AP2055A - Method to protect software against unwanted use with a "detection and coercion" principle - Google Patents

Method to protect software against unwanted use with a "detection and coercion" principle

Info

Publication number
AP2055A
AP2055A APAP/P/2004/002959A AP2004002959A AP2055A AP 2055 A AP2055 A AP 2055A AP 2004002959 A AP2004002959 A AP 2004002959A AP 2055 A AP2055 A AP 2055A
Authority
AP
ARIPO
Prior art keywords
software
coercion
unit
detection
principle
Prior art date
Application number
APAP/P/2004/002959A
Other versions
AP2004002959A0 (en
Inventor
Jean Christophe Cuenod
Gilles Sgro
Original Assignee
Validy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Validy filed Critical Validy
Publication of AP2004002959A0 publication Critical patent/AP2004002959A0/en
Application granted granted Critical
Publication of AP2055A publication Critical patent/AP2055A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Remote Sensing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Storage Device Security (AREA)
  • Debugging And Monitoring (AREA)
  • Stored Programmes (AREA)
  • Preparing Plates And Mask In Photomechanical Process (AREA)

Abstract

The invention concerns a method for protecting, from a unit, a vulnerable software against its unauthorised use, said vulnerable software operating on a data processing system. The method consists in defining: at least one executing characteristic of the software, capable of being monitored at least partly in a unit; at least one criterion to be observed for at least one executing characteristic of the software; detection means to be implemented in a unit and enabling to detect whether at least one software executing J characteristic does not observe at least one associated criterion; and coercion means to be implemented in a unit for informing the data processing system and/or modifying the execution of a software when at least one criterion is not observed.
APAP/P/2004/002959A 2001-07-31 2002-07-04 Method to protect software against unwanted use with a "detection and coercion" principle AP2055A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0110244A FR2828301B1 (en) 2001-07-31 2001-07-31 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "DETECTION AND COERCITION" AGAINST ITS UNAUTHORIZED USE
PCT/FR2002/002343 WO2003012571A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called detection and coercion principle against its unauthorised use

Publications (2)

Publication Number Publication Date
AP2004002959A0 AP2004002959A0 (en) 2004-03-31
AP2055A true AP2055A (en) 2009-10-15

Family

ID=8866119

Family Applications (1)

Application Number Title Priority Date Filing Date
APAP/P/2004/002959A AP2055A (en) 2001-07-31 2002-07-04 Method to protect software against unwanted use with a "detection and coercion" principle

Country Status (29)

Country Link
EP (1) EP1412838B1 (en)
JP (1) JP3949104B2 (en)
KR (1) KR100881733B1 (en)
CN (1) CN100339778C (en)
AP (1) AP2055A (en)
AU (1) AU2002328377B2 (en)
BR (1) BR0211373A (en)
CA (1) CA2455626A1 (en)
CO (1) CO5550507A2 (en)
EA (1) EA005466B1 (en)
EC (1) ECSP044952A (en)
ES (1) ES2529426T3 (en)
FR (1) FR2828301B1 (en)
GE (1) GEP20053648B (en)
HK (1) HK1078363A1 (en)
HR (1) HRP20040045A2 (en)
HU (1) HUP0400234A2 (en)
IL (1) IL159955A0 (en)
IS (1) IS7120A (en)
MA (1) MA26122A1 (en)
MX (1) MXPA04000489A (en)
NO (1) NO333768B1 (en)
OA (1) OA12700A (en)
PL (1) PL371096A1 (en)
RS (1) RS50234B (en)
TN (1) TNSN04011A1 (en)
UA (1) UA77187C2 (en)
WO (1) WO2003012571A2 (en)
ZA (1) ZA200400352B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (en) * 1988-08-01 1990-02-02 Pionchon Philippe METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES
EP0359220A2 (en) * 1988-09-16 1990-03-21 Wayne W. Chou Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded hardware device
US5706426A (en) * 1996-02-07 1998-01-06 United Microelectronics Corporation Software protection method and apparatus
WO1999066387A1 (en) * 1998-06-12 1999-12-23 Gemplus Method for verifying the execution of a software product

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
US6523119B2 (en) * 1996-12-04 2003-02-18 Rainbow Technologies, Inc. Software protection device and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (en) * 1988-08-01 1990-02-02 Pionchon Philippe METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES
EP0359220A2 (en) * 1988-09-16 1990-03-21 Wayne W. Chou Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded hardware device
US5706426A (en) * 1996-02-07 1998-01-06 United Microelectronics Corporation Software protection method and apparatus
WO1999066387A1 (en) * 1998-06-12 1999-12-23 Gemplus Method for verifying the execution of a software product

Also Published As

Publication number Publication date
TNSN04011A1 (en) 2006-06-01
HRP20040045A2 (en) 2005-02-28
KR20040026685A (en) 2004-03-31
MXPA04000489A (en) 2005-03-07
AU2002328377B2 (en) 2008-10-02
YU5704A (en) 2006-05-25
CO5550507A2 (en) 2005-08-31
ES2529426T3 (en) 2015-02-20
IS7120A (en) 2004-01-20
WO2003012571A2 (en) 2003-02-13
CN1620640A (en) 2005-05-25
MA26122A1 (en) 2004-04-01
ECSP044952A (en) 2004-04-28
KR100881733B1 (en) 2009-02-06
EA200400058A1 (en) 2004-06-24
GEP20053648B (en) 2005-10-25
NO20040229L (en) 2004-03-30
UA77187C2 (en) 2006-11-15
ZA200400352B (en) 2005-03-30
CN100339778C (en) 2007-09-26
EP1412838A2 (en) 2004-04-28
HUP0400234A2 (en) 2004-09-28
JP2004537796A (en) 2004-12-16
EA005466B1 (en) 2005-02-24
WO2003012571A3 (en) 2004-01-22
CA2455626A1 (en) 2003-02-13
HK1078363A1 (en) 2006-03-10
IL159955A0 (en) 2004-06-20
JP3949104B2 (en) 2007-07-25
AP2004002959A0 (en) 2004-03-31
FR2828301B1 (en) 2010-09-03
RS50234B (en) 2009-07-15
FR2828301A1 (en) 2003-02-07
OA12700A (en) 2006-06-23
NO333768B1 (en) 2013-09-16
EP1412838B1 (en) 2014-11-19
BR0211373A (en) 2005-05-10
PL371096A1 (en) 2005-06-13

Similar Documents

Publication Publication Date Title
WO2001092981A3 (en) System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
TW215482B (en) Trusted personal computer system with identification
EP1909185A3 (en) Tamper protection of software agents operating in a VT environment methods and apparatuses
WO2005020043A3 (en) Program execution device
WO2006019726A3 (en) System and method for detecting computer virus
WO2003093961A3 (en) Method and apparatus for protecting information and privacy
WO2001095067A3 (en) System and method for protecting a networked computer from viruses
WO2009014779A3 (en) System for malware normalization and detection
EP1630710A3 (en) Containment of worms
AP2055A (en) Method to protect software against unwanted use with a "detection and coercion" principle
US20170185770A1 (en) System and method for detecting activities within a bootstrap of a computerized device based on monitoring of power consumption
WO2004057434A3 (en) Access control to a memory portion, the memory portion being concealed from operating system
GB0413851D0 (en) System and method for comprehensive general protection for computers against malicious programs that may steal information and/or cause damages
EP1271326A3 (en) Write protect method
EP1679592A3 (en) Data processing system, storage device and computer program
WO2003060726A3 (en) Method for licensing software programs
AP2004002958A0 (en) Method to protect software against unwanted use with a "variable" principle
EP1594031A3 (en) Method and arrangement for protection of information
JPH0371470A (en) Write protection device
EP1031906A3 (en) Method and coupling arrangement for preventing unauthorized access to a microprocessor
BR0211375A (en) Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit
HUP0400223A2 (en) Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
HUP0400239A2 (en) Method for protecting a software using a so-called elementary functions principle against its unauthorised use
TW200502857A (en) Operation method of portable computer's warning capability
EP1850259A3 (en) Method of protecting executable code and data of a computer system