is derived from a code stored on a pointing device of a computer that the memory device is initially used in, and further providing that the device is adapted so that when the program of the device is subsequently run, the identifying signal of the program and the code of the then attached pointing device is obtained by the computer at least once and that the program is unusable only if the identifying signal corresponds to the code stored in the then attached pointing device. A programmable
SUBSTITUTE SHEET memory device manufactured by such a process is within the ambit of the present invention,«as is a programmable memory device manufactured to co-operate with the computer within the scope of the second aspect of the invention as outlined above. Conveniently, a programmable memory device is a floppy disc magnetic storage medium.
The term 'stylus', for the avoidance of doubt, may be considered as covering those pen like pointing or drawing devices that are used to co-operate with a digitising pad. Such pads may be pressure sensitive, in which event the pointing device would be essentially empty or solid apart from the integers referenced above. Conversely, the pad may for example comprise current sensing loops that can have a current induced in them by electro-magnetic coupling to an A.C. energised coil in the pointing device. In such an embodiment, the pointing device would therefore have an A.C. coil and associated power wires as well as those integers more specifically referenced as defining the invention. It is also possible for the stylus to act as the pick up and for the pad to be the magnetic filed source.
Brief Description of the Drawings
The invention will now be described with reference to the accompanying drawings in which :
Figure 1 is a schematic cross section through a pointing device for a computer in accordance with the first aspect of the invention;
Figure 2 is a schematic representation of a computer, cooperating with a pointing device, in accordance with the present invention
Detailed Description
Referring now to Figure I, there is shown a pointing device, indicated generally at 1, for a keyboardless computer 21, shown at reduced scale. Keyboardless computers are available from a number of sources, including Eden Group Ltd, England. Since they are known in the art, they will not be described in detail here. The pointing device is a stylus, shaped as a hollow cylinder, with a tapering cone 2 at one end. The cone 2 terminates in a nylon tip 3. The tip 3 is the pan of the pointing device that contacts the surface of the computer 21 to be 'written onto', which in the present embodiment , is the glass of the display panel 30 of the computer 21. Within the body of the pointing device 1 is provided a winding 4 that forms an A.C. energisable coil. A power link 5 provides power for the coil 4 and itself draws power, via cable connection 10, from the computer 21.
Pointing device 1 also contains a small circuit board (not shown) on which are located a memory chip 6 which may be either EPROM or DRAM. Memory 6 is connected via bi¬ directional data path 7 to a data interface 8. Cable connection 10 provides a data link between data interface 8 and the computer 21.
Referring now to Figure 2, a display 30, preferably comprising a LCD type display, is shown forming part of a keyboardless computer as indicated at 21 in Figure 1. The input arrangement for the computer 21 comprises an electromagnetic induction digitising mat or tablet 20 underlying the display 30, together with the electromagnetic pointing device 1 as described with reference to Figure 1. The digitising mat 20 comprises an electrically conducting grid with conductors running parallel to an X-axis, overlaying a similar grid with conductors running parallel to a Y-axis. As described above, the pointing device 1 comprises an energisable coil 4 which can be excited with alternating current . The amplitude of the voltages induced in the conductive grids provide an indication of the position of the pointing device 1 relative to the Cartesian co-ordinate system defined by the X and Y axes. The detailed operation of this form of digitiser is well known in this field. Further reference may be made, for example, to US 4570033. Using this digitising system, the user can easily and naturally input graphical information for storage and virtually simultaneous display on the display 30.
It will be appreciated that a variety of components, e.g. a power supply, is necessary for the functioning of the apparatus and will have to be present in the apparatus but these are not expressly detailed here in the interests of brevity and clarity.
The digitising pad 20 is shown schematically underlying the LCD type display 30, although it may in practice be embedded within it. The pointing device 1 is touching the LCD 30 and electrical signals indicative of the position (X Y Co-ordinates) at which it contacts the LCD 30 are supplied to an A to D convener 11 feeding a data path or system bus 15. A CPU 12 is connected for bi-directional data flow to the bus 15, as is a RAM 17. A ROM 18 is also connected to bus 15, being programmed with the operating system for the apparatus, including the telecommunications procedures and the word processing and graphics software which allows users to input, amend and edit textual or graphic information on screen using the pointing device.
CPU 12 provides all control signals via bus 15. CPU 12 may be a microprocessor such as the 80286 manufactured by Intel Corporation.
A display driver 14 is connected to bus 15 and drives the display 30. In addition there is provided a data interface 19 connected to bus 15 for sending and receiving data information. Data interface 19 may incorporate a modem should the network with which it is designed to be used require it.
Pointing device 1 is connected via cable connection 10, which includes a bi-directional data path, to data interface 19. CPU 12 is thus able to interrogate the memory 6 in the pointing device 1, via the data interface 8 and data path 7, for any data stored therein and that data can be transmitted back down to CPU 12 in response, via the data interface 8 and data path 7. Data path 7 and data interface 8 can be thought of as a transmission means which enables data transfer to occur.
Typically,* this process of intenogation would allow the CPU 12 to verify that the pointing device 1 had a recognised access code and accord appropriate access to the user.
There are, however, a multitude of different uses which can be made of the capability of a pointing device embodying the present invention to store and communicate data with a computer. For example, where the user is concerned that an unauthorised person may gain access to his system if s/he should accidently lose his stylus or leave it connected to the computer when absent from it, then the pointing device can be programmed to generate a display of original user defined answers and questions to which the immediate user must select the conect answer in order to access the system. A funher alternative is for the pointing device to contain a description of the true user's signature. When the user seeks access to the system, s/he is required to perform his signature so that signature verification can take place to allow access to the system associated with that signature The approach to programming the device in these ways is within the compass of those skilled in the an and will not therefore be elaborated here. By way of a further example, data from RAM 17, which may be an EEPROM or magnetic bubble memory, may be downloaded to memory 6 in the pointing device under the control of CPU 12, and the information downloaded may then be erased from RAM 17, thus providing the pointing device 1 as the sole store of that data. Further, if memory 6 is user programmable by, for instance, inputting specified data to the computer 21 which specified data can then be transferred to the memory 6, then the user may personalise the pointing device by storing personal information on it. This possibility is a major advantage since it may greatly lessen the chance of the user casually losing the pointing device.
For the apparatus to operate as one which inhibits the copying of software, memory 6 in the pointing device 1 will be non-erasably programmed with a label, generally a factory code that uniquely identifies that panicular pointing device. Memory 6 may for example be the Dallas Semiconductor component serial DS 2400. The code may not be a fixed code but instead one that merely satisfies a predetermined algorithm. For instance, the first 5 digits of the code could be random but the subsequent 5 depend on those first five according to a pre-programmed algorithm. In such an embodiment, then in addition to the memory means 6 there would also be provided in the pointing device 1 a maths processor (not shown) capable of performing the required algorithmic computations.
When the user acquires a new piece of software on a distribution disk that software will not yet be uniquely identified in dependence on the label in the pointing device of the user. The distribution disk, to prevent copying at this stage, may be formatted in a way that renders it illegible to the (typically) MS-DOS utility that would otherwise read the disk. There are a number of ways to achieve this, for example by formatting the disc with one or more tracks wholly or partially missing.
When the user installs a newly acquired item of software, for instance by loading floppy disc 22 into the floppy disc drive 23, s/he causes a pre-existing utility , capable of reading the discs, to operate. The install utility first searches for a labelled pointing device and for an identifier code on the new software program. The install utility may be disabled if it detects that the new software program has an identifier code, but one that differs from that associated with the attached labelled pointing device. Further, if it detects that no labelled pointing device is attached, then it
SUBSTITUTE SHEET may either not install the program onto the system or only partially install it, allowing the user to operate the program at only a reduced level of functionality. If, however, it detects that a labelled pointing device is present and that the software program has no identifier code, it proceeds to alter the program on the distribution disc with an identifier code and then install the program onto the system.
A program is altered with an identifier code when it is first accessed or run on a computer in accordance with this embodiment of the invention, assuming it has not been altered previously. Hence, if the program is an authorised unused program, then the install utility firstly recognises the absence of any identifier on the program and then proceeds to alter the software. The identifier code can either be a serial code which is written into a number of predetermined locations of the program. It may either be identical to or derived from the label that identifies the pointing device. Generally, it will be derived from it using an algorithm that is not publicly disclosed. Further, or alternatively, the identifier code can be that encryption code that is required to unscramble certain parts of the program.
Once the distribution disc is altered in this way, the install utility installs the program into the system.
If a user has X number of machines on which s/he wants to run a given piece of software, then each machine can be arranged to incorporate a pointing device with the same label. Alternatively, if each machine has a pointing device with a different label, then it can be arranged for each serial identifier code to be written onto the software, the distribution disc being factory formatted to allow X different serial identifier codes to be incorporated.
When the program, now marked with the identifier, is used again, the install utility recognises the presence of the identifying alterations and the presence of a labelled pointing device 1 and then proceeds to compare it with a record of the label of the pointing device 1. If the label and the identifier conespond, i.e. if the software program was first run on a machine using the pointing device that is now being used, then the install utility will allow the program to continue. The install utility can be arranged to perform this verification process not only whenever a piece of software is accessed but during subsequent operation too.

Claims

Claims
1. Pointing device for a computer comprising memory means capable of storing data; and data transmission means for transmitting data or control signals between the memory means and the computer.
2. Pointing device for a computer as claimed in Claim 1 wherein the data comprises an access code that allows the user to enter the computer to a predetermined level of confidentiality; the transmission means is operable to transmit the access code to the computer; and the computer comprises electronic recognition means for recognising the access code and allowing access appropriate to the access code recognised.
3. Pointing device for a computer as claimed in either Claim 1 or Claim 2 wherein the computer is operable to download data to the memory means via the transmission means.
4. Pointing device for a computer as claimed in Claim 3 wherein the computer comprises, an internal memory store and is operable to erase data downloaded to a pointing device from the said internal memory store.
5. Pointing device for a computer as claimed in Claim 1 wherein the data stored in the memory means comprises information that can be displayed on a display of the computer, the displayed information comprising a menu of false and true statements, whereby the user must select the true statement or statements displayed in order to access further data.
6. Pointing device for a computer as claimed in any preceding Claim wherein the memory means comprises a non-erasable memory store.
7. Pointing device for a computer as claimed in any preceding Claim wherein: the data stored in the memory means comprises a label such as a code or other data associated with that particular pointing device; the computer is adapted to write an identifier corresponding to that label, or data derived from that label, or alter in a manner determined by that label, any software accessible to the computer that is capable of being written to and does not comprise any data recognisable to the computer as an identifier; the computer being further adapted to check whether any identifier on the software program and the label of the pointing device corresponded to one another and only allow the software to be installed and or run at a full level of functionality if the label and identifier do correspond correctly.
8. Pointing device for a computer as claimed in Claim 7 wherein the label is computed by a stored algorithm by a processing means.
9. Pointing device for a computer as claimed in Claims 7 or 8 wherein the computer is arranged to check that the label and identifier correspond correctly at intervals, either predetermined or random, during the actual use of the software.
10. Pointing device for a computer as claimed in any preceding claim wherein the pointing device is a mouse.
11. Pointing device for a computer as claimed in any preceding claims 1-9 wherein the pointing device is a stylus.
12. Computer cooperating with a pointing device, the pointing device being a pointing device in accordance with any of the preceding claims.
13. Computer cooperating with a pointing device, which pointing device comprises memory means capable of storing data; and further comprises data transmission means for transmitting data or control signals to or from the memory means.
14. Computer cooperating with a pointing device as claimed in Claim 13 wherein, where the said data comprises an access code that allows the user to enter the computer to a predetermined level of confidentiality and the transmission means is operable to transmit the access code to the computer, then the computer comprises electronic recognition means for recognising the access code and allowing access appropriate to the access code recognised.
15. Computer cooperating with a pointing device as claimed in either of Claims 12, 13 or 14 wherein the computer is operable to download data to the memory means via the transmission means.
16. Computer cooperating with a pointing device as claimed in any of claims 12-15 wherein the computer comprises an internal memory store and is operable to erase data downloaded to a pointing device from the said internal memory store.
17. Computer cooperating with a pointing device as claimed in any of claims 12-16, wherein if the data stored in the memory means of the pointing device comprises a label such as a code or other data unique to that particular pointing device, then the computer is adapted to write an identifier conesponding to that label, or data derived from that label, or alter in a manner determined by that label, any software accessible to the computer that is capable of being written to and does not comprise any data recognisable to the computer as an identifier; and the computer is then further adapted to check whether any identifier on the software program and the label of the pointing device conesponded to one another.and only to allow the software to be installed and/ or run at the full level of functionality if the label and identifier do correspond correctly.
18. Computer cooperating with a pointing device, as claimed in any of claims 11-16 wherein the computer is arranged to check that the label and identifier conespond correctly at intervals, either predetermined or random, during the actual use of the software.
19. Computer cooperating with a pointing device, as claimed in any of claims 1 1-18 wherein the pointing device is a mouse.
20. Computer cooperating with a pointing device, as claimed in any of claims 11-18 wherein the pointing device is a stylus.
21 . Computer cooperating with a pointing device, as claimed in any of claims 17-
20. further arranged such that if the identifier and the label do not correspond,or the computer is unable to locate an attached pointing device from which to obtain a label, then the software is installable and/or runable at a reduced level of functionality.
SUBSTITUTE SHEET
22. Method of inhibiting the pirating of a software program comprising the steps of: providing the software program with the facility to be tagged with a first indentifying signal, which signal is derived from a code stored on a pointing device of a computer that the program is initially run on, and further providing that when the program is subsequently run, the identifying signal of the program and the code of the then attached pointing device is obtained by the computer at least once and that the program is utilisable only if the identifying signal corresponds to the code stored in the then attached pointing device.
23. The process of manufacturing, programming or formatting a programmable memory device, which device comprises a software program, with the facility for the program be tagged with a first indentifying signal, which signal is derived from a code stored on a pointing device of a computer that the memory device is initially used in, and further providing that the device is adapted so that when the program of the device is subsequently run, the identifying signal of the program and the code of the then attached pointing device is obtainable by the computer at least once and that the program is utilisable only if the identifying signal corresponds to the code stored in the then attached pointing device.
24. A programmable memory device manufactured by the process of Claim 23.
25. The programmable memory device of Claim 23 or Claim 24, wherein the device is a magnetic disc.
26. A programmable memory device manufactured to co-operate with the pointing device of Claim 7 or the computer of Claim 17.
SUBSTITUTE
PCT/GB1992/000815 1991-05-02 1992-05-05 Pointing device for a computer and computer cooperating with a pointing device WO1992021082A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
GB9109469.8 1991-05-02
GB919109469A GB9109469D0 (en) 1991-05-02 1991-05-02 Stylus for a computer and computer cooperating with a stylus
GB919111579A GB9111579D0 (en) 1991-05-02 1991-05-30 Pointing device for a computer and computer co-operating with a pointing device
GB9111579.0 1991-05-30

Publications (1)

Publication Number Publication Date
WO1992021082A1 true WO1992021082A1 (en) 1992-11-26

Family

ID=26298816

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1992/000815 WO1992021082A1 (en) 1991-05-02 1992-05-05 Pointing device for a computer and computer cooperating with a pointing device

Country Status (1)

Country Link
WO (1) WO1992021082A1 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE4400946C1 (en) * 1993-11-12 1995-03-30 Mikron Ges Fuer Integrierte Mi Wireless position detecting device
DE4336679A1 (en) * 1993-10-27 1995-05-04 Siemens Ag Method for authorising the entry of information into a communications and information system with the aid of an entry device
EP0718750A1 (en) * 1994-12-22 1996-06-26 Nokia Mobile Phones Ltd. Information transfer method using a pointing device
US5557076A (en) * 1993-11-12 1996-09-17 Mikron Gesellschaft Fur Cordless position detection apparatus
WO1997007448A2 (en) * 1995-08-21 1997-02-27 Cornel Sirbu Conditional access method and device
FR2740885A1 (en) * 1995-11-03 1997-05-09 Sirbu Cornel Pointing input peripheral for use with computer
EP0794482A1 (en) * 1996-03-08 1997-09-10 Koninklijke Philips Electronics N.V. Input output device
GB2312040A (en) * 1996-04-13 1997-10-15 Xerox Corp A computer mouse
US6195446B1 (en) * 1994-12-16 2001-02-27 Hyundai Electronics America Digitizer stylus with memory for storing handwriting data
DE10100845A1 (en) * 2001-01-10 2002-07-25 Stefan Landfried Interface for generating process and coordination inputs
EP1280036A2 (en) * 2001-05-26 2003-01-29 Hartmut Jahn Method and system for the creation of cryptographic texts or documents
EP1291748A2 (en) * 2001-09-11 2003-03-12 Alcatel Electronic device capable of wirelessly transmitting a password that can be used to unlock/lock a password protected electronic device
US6806869B2 (en) 2001-03-02 2004-10-19 Seiko Epson Corporation Data processing system utilizing discrete operating device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4658093A (en) * 1983-07-11 1987-04-14 Hellman Martin E Software distribution system
US4688169A (en) * 1985-05-30 1987-08-18 Joshi Bhagirath S Computer software security system
EP0365918A2 (en) * 1988-10-28 1990-05-02 International Business Machines Corporation Remotely sensed personal stylus

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4658093A (en) * 1983-07-11 1987-04-14 Hellman Martin E Software distribution system
US4688169A (en) * 1985-05-30 1987-08-18 Joshi Bhagirath S Computer software security system
EP0365918A2 (en) * 1988-10-28 1990-05-02 International Business Machines Corporation Remotely sensed personal stylus

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ANGEWANDTE INFORMATIK: APPLIED INFORMATICS vol. 31, no. 1, 1989, WIESBADEN, DE pages 3 - 13; PILLER E.: 'Passwörter und ihre Erzeugung' *
HEALTH SERVICE JOURNAL vol. 100, no. 5188, 15 February 1990, UNITED KINGDOM pages 255 - 256; PERCIVAL M. ET AL: 'Data in the districts' *

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE4336679A1 (en) * 1993-10-27 1995-05-04 Siemens Ag Method for authorising the entry of information into a communications and information system with the aid of an entry device
US5557076A (en) * 1993-11-12 1996-09-17 Mikron Gesellschaft Fur Cordless position detection apparatus
DE4400946C1 (en) * 1993-11-12 1995-03-30 Mikron Ges Fuer Integrierte Mi Wireless position detecting device
US6195446B1 (en) * 1994-12-16 2001-02-27 Hyundai Electronics America Digitizer stylus with memory for storing handwriting data
EP0718750A1 (en) * 1994-12-22 1996-06-26 Nokia Mobile Phones Ltd. Information transfer method using a pointing device
US6002387A (en) * 1994-12-22 1999-12-14 Nokia Mobile Phones, Ltd. System for transferring information between a pointer and a display interface
WO1997007448A2 (en) * 1995-08-21 1997-02-27 Cornel Sirbu Conditional access method and device
WO1997007448A3 (en) * 1995-08-21 1997-05-09 Cornel Sirbu Conditional access method and device
FR2740885A1 (en) * 1995-11-03 1997-05-09 Sirbu Cornel Pointing input peripheral for use with computer
EP0794482A1 (en) * 1996-03-08 1997-09-10 Koninklijke Philips Electronics N.V. Input output device
GB2312040A (en) * 1996-04-13 1997-10-15 Xerox Corp A computer mouse
DE10100845A1 (en) * 2001-01-10 2002-07-25 Stefan Landfried Interface for generating process and coordination inputs
US6806869B2 (en) 2001-03-02 2004-10-19 Seiko Epson Corporation Data processing system utilizing discrete operating device
KR100462854B1 (en) * 2001-03-02 2004-12-17 세이코 엡슨 가부시키가이샤 Data processing system utilizing discrete operating device
EP1280036A2 (en) * 2001-05-26 2003-01-29 Hartmut Jahn Method and system for the creation of cryptographic texts or documents
EP1280036A3 (en) * 2001-05-26 2004-06-09 Hartmut Jahn Method and system for the creation of cryptographic texts or documents
EP1291748A2 (en) * 2001-09-11 2003-03-12 Alcatel Electronic device capable of wirelessly transmitting a password that can be used to unlock/lock a password protected electronic device
EP1291748A3 (en) * 2001-09-11 2004-03-31 Alcatel Electronic device capable of wirelessly transmitting a password that can be used to unlock/lock a password protected electronic device

Similar Documents

Publication Publication Date Title
CN100514280C (en) Attachable/detachable device and programs start method
EP1048998B1 (en) Security managing system, data distribution apparatus and portable terminal apparatus
WO1992021082A1 (en) Pointing device for a computer and computer cooperating with a pointing device
CN101057225B (en) Selective protection of files on portable memory devices
US5854891A (en) Smart card reader having multiple data enabling storage compartments
US5610981A (en) Preboot protection for a data security system with anti-intrusion capability
EP2130110B1 (en) Printing of a position-coding pattern
US6134659A (en) Controlled usage software
JP5385957B2 (en) Security confirmation system and security confirmation method
US20130061329A1 (en) Method Of Decrypting An Electronic Document For The Safety Management Of The Electronic Document
US5828831A (en) System for preventing unauthorized use of a personal computer and a method therefore security function, and methods of installing and detaching a security device to/from a computer
CN101414263B (en) Software installation method and anti-pirate module
US20050216685A1 (en) Intelligent media storage system
KR100809765B1 (en) Electronic data management device, control program, and data management method
WO1994011969A9 (en) Apparatus and method for providing data security in a computer system having a removable memory
EP0669064A4 (en) Apparatus and method for providing data security in a computer system having a removable memory.
JPH06332717A (en) Method for obtaining software and data processing system for executing its method
CN102955746A (en) Read-only mode mobile storage device and data access method thereof
US7363507B2 (en) Device and method of preventing pirated copies of computer programs
CN101578608B (en) Methods and apparatuses for accessing content based on a session ticket
CN1555557A (en) Writing device, semiconductor memory card, program, and method
JP2007141220A (en) Information apparatus, information processing method and computer program
JPH10154131A (en) File access management system
US6516999B1 (en) Method of protecting data stored in the memory device of a computer system and equipment to carry out this method
EP0610497A1 (en) A dongle

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): GB JP KR US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FR GB GR IT LU MC NL SE