Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Posting-Version: version B 2.10.2 9/3/84; site sesame.UUCP
Path: utzoo!linus!philabs!cmcl2!seismo!harvard!talcott!sesame!slerner
From: slerner@sesame.UUCP (Simcha-Yitzchak Lerner)
Newsgroups: net.micro.pc,net.micro
Subject: Re: Re: software protection - dongles & other gizmos
Message-ID: <250@sesame.UUCP>
Date: Mon, 5-Aug-85 10:26:16 EDT
Article-I.D.: sesame.250
Posted: Mon Aug  5 10:26:16 1985
Date-Received: Sat, 10-Aug-85 05:01:52 EDT
References: <433@othervax.UUCP> <1775@ecsvax.UUCP> <590@psivax.UUCP>
Organization: Lotus Development Corp
Lines: 56
Xref: linus net.micro.pc:4583 net.micro:10120

> In article <1775@ecsvax.UUCP> hes@ecsvax.UUCP (Henry Schaffer) writes:
> >  I could not do this if the program was 
> >keyed to a specific dongle which was used by many other
> >programs and was in use with another cpu that day (or year.)
> 
> 	Actually, to my mind, there is an even worse problem with
> this type of protection scheme. What if I have purchased four or five
> programs from different vendors each with its own dongle(or key disk),
> unless I can somehow attach or install *all* of the dongles(disks)
> simultaneously on the same machine I must continually swap dongles(disks)
> every time I switch programs. This is utterly unacceptible if the
> programs are frequently used in rotation(such as an editor and a
> compiler).
> -- 
> 
> 				Sarima (Stanley Friesen)
>
The ADAPSO keyring system holds multiple keys simultaneously.  Since
the designers of the ADAPSO system have to live with what they create,
a LOT of thought went into making the system as transparent and unobtrusive
as possible.  For most users, they will buy a package, install the key
in their keyring, shove it behind their computer and let it gather dust.
Hard disks/LANs/RAM disks, will all be fully usable without restriction,
and you can make functional backups to your hearts content.

BTW:  Because of the higher security offered w/ keys, some manufacturers
will be setting up their disks to *encourage* distribution of copies.
(In other words, if you try and run w/o the key, the disk will either
go into a demo mode or allow you to run but not save or print your work...)

Also, expect software returns to start being accepted, 30 day trial periods,
legitamite rental of software.  Also, software can now be sold at different
prices for limited use.  (Full price of unlimited use, discounts for 50 use
keys or 6 month keys &c.  Use your imagination to figure out what you can
do with the capabilities of a key...)

==============

A previous posting brought up the patching issue again.  As previously
stated, if complex program routines are executed in the key and not
in the host CPU, patching will cause the software to malfunction.
You say that you can reverse engineer the routines?  Even when their
are several random dummy paramaters going in and out?  Even when the
routine varies by a state machine?  [FLAME OFF]

 
-- 
Opinions expressed are public domain, and do not belong to Lotus
Development Corp.
----------------------------------------------------------------

Simcha-Yitzchak Lerner

              {genrad|ihnp4|ima}!wjh12!talcott!sesame!slerner
                      {cbosgd|harvard}!talcott!sesame!slerner
                                slerner%sesame@harvard.ARPA