AR042599A1 - Metodo de proteccion de programas y equipo para realizarlo - Google Patents
Metodo de proteccion de programas y equipo para realizarloInfo
- Publication number
- AR042599A1 AR042599A1 ARP020104434A ARP020104434A AR042599A1 AR 042599 A1 AR042599 A1 AR 042599A1 AR P020104434 A ARP020104434 A AR P020104434A AR P020104434 A ARP020104434 A AR P020104434A AR 042599 A1 AR042599 A1 AR 042599A1
- Authority
- AR
- Argentina
- Prior art keywords
- programs
- protected
- equipment
- modules
- computer
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 3
- 238000004590 computer program Methods 0.000 abstract 3
- 238000004886 process control Methods 0.000 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Remote Sensing (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Radar, Positioning & Navigation (AREA)
- Storage Device Security (AREA)
Abstract
La presente se refiere a un método de protección de programas de computación, contra la copia y el uso no autorizado, que se realiza mediante la ejecución de partes seleccionadas del código máquina del programa a proteger (protegido), o "módulos", que son extraídos y almacenados de un ambiente seguro conformado por un "dispositivo de protección". Dichos módulos son reemplazos en el programa de computación protegido por llamados a ejecución de dichos módulos dentro del dispositivo de protección, donde durante esa ejecución la "computadora" (que ejecuta el programa protegido) comparte sus recursos con dicho "dispositivo de protección" de tal manera que pueden ser utilizados por éste último. Otro aspecto de la presente es el equipo necesario para realizar dicho método. La presente puede ser aplicada para proteger sistemas de control de procesos, sistemas de control de equipos, programas para telefonía celular, programas para computadoras portátiles, programas para equipos embebidos, programas de computación en general y controladores en general.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ARP020104434A AR042599A1 (es) | 2002-11-19 | 2002-11-19 | Metodo de proteccion de programas y equipo para realizarlo |
US10/714,915 US20040098613A1 (en) | 2002-11-19 | 2003-11-18 | Software protection system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ARP020104434A AR042599A1 (es) | 2002-11-19 | 2002-11-19 | Metodo de proteccion de programas y equipo para realizarlo |
Publications (1)
Publication Number | Publication Date |
---|---|
AR042599A1 true AR042599A1 (es) | 2005-06-29 |
Family
ID=32234809
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
ARP020104434A AR042599A1 (es) | 2002-11-19 | 2002-11-19 | Metodo de proteccion de programas y equipo para realizarlo |
Country Status (2)
Country | Link |
---|---|
US (1) | US20040098613A1 (es) |
AR (1) | AR042599A1 (es) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7793346B1 (en) * | 2003-01-17 | 2010-09-07 | Mcafee, Inc. | System, method, and computer program product for preventing trojan communication |
US20050216548A1 (en) * | 2004-03-04 | 2005-09-29 | Brian Wormington | Method and system for digital content distribution |
RU2296363C1 (ru) * | 2006-04-27 | 2007-03-27 | Общество с ограниченной ответственностью "АСТРОМА" | Способ и средство защиты программного обеспечения от несанкционированного использования |
US20080133419A1 (en) * | 2006-12-05 | 2008-06-05 | Brian Wormington | Secure financial transaction system and method |
CN100461200C (zh) * | 2006-12-22 | 2009-02-11 | 北京飞天诚信科技有限公司 | 一种在软件保护装置中实现软件保护的方法与装置 |
US20080263366A1 (en) * | 2007-04-19 | 2008-10-23 | Microsoft Corporation | Self-verifying software to prevent reverse engineering and piracy |
CN101853357A (zh) * | 2010-04-28 | 2010-10-06 | 北京飞天诚信科技有限公司 | 软件保护方法 |
CN101980160B (zh) * | 2010-10-28 | 2013-02-13 | 飞天诚信科技股份有限公司 | 一种.net程序加密后的执行方法 |
DE112012004661T5 (de) | 2011-08-05 | 2014-09-11 | Kpit Technologies Ltd. | System zum Schutz von eingebettetem Software-Code |
CN103218551B (zh) * | 2013-05-03 | 2016-04-06 | 飞天诚信科技股份有限公司 | 一种保护java程序的方法 |
US9740854B2 (en) * | 2013-10-25 | 2017-08-22 | Red Hat, Inc. | System and method for code protection |
US9767324B2 (en) * | 2014-11-22 | 2017-09-19 | Intel Corporation | Transparent execution of secret content |
CN107423586B (zh) * | 2017-07-31 | 2018-11-20 | 北京深思数盾科技股份有限公司 | 软件保护方法和软件保护装置 |
US20220374512A1 (en) * | 2021-05-21 | 2022-11-24 | Vmware, Inc. | Software-based hardware security module (hsm) for a virtualized computing environment |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4609777A (en) * | 1984-02-22 | 1986-09-02 | Gordian Systems, Inc. | Solid state key for controlling access to computer software |
GB2163577B (en) * | 1984-08-23 | 1988-01-13 | Nat Res Dev | Software protection device |
US4685055A (en) * | 1985-07-01 | 1987-08-04 | Thomas Richard B | Method and system for controlling use of protected software |
US4817140A (en) * | 1986-11-05 | 1989-03-28 | International Business Machines Corp. | Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor |
US5530752A (en) * | 1994-02-22 | 1996-06-25 | Convex Computer Corporation | Systems and methods for protecting software from unlicensed copying and use |
NO302388B1 (no) * | 1995-07-13 | 1998-02-23 | Sigurd Sigbjoernsen | Fremgangsmåte og anordning for å beskytte programvare mot bruk uten tillatelse |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
US6009543A (en) * | 1996-03-01 | 1999-12-28 | Massachusetts Institute Of Technology | Secure software system and related techniques |
US6523119B2 (en) * | 1996-12-04 | 2003-02-18 | Rainbow Technologies, Inc. | Software protection device and method |
US6850916B1 (en) * | 1998-04-27 | 2005-02-01 | Esignx Corporation | Portable electronic charge and authorization devices and methods therefor |
US6343280B2 (en) * | 1998-12-15 | 2002-01-29 | Jonathan Clark | Distributed execution software license server |
US6594671B1 (en) * | 1999-06-14 | 2003-07-15 | International Business Machines Corporation | Separating privileged functions from non-privileged functions in a server instance |
US7010808B1 (en) * | 2000-08-25 | 2006-03-07 | Microsoft Corporation | Binding digital content to a portable storage device or the like in a digital rights management (DRM) system |
US7174466B2 (en) * | 2001-08-01 | 2007-02-06 | Sas Validy | Method to protect software against unwanted use with a “detection and coercion” principle |
-
2002
- 2002-11-19 AR ARP020104434A patent/AR042599A1/es unknown
-
2003
- 2003-11-18 US US10/714,915 patent/US20040098613A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
US20040098613A1 (en) | 2004-05-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AR042599A1 (es) | Metodo de proteccion de programas y equipo para realizarlo | |
CO5680123A1 (es) | Metodo y sistema para exigir una politica de seguridad por medio de una maquina virtual de seguridad | |
DE69922015D1 (de) | Verfahren und vorrichtung zum übersetzen und ausführen von arteigenem code in einer umgebung mit virtuellen maschinen | |
MY151284A (en) | Computer security management, such as in a virtual machine or hardened operating system | |
BR9713666A (pt) | Método e aparelho para gerar guias de programação para televisão | |
PE20021118A1 (es) | Metodo y aparato para desinstalacion iniciada por la red del programa de aplicacion a traves de una red inalambrica | |
WO2000019317A8 (en) | Protection of boot block code while allowing write accesses to the boot block | |
WO2006101549A3 (en) | Secure system for allowing the execution of authorized computer program code | |
SE0203819D0 (sv) | Method to increase the safety integrity level of a control system | |
DE60044752D1 (de) | Verzweigungsbefehl für einen mehrfachverarbeitungsprozessor | |
WO2008013826A3 (en) | User space virtualization system | |
BR0001001A (pt) | Composição, e, processo de proteger forração de gesso | |
BRPI0510925A (pt) | métodos e composições para cicatrização de ferida | |
DE602007000637D1 (de) | System, Verfahren und mobile Vorrichtung zum Management von drahtlosen Verbindungen | |
BR0016828A (pt) | Polìmeros superabsorventes | |
ATE354827T1 (de) | Prozessbeharrlichkeit in einer virtuellen maschine | |
DE602004018501D1 (de) | Verfahren, das es einer multitasking-datenverarbeiren | |
BR0208166A (pt) | Método para carregar e executar uma aplicação em um ambiente embutido | |
WO2008008053A3 (en) | Method and system for securely protecting data during software application usage | |
AR072405A1 (es) | Un procedimiento para tratar un mineral sulfurado y microorganismo leptospirillum ferriphilum utilizado | |
AR090793A1 (es) | Recubrimientos para uñas y metodos relacionados | |
MY141056A (en) | Corrosion protection apparatus and method | |
EP0908813A3 (en) | Method and apparatus for implementing multiple return sites | |
IS6856A (is) | Lagskipt efni til þess að verja líkamshluta og búnaður sem gerður er úr þannig efni | |
WO2004059426A3 (en) | System and method for using native code interpretation to move threads to a safe state in a run-time environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FB | Suspension of granting procedure |