BR0211371A - Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit - Google Patents

Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit

Info

Publication number
BR0211371A
BR0211371A BR0211371-6A BR0211371A BR0211371A BR 0211371 A BR0211371 A BR 0211371A BR 0211371 A BR0211371 A BR 0211371A BR 0211371 A BR0211371 A BR 0211371A
Authority
BR
Brazil
Prior art keywords
unit
processing
software
unauthorized use
storage unit
Prior art date
Application number
BR0211371-6A
Other languages
Portuguese (pt)
Inventor
Jean-Christophe Cuenod
Gilles Sgro
Original Assignee
Validy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Validy filed Critical Validy
Publication of BR0211371A publication Critical patent/BR0211371A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Storage Device Security (AREA)

Abstract

"PROCESSO PARA PROTEGER UM SOFTWARE VULNERáVEL CONTRA O SEU USO NãO AUTORIZADO; SISTEMA PARA A IMPLEMENTAçãO DO PROCESSO; UNIDADE PRé-PERSONALIZADA; UNIDADE QUE PERMITE EXECUTAR UM SOFTWARE PROTEGIDO E IMPEDIR SUA UTILIZAçãO NãO AUTORIZADA; CONJUNTO DE UNIDADES; CONJUNTO DE DISTRIBUIçãO DE UM SOFTWARE PROTEGIDO; UNIDADE DE PROCESSAMENTO E DE MEMORIZAçãO E CONJUNTO DE UNIDADES DE PROCESSAMENTO E DE MEMORIZAçãO". O objeto da presente invenção se refere a um processo para proteger, a partir de pelo menos uma unidade, um software vulnerável contra seu uso não autorizado, sendo que o referido software vulnerável funciona em um sistema de processamento de dados. O processo consiste em criar um software protegido: - escolhendo-se pelo menos um processamento algorítmico, produzindo-se a fonte do software protegido a partir da fonte do software vulnerável, modificando a fonte do software vulnerável, de maneira que pelo menos um processamento algorítmico escolhido seja decomposto, de modo que, durante a execução do software protegido apareçam várias etapas distintas, ou seja: - a disponibilização de pelo menos um operando para a unidade, - a realização pela unidade da funcionalidade do processamento algorítmico pelo menos nesse operando, - e, eventualmente, a disponibilização de pelo menos um resultado pela unidade para o sistema de processamento de dados."PROCESS TO PROTECT A VULNERABLE SOFTWARE AGAINST ITS UNAUTHORIZED USE; UNPersonalized SOFTWARE; SYSTEM FOR IMPLEMENTATION OF THE PROCESS; PRE-PERSONALIZED UNIT; PROCESSING AND STORAGE UNIT AND ASSEMBLY OF PROCESSING AND STORAGE UNITS ". The object of the present invention relates to a process for protecting from at least one drive vulnerable software against unauthorized use thereof, said vulnerable software operating in a data processing system. The process is to create protected software: - by choosing at least one algorithmic processing, producing the protected software source from the vulnerable software source, modifying the vulnerable software source, so that at least one algorithmic processing decomposed so that during the execution of the protected software several distinct steps appear, namely: - making at least one operand available to the unit, - realizing by the unit the functionality of algorithmic processing at least in that operand, - and eventually providing at least one result per unit to the data processing system.

BR0211371-6A 2001-07-31 2002-07-04 Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit BR0211371A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0110247A FR2828304B1 (en) 2001-07-31 2001-07-31 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "TIME DISSOCIATION" AGAINST ITS UNAUTHORIZED USE
PCT/FR2002/002339 WO2003012650A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use

Publications (1)

Publication Number Publication Date
BR0211371A true BR0211371A (en) 2004-09-28

Family

ID=8866122

Family Applications (1)

Application Number Title Priority Date Filing Date
BR0211371-6A BR0211371A (en) 2001-07-31 2002-07-04 Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit

Country Status (18)

Country Link
EP (1) EP1412862A2 (en)
JP (1) JP3949108B2 (en)
KR (1) KR20040031778A (en)
CN (1) CN100451910C (en)
BR (1) BR0211371A (en)
CA (1) CA2454092A1 (en)
FR (1) FR2828304B1 (en)
HR (1) HRP20040047A2 (en)
HU (1) HUP0400223A2 (en)
IL (1) IL159954A0 (en)
MA (1) MA26125A1 (en)
MX (1) MXPA04000594A (en)
NO (1) NO20040227L (en)
PL (1) PL367424A1 (en)
TN (1) TNSN04014A1 (en)
WO (1) WO2003012650A2 (en)
YU (1) YU5504A (en)
ZA (1) ZA200400349B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102011006000B4 (en) 2011-03-23 2015-01-15 Infineon Technologies Ag Signature update by code transformation
KR101217668B1 (en) * 2011-05-12 2013-01-02 주식회사 안랩 Malicious program hooking prevention apparatus and method
US11595201B2 (en) 2020-02-21 2023-02-28 Cyber Armor Ltd. System and method for generation of a disposable software module for cryptographic material protection

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (en) * 1988-08-01 1990-02-02 Pionchon Philippe METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
WO1999001815A1 (en) * 1997-06-09 1999-01-14 Intertrust, Incorporated Obfuscation techniques for enhancing software security
DE69819790D1 (en) * 1998-06-12 2003-12-18 Gemplus Gemenos METHOD FOR CONTROLLING THE EXECUTION OF A PROGRAM PRODUCT

Also Published As

Publication number Publication date
NO20040227L (en) 2004-03-30
EP1412862A2 (en) 2004-04-28
TNSN04014A1 (en) 2006-06-01
CN1552010A (en) 2004-12-01
HRP20040047A2 (en) 2004-06-30
KR20040031778A (en) 2004-04-13
WO2003012650A2 (en) 2003-02-13
CN100451910C (en) 2009-01-14
FR2828304B1 (en) 2010-09-03
PL367424A1 (en) 2005-02-21
YU5504A (en) 2006-05-25
CA2454092A1 (en) 2003-02-13
JP3949108B2 (en) 2007-07-25
FR2828304A1 (en) 2003-02-07
MXPA04000594A (en) 2005-02-17
WO2003012650A3 (en) 2003-12-24
HUP0400223A2 (en) 2004-08-30
IL159954A0 (en) 2004-06-20
ZA200400349B (en) 2005-03-30
JP2004537807A (en) 2004-12-16
MA26125A1 (en) 2004-04-01

Similar Documents

Publication Publication Date Title
US11416624B2 (en) Cryptographic computing using encrypted base addresses and used in multi-tenant environments
US11403234B2 (en) Cryptographic computing using encrypted base addresses and used in multi-tenant environments
BRPI0501171A (en) Method and system for enforcing security policy via a virtual security mechanism
US7065652B1 (en) System for obfuscating computer code upon disassembly
NO20023964D0 (en) Controlling a computer program's access to a resource using a digital signature
WO2004081707A3 (en) Data processing system with peripheral access protection and method therefor
WO2001063412A3 (en) Small memory footprint system and method for separating applications within a single virtual machine
US12079197B2 (en) Systems and methods for updating metadata
ATE386290T1 (en) PROTECTED CONTENT ACCESS SYSTEM AND METHODS IN A PERMISSION MANAGEMENT SYSTEM
ATE511671T1 (en) MINIMAL USER RIGHTS THROUGH RESTRICTED ACCESS PERMISSIONS
WO2003104981A3 (en) System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container
MY151284A (en) Computer security management, such as in a virtual machine or hardened operating system
AU7340700A (en) Fast write instruction for micro engine used in multithreaded parallel processorarchitecture
WO2007077362A3 (en) Method for authenticating applications of a computer system
WO2012099945A1 (en) System and method for supporting jit in a secure system with randomly allocated memory ranges
BRPI0404095A (en) Secure entry and exit to a trusted agent on a system with a strong execution environment
BR0114014A (en) Method and apparatus for improving the protection of information presented by a computer.
MY115760A (en) Method and system for preventing unauthorized access to a computer program
BR0211371A (en) Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit
DE50008116D1 (en) anonymization PROCEDURE
WO2001069374A3 (en) Task control block for a computing environment
BR0211374A (en) Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit
BR0211372A (en) Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit
BR0211370A (en) Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit
DE69627303D1 (en) CD-ROM SOFTWARE PROTECTION SYSTEM

Legal Events

Date Code Title Description
B08F Application dismissed because of non-payment of annual fees [chapter 8.6 patent gazette]

Free format text: REFERENTE A 8A E 9A A NUIDADES.

B08K Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette]

Free format text: REFERENTE AO DESPACHO 8.6 PUBLICADO NA RPI 2108 DE 31/05/2011.