`Exhibit 1014
`
`Exhibit 1014
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ZTE Corporation and ZTE (USA) Inc.
`ZTE Corporation and ZTE (USA) Inc.
`
`
`
`United States Patent
`Walker
`
`[19]
`
`[54] CODE OPERATED ACCESS CONTROL
`SYSTEM FOR ELECTRONIC DATA STORE
`
`Inventor: Robin D. Walker, Glasgow, Scotland
`[75]
`[73] Assignee: Runtime Innovations Limited,
`Glasgow, Scotland
`[21] Appl. NO.: 84,010
`[22] Filed:
`Aug. 10, 1987
`[30]
`Foreign Application Priority Data
`Aug. 16, 1986 [GB] United Kingdom ................. 8619989
`
`Int. Cl.‘ .............................................. G06F 12/00
`[51]
`
`[52] U.S. C1.
`..
`........................... 364/200
`[58] Field of Search....................... 364/200, 300, 900,
`360/48; 380/3, 4
`
`[56]
`
`References Cited
`U.S. PATENT DOCUMENTS
`
`3,609,697 9/ 1971 Blevins ............................. 340/ 172.5
`
`..... 380/4
`4,120,030 10/1978 Johnstone
`
`4,200,913 4/1980 Kuhar et a1.
`.. 364/900
`4,236,217 11/1980 Kennedy .....
`.. 364/483
`
`.. 3641900
`4,253,157 2/1981 Kirschner et
`4,305,131 12/1981 Best .............
`. 364/521
`
`. 364/200
`4,306,289 12/1981 Lumley
`
`4,361,877 11/1982 Dyer et a1.
`..... 364/900
`2/1984 Best .............
`.. 178/2299
`4,433,207
`
`4,434,464 2/1984 Suzuki et a1.
`..... 364/200
`
`4,442,486 4/1984 Mayer .....
`. 364/200
`4,446,519
`5/1984 Thomas
`.. 364/300
`4,454,594 6/1984 Heffron et
`..... 364/900
`
`..... 364/200
`4,458,315
`7/1984 Ucheniclt
`
`..... 364/200
`4,462,076 7/ 1984 Smith, III
`4,462,078 7/ 1984 Ross ................. 364/300
`
`4,471,163 9/1984 Donald et a1.
`..
`.. 178/2208
`1/1985 Kadison et al.
`.
`....... 360/48
`4,494,156
`
`.. 178/2208
`4,513,174 4/1985 Herman
`
`..... 358/122
`4,528,588 7/1985 Lofberg
`....... 377/15
`4,553,252 11/1985 Egcndorf
`
`4,562,306 12/1985 Chou et a].
`..
`178/2108
`4,562,495 12/1985 Bond et a1. ............. 360/78
`
`4,577,289 3/ 1986 Comerford et a].
`. 364/900
`
`4,584,641 4/ 1986 Guglielmino ............ 364/200
`
`.
`. 364/200
`5/1986 Chiba et a1.
`4,589,064
`
`6/1986 Pickholtz .
`. 364/200
`4,593,353
`4,593,376 6/1986 Volk ................. 364/900
`
`4,597,058 6/1986 Izumi et a1.
`.....
`.364/900
`1/ 1987 Chorley et a1.
`.................. 178/22.08
`4,634,807
`
`Time Clock
`
`1 8
`
`Key
`Sta-age
`Unit
`
`control
`.
`Devure
`
`[11] Patent Number:
`
`4,868,736
`
`[45] Date of Patent:
`
`Sep. 19, 1989
`
`4,644,493 2/ 1987 Chandra et al.
`.................... 364/900
`4,646,234 2/1987 Tolman et al.
`..
`..... 364/200
`
`4,652,990 3/ 1987 Fallen et a1.
`. 364/200
`4,658,093 4/1987
`380/25
`
`..... 380/4
`4,670,857 6/ 1987
`. 364/900
`4,680,731
`7/1987
`
`4,683,553 7/ 1987 Mollier ............
`.. 380/4
`4,685,056 8/1987 Bamsdale et :11.
`7364/2110
`
`8/1987 Joshi ................
`.364/200
`4,688,169
`
`..... 380/3
`4,691,350 9/1987 Kleijne et al.
`
`. 364/200
`..
`4,701,846 10/1987 Ikeda et a1.
`4,713,753 12/1987 Boebert et a1.
`..................... 364/200'
`FOREIGN PATENT DOCUMENTS
`
`900479 12/ 1984 Belgium .
`084441
`7/1983 European Pat. Off.
`135422 3/1985 European Pat. Off.
`57-726 4/1982 Japan .
`
`,
`.
`
`Primary Examiner—Raulfe B. Zache
`Attorney, Agent. or Firm—Pennie & Edmonds
`
`[57]
`
`ABSTRACT
`
`A system for controlling access such as time access by
`a user to a store of information in an information storage
`system which uses unique codes associated with cone
`spending number of information units. The system in~
`cludes a key storage unit (18) which is specifically for
`matted and can only be accessed by a special read/write
`program available to the distributor or manufacturer.
`The key storage unit (18) has a plurality of keys (16)
`which act as addresses for time units which control the
`time of operation the program is to be run using the host
`system clock (14). In response to a valid key being given
`to the user and being entered to start the program, the
`number Of timed units for this code is rendered subse-
`quently inaccessible, by for example being set to zero
`automatically so that it cannot readily be used again for
`free. The program can then be run continuously until an
`accumulated predetermined time is reached and at the
`end of the time, program operation is terminated. The
`user can extend operation by obtaining additional keys,
`subject to payment, to run the program for as long as
`suitable. With this system the user does not buy the
`computer program but effectively hires it from the
`owner or distributor.
`
`18 Claims, 6 Drawing Sheets
`
`14
`
`10
`
`12
`
`Operating
`Device
`
`16
`
`In terfnce to
`
`Control Device
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1014-00001
`
`
`
`US. Patent
`
`Sep. 19,1989
`
`Sheet 1 of 6
`
`4,868,736
`
`Time Clock
`
`1 4
`
`10
`
`
`
`Operating
`
`Device
`
`
`
`Interface to
`
`
`Confrol
`
`Control Device
`
`
`Device
`
`
`
`
`20
`
`22
`
`
`
`
`47a
` 51. 531 399
`
`3.3 7699 em 3000 6600 6
`
`
`(”“269
`
`L062. e ‘3
`Each segment can
`751. 68
`57
`have 125 pairs of
`“m
`
`
`
`
`
`30% 5090 609;6M 0 numbers
`
`
`LAYOUT OF
`——ONE SEGMENT
`
`
`
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1014-00002
`
`
`
`US. Patent
`
`Sep. 19,1939
`
`Sheet 2 of 6
`
`4,868,736
`
`3O
`
`
`
`Operational Device
`Activated
`
`32
`
`
`
`Is a Valid Storage
`Device Present
`
`YES
`
`34
`
`Operational Device
`De—Activated
`
`
`
`
`
`
`New Data
`
`
`Is the Current
`Requested from
`
`
`Interface
`Allowable Number of
`
`Operational Units Greater ‘
`
`than Zero
`
`
`YES
`
`39
`
`Time Clock Read
`
`Reading
`
`1
`
`
`Is New Data
`Associated with
`
`an Allowable
`
`Number of
`
`
`
`O -erational Units
`
`
`
`
`New Allowable
`
`
`Operational Units
`
`
`
`Time Clock Read ReadingZ
`Become Current
`
`Allowable
`Elapsed Time (1—2)
`
`
`Deducted from current‘Allo-
`
`wable on Stora-e Dewce
`
`
`
`
`FlGl.
`
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1014-00003
`
`
`
`US. Patent
`
`Sep.19,1989
`
`Sheet 3 of6
`
`4,868,736
`
`
`
`52
`50
`
`
`
`
`
`Applicuiion
`Check Pro ram
`
`Number A omsf 13?
`Program
`
`Number for a
`TERMlNATED
`
`
`
`
`
`
`Check if Time Allow
`uble 2nd Number 5
`{CT 1 )
`
`
`Type in a New
`Time charge
`Number
`
`
`62
`
`Note Current Time
`— for
`infernal Clock
`
`T1
`
`
`
`Successful Mulch
`
`56
`
`Check Numbers
`in ALL Sectors
`
`for a Mulch
`
`
`ALLOW 3 ATTEMPTS
`
`
`
`
`Run Unhl a Time
`
`Number that is
`Clock Command IS
`
`
`Pcur of Mulch
`
`Found and Note TimeTZ
`Number [5 NEW
`
`ALLOWABLE TIME CT1
`
`
`Subfruci l T1-T2lFrom
`In 151'
`Pul’ CTl
`
`
`Curieni Al lovable
`
`Posil‘ion 15f
`Time T3-CTH T2-T1l
`Secl'or
`
`
`
`
`
`
` Make ET1=T3 and
`
`Place in Seclor 1
`
`2nd Number
`
`
`FlG.5
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1014-00004
`
`
`
`Sheet 4 of 6
`
`4,868,736
`
`US. Patent
`
`Sep. 19, 1989
`70
`
`Meo$uring
`Rou hne
`
`Encountered
`
`
`72
`
`
`
`Key (DISK)
`Present
`
`YES
`
`80
`
`Insert Key
`
`
`Check Line 1 for
`
`Last Code 5-.
`
`Current Code
`
`
`
`
`March
` Scan for
`Current Code
`
`
`Area
`
`Ask
`for
`New Code
`
`Enfer New Code
`and Scan for
`
`
`
`
`
`For Number of
`
`Units used Since
`
`Last Meus.
`
`
`pm iopp Code
`
`
` Return
`
`YES
`
`8
`
`Pui‘ Code of
`End of Line 1
`
`FIGS
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1014-00005
`
`
`
`US. Patent
`
`Sep.19, 1989
`
`Sheet 5 of 6
`
`4,868,736
`
`mmmmmmmam
`
`llama-3532!EEI-E'JlIlIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
`
`EIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
`
`EIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII-IIIIII
`
`IIIIIIIIEEEEIEEBSIIIIIIIIIIIIIIIIIIIIlflflllflllllllllllflllllllllllllflllllIIIIIIIIIIIEII
`
`HEMIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIBIIIIIIII‘IEIIIIIIIIIIIIIIII
`
`a“IIIIIIIIIIIIIIIIIIIIIIIIIIIEIIIIIIIIIIIIIIIIIIII
`
`I-IIIIIIIIIIIIIIIIIIIIIEIIIIIIIIIIIIIIIIIIIIIIIIIII
`
`BIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
`BIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
`
`IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
`
`InIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
`
`
`
`
`
`
`
`
`
`
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1014-00006
`
`
`
`US. Patent
`
`Sep. 19, 1989
`
`Sheet 6 of 6
`
`4,868,736
`
`T1 =Curr~enf Allowable Units
`T2=Unifs used Since Lasf Measuremenf
`C|=Currenttode Number
`
`Tc=Unifs Associated with 000
`
`'00
`
`
` Measuring
`Rouhne
`Encounfered
`
`
`
`
`
`
`
`ls
`Valid Key
`'resenf
`H0
`
`New Code
`Allow 3
`.
`Affem 1’s
`
`Redd Avuitdble
`Information
`Unifs
`T1
`
`
`
`
`
`Key
`
`
`
`
` Enfer Code
`and Scan Key
`
`
`Codes
`
`
`‘ Does Enfered Code
`
`
`March Key Code
`
`”6
`YES
`VT1=T1-T2
`
`1f T1<0 ThenTn
`
`=0 Write T1
`Find Unifs for
`
`*0 Key
`Code TC Se?
`
`Locufion of
`
`Code to 0
`
`Write TC to T1
`
`
`Ie Puf TC in
`
`
`Currenf Unifs
`
`
`Area Avuilubte
`
`
`
`FIG.8
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1014-00007
`
`
`
`1
`
`4,868,736
`
`CODE OPERATED ACCESS CONTROL SYSTEM
`FOR ELECTRONIC DATA STORE
`
`BACKGROUND OF THE INVENTION
`1. Field of the Invention
`The present invention relates to a system for control-
`ling the access to a store of information stored in divisa-
`ble form in machine readable media using a unique code
`and particularly, but not exclusively, is suitable for con-
`trolling the length of time a computer program is used.
`The system can also be used to control the length of
`time a piece of hardware, such as a VCR or computer is
`used.
`2. Description of the Related Art
`Computer programs require considerable effort to
`create and debugg, particularly those for use in engi-
`neering projects and the like. Such programs are invari-
`ably specialised and are expensive to create and to buy.
`Many potential users are deterred by the price because
`they may require to use the program infrequently and
`find it difficult to justify the relatively high purchase
`cost. This means that many projects are limited in the
`number of complexity of data processing power and
`handling which can be handled by such programs. An-
`other factor deterring purchase is that programs are
`being continuously improved so that the risk of having
`an obsolete expensive program is of considerable con-
`cern.
`
`An object of the present invention is to provide a
`system which obviates or mitigates the aforesaid disad-
`vantages.
`SUMMARY OF THE INVENTION
`
`This is achieved by incorporating a system in each
`program which uses codes to control and monitor the
`access by a user to a store of information units, for
`example if the units are time, the length of time the
`program is run by the host operating system is con-
`trolled.
`The program is provided to a user who wishes to run
`the program for a predetermined time. The user pays
`for this time and in return receives a special key or code
`which the user enters into the system. The system in-
`cludes a key storage unit which is specially formatted
`and cannot be read by the host device or system, and
`can only be accessed by a special read/write program
`available to the distributor or manufacturer. The key
`storage unit has a plurality of keys which act as ad-
`dresses for time units which control the time of opera-
`tion the program is to be run using the host system
`clock. In response to a valid key being given to the user
`and being entered to start the program, the number of
`timed units for this code is rendered subsequently inac-
`cessible, by for example being set to zero automatically
`so that it cannot readily be used again for free. The
`program can then be run continuously until a cumulated
`predetermined time is reached and at the end of the time
`the program operation is terminated.
`The user can extend operation by obtaining addi-
`tional keys, subject to payment, to run the program for
`as long as suitable. With this system the user does not
`necessarily have to buy the computer program but
`could effectively hires it from the owner or distributor.
`In one embodiment of the invention the key storage
`unit is a floppy diskette having at least one specially
`formatted track. with 9 numbered segments. Each seg-
`ment can have 128 pairs of numbers consisting of a code
`
`5
`
`10
`
`15
`
`20
`
`25
`
`3O
`
`35
`
`40
`
`45
`
`50
`
`55
`
`65
`
`2
`or key number which acts as an address and a corre-
`sponding data pocket in the form of time units. The time
`units can be the same or different. In another embodi-
`ment the key storage unit can be an optical disk or
`programmable chip, or hard disk or laser card or other
`smart card.
`Accordingly in one aspect of the present invention
`there is provided a control system for controlling access
`by a host operating system to a store of information
`stored in divisable form in machine readable media
`using a unique code, said control system comprising,
`storage means for storing a plurality of unique codes
`and corresponding information units,
`said storage
`means being normally unreadable by the host operating
`system, said storage means being coupled to said host
`operating system via a control device and a unique code
`obtainable by a user, said host operating system having
`code input means for entering said code into said stor-
`age means via said control device, said unique code
`allowing use of a number of information units stored in
`said storage means. the number of information units
`used being monitored by an information units counter of
`said host operating system, and comparison means for
`comparing the number of units used with an available
`total number of units for that unique code to permit
`continued access to said store of information for said
`corresponding information units, and security means
`coupled to said storage means for causing the number of
`information units corresponding to said unique code
`rendered subsequently inaccessible by said unique code
`or previously used codes after all said corresponding
`units have been released.
`Preferably said units are rendered subsequently inac-
`cessible by setting said number of units corresponding
`to said unique code to be set to zero.
`Conveniently said information units are units of time
`and said information unit counter is a time clock.
`Preferably said storage means if a magnetic disk hav-
`ing a specially formatted track thereon, said track hav-
`ing at least one segment having a plurality of pairs of
`codes and corresponding time units. Conveniently there
`are nine segments on the track with each track having
`128 pairs of codes and corresponding time units.
`Preferably also said control device is a computer and
`the code input means to the control device is a key—
`board. The storage means can be 3 Winchester disk,
`floppy disk or any other suitable device.
`Accordingly in another aspect of the present inven-
`tion there is provided a method of controlling access by
`a host operating system to a store of information stored
`in divisable form in machine readable media using a
`unique code said method comprising the steps of, pro-
`viding a storage means having a plurality of unique
`codes each with a corresponding number of information
`units, coupling said storage means to said host operating
`system, providing a unique code for entry into said host
`operating system, said unique code being identifiable by
`said storage means, releasing an information unit corre-
`sponding to said code, monitoring a counter of said host
`operating system, and comparing the elapsed units of
`codes and corresponding time units. Conveniently there
`are nine segments on the track with each track having
`128 pairs of codes and corresponding time units.
`Preferably also said control device is a computer and
`the interface to the control device is a keyboard. The
`storage means can be a Winchester disk, floppy disk or
`any other suitable device.
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1014-00008
`
`
`
`3
`Accordingly in another aspect of the present inven-
`tion there is provided a method of controlling access by
`a host operating system to a store of information stored
`in divisable form in machine readable media using a
`unique code said method comprising the steps of, pro-
`viding a storage means having a plurality of unique
`codes each with a corresponding number of information
`units, coupling said storage means to said host operating
`system, providing a unique code for entry into said host
`operating system, said unique code being identifiable by
`said storage means, releasing an information unit corre-
`sponding to said code, monitoring a counter of said host
`operating system, and comparing a counter number of
`released units with a number of available information
`units permitting access to said store of information for
`said corresponding number of information units and
`after releasing said number of information units, render-
`ing the number of information units corresponding to
`said code to be inaccessible.
`Preferably said number of information units is ren-
`dered inaccessible by setting the number to zero after
`they have been released by said code.
`Preferably said method includes the step of entering
`said code into said host operating system via a key-
`board.
`Preferably also, said method includes the step of re-
`ceiving an additional code corresponding to an addi-
`tional time unit for increasing a period of time for which
`a computer program is used.
`According to another aspect of the invention there is
`provided a storage device for use with a control system
`for controlling access by a host Operating system to a
`store of information stored in divisable form in a ma-
`chine readable media using a unique code, said storage
`means comprising a storage element having at least one
`specially formatted area which is unreadable by the host
`operating system, said area having at least one portion
`with a plurality of pairs of numbers, each pair having a
`unique code and a corresponding number of informa-
`tion units, said unique code identifying, when selected,
`the corresponding number of information units for con-
`trolling a counter coupled to the host system to operate
`until a count corresponding to said number of informa-
`tion units has elapsed.
`Preferably, said storage element is a computer disk
`having a specially formatted track having at least one
`segment with pairs of numbers therein, said number of
`information units being stored in time units.
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`1;
`
`These and other aspects of the invention will become
`apparent from the following description when taken in
`combination with the accompanying drawings
`in
`which:
`FIG. 1 is a block diagram of a system according to an
`embodiment of the invention;
`FIG. 2 is a detailed view of the storage unit of FIG.
`'
`FIG. 3 is an enlarged view of a segment of the track
`shown in FIG. 2;
`FIG. 4 is a general block diagram of the time control
`sequence of a computer program;
`FIG. 5 is a block diagram of a time-control segment
`of a computer program for a specific application.
`FIG. 6 is a block diagram of a control sequence of a
`system applied to a write-once read many times media
`in accordance with the present invention;
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`45
`
`50
`
`55
`
`65
`
`4,868,736
`
`4
`FIG. 7 is a schematic diagram of a portion of a media
`layout used with the arrangement shown in FIG. 6;
`FIG. 8 is a block diagram similar to FIG. 6 but used
`with an erasable media, and
`FIG. 9. is a schematic representation of a system in
`accordance with the invention used with a satellite
`information transmission system.
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENT
`
`Reference is first made to FIG. 1 of the drawings
`which shows a control system in accordance with an
`embodiment of the invention. The system comprises an
`operating device 10,
`typically computer running an
`application program, which is coupled to a control
`device 12, typically a programmed computer. The con-
`trol device 12 is able to read time clock 14 which allows
`the control device to monitor the run time of the operat-
`ing device 10. The control device 10 is connected to an
`interface 16, which is typically a keyboard or VDU, and
`to a key storage means 18 in the form of a floppy disk
`20, as best seen in FIG. 2, in which coded time sequen-
`ces are stored for controlling The accumulated run time
`the application program is used, as will be later de-
`scribed in detail.
`Reference is now made to FIG. 2 of the drawings
`which shows disk 20 which has a specially formatted
`track 22. The formatting is performed using a special
`read/write program and cannot be read by the host
`operating system As seen in FIG. 3 the track 80 contains
`9 segments 24, each segment 24 of which contains 128
`pairs of numbers. One number in each pair is a code and
`the other number is a number of time units. The number
`of time units may be the same or different for each code.
`The codes cannot be read by the user and are only
`provided by the owner on payment of a certain amount.
`Once a code is provided to the user and the code is
`entered, for example #681, the time unit number is
`transferred to the first code #312 and the number of
`units corresponding to #681 is set to zero. Only the time
`units (600) corresponding to code #312 can be used.
`This prevents the same code #612 from being used to
`repeatedly access time units.
`The operational sequence of the arrangement depicts
`in FIGS. 1—3 is best seen in the block diagram of FIG,
`4. At the beginning of the operation, the controlling
`device 12 requests the matching of a data unit of one
`stored in an area of the key storage unit 18 to ensure that
`a valid storage device 18 is present. If a match is not
`made then the controlled device denies further use of
`the operational unit. If that is found then the device
`accesses an area of the storage unit containing current
`allowable operational time. If this time is found to be
`greater than zero 36, then operation is allowed until the
`time becomes zero or the device operation is terminated
`by external means, for example, switching the machine
`off or removing the floppy disk 20. If this current allow-
`able time is zero or less, then the controlling device
`requests the user to provide a new alphanumeric data
`unit 38 via the interface 16. This new data is checked
`with others on the storage device until a match is found,
`or all data has been checked without a match being
`found 40. If no match is found the operational device is
`de-activated 34, but if a match is found then the allow-
`able time associated with the data unit 42 is transferred
`to the allowable time location in the storage device and
`the allowable time at the location associated with the
`particular unit is made zero to prevent subsequent use of
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1014-00009
`
`
`
`5
`the data unit when the new current allowable time
`becomes zero, and a further alphanumeric data unit is
`requested via the interface. This procedure is explained
`above with reference to codes 681 and 312.
`At intervals during the operation of the operational
`device, the control device 12 notes the lapsed opera-
`tional time between the storing and the most recent
`noting during current operational period, and deducts
`this lapsed time from the current allowable time from
`the storage device 44. At intervals during the operation
`of the operational device 10, control device 12 also
`performs a matching operation to ensure that the valid
`storage 18 remains present. If, for any reason, the valid
`storage unit 18 has been removed or disconnected then
`further operation of the operational device 10 is pre-
`vented.
`It will be appreciated that storage unit 18, operational
`device 10, control device 12. clock 14 and interface 16
`can be interlinked by electrical, optical, r.f. or other
`signal carrying means.
`Reference is now made to FIG. 5 of the drawings
`which is similar to FIG. 4 except that this drawing is a
`block diagram of a particular application using the sys-
`tem to log operation time on a microcomputer operat-
`ing under the MS-DOS system, utilising as a unit 18 as
`a key storage device logging the new time of an applica-
`tion program. In this application the storage device 20
`has 9 segments 24 in the specially formatted track 22
`and each of these sectors as explained above contains up
`to 128 pairs of numbers. As explained, the first number
`in the sector is a matching security number of a code to
`ensure that the security diskette is valid and the second
`number is the current allowable new time in minutes for
`running the particular program. It will be seen that the
`remaining numbers can be paired off with the key num-
`ber and its associated run timed in minutes. In this case
`the program number is checked against the first number
`for a successful match 50 and if a match is not found the
`application program is terminated 52. If a match is
`found the system then checks if the time allowable 54;
`which is the second number greater than zero, and if not
`a new number is typed in 55 and all number sectors are
`checked for a new match. Three attempts are permitted
`56 and if no match is found after three attempts the
`program is terminated 52. If a match is found the num-
`ber that is pair matched becomes the new allowable
`time CT1 58 and this is put in the first position in the
`first sector as explained above 60. The current time for
`the internal clock T1 is then noted 62 and the program
`is run until a time clock command is found and this
`becomes time T2 64. T2 is subtracted from T1 (Tl ——T2)
`to obtain a time T3 66 and this is placed in the sector at
`the second number and this is looped back in the pro-
`gram 68 so that the check is again carried out to see if
`the time allowable in the second number is greater than
`zero 54 and this operation continues until the time is
`equal to or less than zero at which time the application
`program will become terminated 54.
`With this arrangement it will be appreciated that
`there is provided a convenient and elegant process for
`ensuring that the computer programs are run efficiently
`and as often as required. The owner provides the pro-
`gram which may be expensive and complex to the user
`who then enters it into a system but cannot run it until
`he obtains a particular code corresponding to time of 65
`use of the program from the owner or the distributor.
`Once this code is obtained and entered then according
`to the above sequence the program runs and reruns for
`
`60
`
`[0
`
`15
`
`20
`
`25
`
`30
`
`35
`
`45
`
`50
`
`55
`
`4,868,736
`
`6
`*1
`..
`a predetermined cumulative time depending on the
`amount of value of the time paid for. At the end of this
`time further requests can be initiated for additional time
`and if no such codes are entered then the program will
`terminate. There is no way of revrunning the program to
`obtain ‘free’ program time and further codes must be
`obtained from the owner. The special reformatting of
`the disk track renders it transparent to the operating
`system of the host computer so that codes are virtually
`unreadable to ensure security. This system is attractive
`in that purchase of large and expensive, perhaps unnec-
`essary, programs is obviated and users are able to obtain
`use of up-to-date programs in an economical and effi-
`cient manner and furthermore they are able to tailor the
`use of the program to their own system as required and
`merely pay for what they use. They are not limited by
`having to spend a considerable amount of money on
`programs which may become obsolete in two or three
`months.
`Reference is made to FIGS. 6 and 7 which relates to
`a further application and embodiment of the system
`according to the invention. In this application the media
`is one containing a plurality of codes which can be
`written on once only known as WORM (write-once
`read many times) such as an optical disk or laser card or
`the like in contrast to a magnetic standard floppy disk.
`The layout of information on the media is best seen in
`FIG. 7. Each code, code 1,2,3 etc. has one adjacent
`space for permitting the code to be repeated, and also a
`plurality of predetermined spaces “in the same line" to
`record the number of uses of the code, indicated by ‘1’.
`The number of uses is terminated by a ‘0’. Also a line
`(line 1) contains spaces reserved for current codes and
`also a list of codes previously used.
`Line 1 shows that the code currently in use is code 3
`and this has been used, according to line 6, 3 times out
`of a possible 32 times. Lines 4 and 5 show that the units
`available in association with code 1 and code 2 have
`been fully utilised.
`With reference to FIG. 6 the system operates by
`checking if a valid key device e.g. disk, laser card is
`present 72 and then line 1 is scanned for the last code
`used which is deemed to be the current code 73. The
`current code area is then scanned i.e. code 3 in line 6 to
`check if any units remain 76. If units remain, and are
`used, line 6 is updated with a ‘l’code. If no units remain
`Le. a ‘O’is present, then a new code is requested 82 and
`checked for a match. If a match is found the valid ‘key’
`presence is checked 72. If not the process is repeated for
`a preset number of times before a ‘corrput key’ signal is
`created.
`With this application, because of the medium used,
`code duplication is used instead of erasing the codes as
`aforedescribed, to control access, although a further
`modification is to permit the same code to be used a
`preset number of times. This is. in the broadest sense, a
`code used once is repeated and can be preset for 1 use
`only. No further access to information from this code
`will be permitted providing the same security effect as
`with the aforedescribed code erasure system.
`Reference is now also made to FIG. 8 of the drawings
`which is similar to FIG. 6 except that the media is eras-
`able. This can be operated as for code duplication or
`with code erasure to permit access control to informa—
`tion. The system operates, after having ascertained that
`a valid key is present, by reading the available units T1
`104, if the units satisfies the test T1>0 106 then T1 is
`written to the key 108. If T1<0 a new code is required
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1014-00010
`
`
`
`4,868,736
`
`7
`110 and is entered 112 until a match is found 114, where-
`upon the units associated with code To are located and
`the location of the code set to zero 116. Tc is written
`into T1, that is To is written into the current available
`units area. If no match is found after three attempts then
`a corrupt key is actuated 118.
`It will be appreciated that various modifications may
`be made to the system hereinbefore described without
`departing from the scope of the invention. For example,
`it will be appreciated that any suitable storage means
`may be used to obtain the codes and the system is not
`solely for application for running computer programs.
`It could be used to control hardware such as computers
`per se or VCR units in which case obtaining a‘code and
`entering it would permit the VCR to run for a fixed
`time, for example 24 to 48 hours.
`Many applications of the system hereinbefore de-
`scribed are foreseen. Firstly, the system could be used
`to control instant printing of information at the point of
`sale or point of use, for example, in a library on-line to
`a computer or any other means of broadcasting. FIG. 9
`depicts a diagrammatic application of the system ap-
`plied to satellite transmission of information. Because
`satellite communication channels can handle large vol-
`ume of data transmission at high rates of transmission it
`would be suited for use with the system for control
`access to the information. The information transmits
`from ground transmission station 40 to ground receiv-
`ing station 42 via satellite 44 is passed to a decoder 46
`associated with a display unit 48. A key unit 50 such as
`hereinbefore described is coupled to the decoder and
`information transmitted over the satellite link cannot be
`accessed until the user obtains ‘key codes’, which pro-
`vides control of access to the information and its use as
`aforedescribed. The key could be on a smart card for
`example and could be used to ‘buy’ and monitor units of
`information received. The card could contain 1000
`‘information units’ and a new code is required each time
`the card is used, for example for each 20 information
`units.
`'
`Also one aspect of established prior art is to provide
`access to information on a remote computer over a
`telephone connection or other form of communication.
`Until this invention it has not been possible to control
`access to information which have been down loaded
`from the remote computer to a storage device within or
`attached to the users system and then to allow offline
`use of this information because there was no means of
`protecting copyright or charging for use. An improve-
`ment on this prior art is to incorporate a key device
`within the users system to control access to the down
`loaded information be it data, software or some other
`type of information. Copies of the information etc. can-
`not be used unless further key devices have been pro-
`vided.
`Pay as you view TV systems have previously relied
`on a subscription system which is not equitable or good
`for marketing. An improvement on the prior art is to fit
`each TV with a key device which will both control
`access and monitor the number of access units used.
`This device could either be incorporated within the TV
`as for example a smart card reader or a purpose made
`device on-line between the signal cable and the re-
`ceiver.
`With the publication of music on compact disk the
`opportunity arises for publishers to provide high quality
`recorded material for public performance in licensed
`premises, hotels, restaurants etc.