Claims
- 1. A method of providing a computer with a means for selectively providing access to protected software of the computer, the computer including a communication port connector with a plurality of pins which when mated with corresponding sockets of a peripheral device connector pass signals between the computer and the peripheral device, said method comprising the steps of:
- storing a test program in the computer;
- providing a substrate having a series of holes therein corresponding to said plurality of pins;
- providing a conductive path on said substrate between two selected holes of said series of holes;
- inserting said substrate onto said plurality of pins of the communication port connector, with said plurality of pins extending through the series of holes in the substrate and with two of said plurality of pins making electrical connection with said conductive path;
- mating, in a normal fashion, the peripheral device connector directly with the communication port connector while leaving the substrate sandwiched therebetween;
- interrogating said two pins with the test program by applying and measuring voltages on said two pins to determine whether said conductive path is present; and
- allowing access to said protected software if said conductive path is present.
- 2. The method of claim 1 wherein the step of interrogating said two pins includes the steps of:
- applying a voltage to a first of said two pins extending through said two selected holes; and
- measuring the voltage at a second of said two pins to determine if said conductive path is present between said two pins.
- 3. A method of providing software authorization for a computer including a communication port connector with a plurality of pins that are electrically isolated from one another, the method comprising the steps of:
- providing an authorization device in the form of a thin, flat substrate having a plurality of holes therein corresponding with the pins in the communication port connector, said substrate further including first and second contact means surrounding first and second holes in the substrate, said substrate further including a conductive path between the first and second contact means;
- inserting the authorization device into the communication port connector so that the pins thereof protrude through the holes in the substrate and electrical connection is made between first and second pins via the first and second electrical contact means and the conductive path therebetween;
- mating in a normal fashion, a peripheral device connector directly with the communication port connector while leaving the authorization device sandwiched therebetween;
- storing a software routine in the computer for selectively providing access to protected software stored within the computer, the software routine performing the steps of:
- (a) applying a voltage to the first pin of the plurality of pins of the communication port;
- (b) measuring the voltage on the second pin of the plurality of pins to determine if a conductive path is present between the first and second pins;
- (c) limiting or denying unauthorized access to the protected software if the conductive path is not present between the first and second pins; and
- (d) allowing access to the protected software if the conductive path is present between the first and second pins.
- 4. A method of selectively providing access to a given program stored within a computer, the computer including at least one port connector having a plurality of terminals therein, the method comprising the steps of:
- storing a test program in the computer;
- placing an authorization device over the plurality of terminals in the port, said authorization device including a conductive path for shorting together two of the plurality of terminals;
- mating, in a normal fashion, a second connector with the port connector while leaving the authorization device sandwiched therebetween;
- running the test program to determine whether a user can obtain access to the given program, the test program performing the steps of:
- (a) applying a voltage to a first terminal of the two terminals;
- (b) measuring the voltage on a second terminal of the two terminals to determine whether the second terminal is at substantially the same voltage level as the first terminal due to the presence of the conductive path provided by way of the authorization device;
- (c) denying access to the given program if the voltage on the second terminal is not at substantially the same voltage level as the first terminal due to the absence of the authorization device; and
- (d) allowing access to the given program if the voltage on the second terminal is at substantially the same voltage level as the first terminal.
- 5. The method of claim 4 wherein the authorization device is in the form of a thin substrate having a plurality of holes therein aligned with the plurality of terminals, and wherein the method further comprises:
- inserting the substrate over the plurality of terminals such that the plurality terminals extend through the holes;
- contacting the first terminal with an end of the conductive path as the first terminal extends through one of the plurality of holes; and
- contacting the second terminal of the plurality of terminals with an opposite end of the conductive path as the second terminal extends through another one of the plurality of holes.
- 6. A method of providing a computer with a means for limiting or denying unauthorized access to protected software stored within the computer, the computer including a communication port with a plurality of sockets which when mated with corresponding pins of a peripheral device pass signals between the computer and the peripheral device, the method comprising the steps of:
- storing a software routine in the computer for setting and measuring voltages on selected mated pins of the plurality of pins;
- providing a substrate having a series of holes therein corresponding to the pins;
- providing at least one conductive path on the substrate between selected holes of the series of holes;
- inserting the substrate onto the pins with the pins extending through the series of holes and making electrical connection with the at least one conductive path;
- mating, in a normal manner, the pins of the peripheral device with the plurality of sockets of the communication port while leaving the substrate sandwiched therebetween;
- interrogating the selected mated pins with the software routine to determine whether the at least one conductive path is present between the selected mated pins;
- limiting or denying unauthorized access to the protected software if the at least one conductive path is not present between the selected mated pins; and
- allowing access to the protected software if the at least one conductive path is present between the selected mated pins.
- 7. The method of claim 6 wherein the step of interrogating the selected mated pins includes the steps of:
- applying a voltage to a first of the selected mated pins; and
- measuring the voltage on a second of the selected mated pins to determine if the at least one conductive path is present between the first and second selected mated pins.
CROSS-REFERENCE TO RELATED APPLICATIONS
This is a division of U.S. patent application Ser. No. 08/417,506, filed Apr. 3, 1995 (abandoned), which is a continuation of U.S. patent application Ser. No. 08/139,594, filed Oct. 20, 1993 (abandoned), which is a continuation in part of Ser. No. 07/938,111, filed Aug. 31, 1992, now U.S. Pat. No. 5,290,191, which is a continuation in part of Ser. No. 07/895,148, filed Jun. 5, 1992, now U.S. Pat. No. 5,181,859, which was a continuation of Ser. No. 07/694,262, filed Apr. 29, 1991 (abandoned).
US Referenced Citations (65)
Number |
Name |
Date |
Kind |
T947007 |
Krumreich et al. |
Jun 1976 |
|
2073880 |
Robinson |
Mar 1937 |
|
2385620 |
Fleckenstein |
Sep 1945 |
|
2449150 |
Schnoll |
Sep 1948 |
|
2760128 |
Colby |
Aug 1956 |
|
2944330 |
Swick |
Jul 1960 |
|
3072873 |
Traher |
Jan 1963 |
|
3086188 |
Ross |
Apr 1963 |
|
3231843 |
Antes et al. |
Jan 1966 |
|
3234464 |
Cook |
Feb 1966 |
|
3271726 |
Pfendler |
Sep 1966 |
|
3435387 |
Reinke et al. |
Mar 1969 |
|
3500194 |
Smith |
Mar 1970 |
|
3569915 |
Langham et al. |
Mar 1971 |
|
3670292 |
Tracy |
Jun 1972 |
|
3718859 |
Arlow |
Feb 1973 |
|
3736379 |
Kagan |
May 1973 |
|
3740701 |
Harnden, Jr. |
Jun 1973 |
|
3753261 |
Thaxton |
Aug 1973 |
|
3790858 |
Brancaleone et al. |
Feb 1974 |
|
3821686 |
Harnden, Jr. |
Jun 1974 |
|
3825874 |
Peverill |
Jul 1974 |
|
3852700 |
Haws |
Dec 1974 |
|
3905013 |
Lee |
Sep 1975 |
|
4002397 |
Wang et al. |
Jan 1977 |
|
4029386 |
Krantz, Jr. et al. |
Jun 1977 |
|
4056299 |
Paige |
Nov 1977 |
|
4082394 |
Gedney et al. |
Apr 1978 |
|
4089032 |
Orfano |
May 1978 |
|
4326765 |
Brancaleone |
Apr 1982 |
|
4330166 |
Cooper et al. |
May 1982 |
|
4362350 |
von Harz |
Dec 1982 |
|
4407552 |
Watanabe et al. |
Oct 1983 |
|
4415218 |
McKenzie |
Nov 1983 |
|
4440463 |
Gliha, Jr. et al. |
Apr 1984 |
|
4522455 |
Johnson |
Jun 1985 |
|
4580866 |
Hagner |
Apr 1986 |
|
4673237 |
Wadsworth |
Jun 1987 |
|
4676564 |
Michell, Jr. |
Jun 1987 |
|
4709253 |
Walters |
Nov 1987 |
|
4717349 |
Johnson |
Jan 1988 |
|
4726638 |
Farrar et al. |
Feb 1988 |
|
4729743 |
Farrar et al. |
Mar 1988 |
|
4729752 |
Dawson, Jr. et al. |
Mar 1988 |
|
4813891 |
Walters et al. |
Mar 1989 |
|
4820174 |
Farrar et al. |
Apr 1989 |
|
4846705 |
Brunnenmeyer |
Jul 1989 |
|
4930200 |
Brush, Jr. et al. |
Jun 1990 |
|
4979070 |
Bodkin |
Dec 1990 |
|
4979904 |
Francis |
Dec 1990 |
|
4992061 |
Brush, Jr. et al. |
Feb 1991 |
|
4992333 |
Hyatt |
Feb 1991 |
|
5092788 |
Pristupa, Jr. et al. |
Mar 1992 |
|
5118302 |
Fussell et al. |
Jun 1992 |
|
5134252 |
Himeno et al. |
Jul 1992 |
|
5149274 |
Gallusser et al. |
Sep 1992 |
|
5153540 |
Gliha, Jr. |
Oct 1992 |
|
5181859 |
Foreman et al. |
Jan 1993 |
|
5183698 |
Stephenson et al. |
Feb 1993 |
|
5257950 |
Lenker et al. |
Nov 1993 |
|
5290191 |
Foreman et al. |
Mar 1994 |
|
5387131 |
Foreman et al. |
Feb 1995 |
|
5414587 |
Kiser et al. |
May 1995 |
|
5428288 |
Foreman et al. |
Jun 1995 |
|
5455734 |
Foreman et al. |
Oct 1995 |
|
Foreign Referenced Citations (5)
Number |
Date |
Country |
0149907 |
Jul 1985 |
EPX |
0211508 |
Feb 1987 |
EPX |
0348562 |
Jan 1990 |
EPX |
8428300 |
Feb 1985 |
DEX |
0246305 |
Jan 1926 |
GBX |
Non-Patent Literature Citations (6)
Entry |
Archer, "Heavy Duty Spike Protector". |
Pulse-Guard "Transient Overvoltage Protection", 1 pg, date believed to be Mar. 1992. |
Hyatt, "A Technique for Optimizing ESD, EMP and Lightning Protection", pp. 393-408, date believed to be fall 1992. |
G&H Technology, Inc., "Pulse-Guard" literature including Sub-Millimeter model, 10 sheets, date believed to be Aug. 1992 (Ex. D). |
Pulse-Guard "Pulse-Guard Model `PGD` Submillimeter Suppressor Arrays", 2 sheets, date believed to be Oct. 1992 (Ex. F). |
Pulse-Guard "The Super ESD Suppressor For I/O Connectors", 4 sheets, date believed to be Feb. 1993 (Ex. G). |
Divisions (1)
|
Number |
Date |
Country |
Parent |
417506 |
Apr 1995 |
|
Continuations (2)
|
Number |
Date |
Country |
Parent |
139594 |
Oct 1993 |
|
Parent |
694262 |
Apr 1991 |
|
Continuation in Parts (2)
|
Number |
Date |
Country |
Parent |
938111 |
Aug 1992 |
|
Parent |
895148 |
Jun 1992 |
|