BR0211371A - Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit - Google Patents
Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unitInfo
- Publication number
- BR0211371A BR0211371A BR0211371-6A BR0211371A BR0211371A BR 0211371 A BR0211371 A BR 0211371A BR 0211371 A BR0211371 A BR 0211371A BR 0211371 A BR0211371 A BR 0211371A
- Authority
- BR
- Brazil
- Prior art keywords
- unit
- processing
- software
- unauthorized use
- storage unit
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Storage Device Security (AREA)
Abstract
"PROCESSO PARA PROTEGER UM SOFTWARE VULNERáVEL CONTRA O SEU USO NãO AUTORIZADO; SISTEMA PARA A IMPLEMENTAçãO DO PROCESSO; UNIDADE PRé-PERSONALIZADA; UNIDADE QUE PERMITE EXECUTAR UM SOFTWARE PROTEGIDO E IMPEDIR SUA UTILIZAçãO NãO AUTORIZADA; CONJUNTO DE UNIDADES; CONJUNTO DE DISTRIBUIçãO DE UM SOFTWARE PROTEGIDO; UNIDADE DE PROCESSAMENTO E DE MEMORIZAçãO E CONJUNTO DE UNIDADES DE PROCESSAMENTO E DE MEMORIZAçãO". O objeto da presente invenção se refere a um processo para proteger, a partir de pelo menos uma unidade, um software vulnerável contra seu uso não autorizado, sendo que o referido software vulnerável funciona em um sistema de processamento de dados. O processo consiste em criar um software protegido: - escolhendo-se pelo menos um processamento algorítmico, produzindo-se a fonte do software protegido a partir da fonte do software vulnerável, modificando a fonte do software vulnerável, de maneira que pelo menos um processamento algorítmico escolhido seja decomposto, de modo que, durante a execução do software protegido apareçam várias etapas distintas, ou seja: - a disponibilização de pelo menos um operando para a unidade, - a realização pela unidade da funcionalidade do processamento algorítmico pelo menos nesse operando, - e, eventualmente, a disponibilização de pelo menos um resultado pela unidade para o sistema de processamento de dados."PROCESS TO PROTECT A VULNERABLE SOFTWARE AGAINST ITS UNAUTHORIZED USE; UNPersonalized SOFTWARE; SYSTEM FOR IMPLEMENTATION OF THE PROCESS; PRE-PERSONALIZED UNIT; PROCESSING AND STORAGE UNIT AND ASSEMBLY OF PROCESSING AND STORAGE UNITS ". The object of the present invention relates to a process for protecting from at least one drive vulnerable software against unauthorized use thereof, said vulnerable software operating in a data processing system. The process is to create protected software: - by choosing at least one algorithmic processing, producing the protected software source from the vulnerable software source, modifying the vulnerable software source, so that at least one algorithmic processing decomposed so that during the execution of the protected software several distinct steps appear, namely: - making at least one operand available to the unit, - realizing by the unit the functionality of algorithmic processing at least in that operand, - and eventually providing at least one result per unit to the data processing system.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0110247A FR2828304B1 (en) | 2001-07-31 | 2001-07-31 | METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "TIME DISSOCIATION" AGAINST ITS UNAUTHORIZED USE |
PCT/FR2002/002339 WO2003012650A2 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use |
Publications (1)
Publication Number | Publication Date |
---|---|
BR0211371A true BR0211371A (en) | 2004-09-28 |
Family
ID=8866122
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR0211371-6A BR0211371A (en) | 2001-07-31 | 2002-07-04 | Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit |
Country Status (18)
Country | Link |
---|---|
EP (1) | EP1412862A2 (en) |
JP (1) | JP3949108B2 (en) |
KR (1) | KR20040031778A (en) |
CN (1) | CN100451910C (en) |
BR (1) | BR0211371A (en) |
CA (1) | CA2454092A1 (en) |
FR (1) | FR2828304B1 (en) |
HR (1) | HRP20040047A2 (en) |
HU (1) | HUP0400223A2 (en) |
IL (1) | IL159954A0 (en) |
MA (1) | MA26125A1 (en) |
MX (1) | MXPA04000594A (en) |
NO (1) | NO20040227L (en) |
PL (1) | PL367424A1 (en) |
TN (1) | TNSN04014A1 (en) |
WO (1) | WO2003012650A2 (en) |
YU (1) | YU5504A (en) |
ZA (1) | ZA200400349B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102011006000B4 (en) | 2011-03-23 | 2015-01-15 | Infineon Technologies Ag | Signature update by code transformation |
KR101217668B1 (en) * | 2011-05-12 | 2013-01-02 | 주식회사 안랩 | Malicious program hooking prevention apparatus and method |
US11595201B2 (en) | 2020-02-21 | 2023-02-28 | Cyber Armor Ltd. | System and method for generation of a disposable software module for cryptographic material protection |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2634917A1 (en) * | 1988-08-01 | 1990-02-02 | Pionchon Philippe | METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
WO1999001815A1 (en) * | 1997-06-09 | 1999-01-14 | Intertrust, Incorporated | Obfuscation techniques for enhancing software security |
DE69819790D1 (en) * | 1998-06-12 | 2003-12-18 | Gemplus Gemenos | METHOD FOR CONTROLLING THE EXECUTION OF A PROGRAM PRODUCT |
-
2001
- 2001-07-31 FR FR0110247A patent/FR2828304B1/en not_active Expired - Lifetime
-
2002
- 2002-07-04 HU HU0400223A patent/HUP0400223A2/en unknown
- 2002-07-04 CA CA002454092A patent/CA2454092A1/en not_active Abandoned
- 2002-07-04 BR BR0211371-6A patent/BR0211371A/en not_active IP Right Cessation
- 2002-07-04 KR KR10-2004-7000805A patent/KR20040031778A/en not_active Application Discontinuation
- 2002-07-04 JP JP2003517759A patent/JP3949108B2/en not_active Expired - Fee Related
- 2002-07-04 CN CNB028146859A patent/CN100451910C/en not_active Expired - Fee Related
- 2002-07-04 MX MXPA04000594A patent/MXPA04000594A/en unknown
- 2002-07-04 IL IL15995402A patent/IL159954A0/en unknown
- 2002-07-04 PL PL02367424A patent/PL367424A1/en not_active Application Discontinuation
- 2002-07-04 WO PCT/FR2002/002339 patent/WO2003012650A2/en active Application Filing
- 2002-07-04 YU YU5504A patent/YU5504A/en unknown
- 2002-07-04 EP EP02760379A patent/EP1412862A2/en not_active Withdrawn
-
2004
- 2004-01-16 ZA ZA2004/00349A patent/ZA200400349B/en unknown
- 2004-01-19 TN TNP2004000014A patent/TNSN04014A1/en unknown
- 2004-01-19 MA MA27491A patent/MA26125A1/en unknown
- 2004-01-19 NO NO20040227A patent/NO20040227L/en not_active Application Discontinuation
- 2004-01-19 HR HR20040047A patent/HRP20040047A2/en not_active Application Discontinuation
Also Published As
Publication number | Publication date |
---|---|
NO20040227L (en) | 2004-03-30 |
EP1412862A2 (en) | 2004-04-28 |
TNSN04014A1 (en) | 2006-06-01 |
CN1552010A (en) | 2004-12-01 |
HRP20040047A2 (en) | 2004-06-30 |
KR20040031778A (en) | 2004-04-13 |
WO2003012650A2 (en) | 2003-02-13 |
CN100451910C (en) | 2009-01-14 |
FR2828304B1 (en) | 2010-09-03 |
PL367424A1 (en) | 2005-02-21 |
YU5504A (en) | 2006-05-25 |
CA2454092A1 (en) | 2003-02-13 |
JP3949108B2 (en) | 2007-07-25 |
FR2828304A1 (en) | 2003-02-07 |
MXPA04000594A (en) | 2005-02-17 |
WO2003012650A3 (en) | 2003-12-24 |
HUP0400223A2 (en) | 2004-08-30 |
IL159954A0 (en) | 2004-06-20 |
ZA200400349B (en) | 2005-03-30 |
JP2004537807A (en) | 2004-12-16 |
MA26125A1 (en) | 2004-04-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11416624B2 (en) | Cryptographic computing using encrypted base addresses and used in multi-tenant environments | |
US11403234B2 (en) | Cryptographic computing using encrypted base addresses and used in multi-tenant environments | |
BRPI0501171A (en) | Method and system for enforcing security policy via a virtual security mechanism | |
US7065652B1 (en) | System for obfuscating computer code upon disassembly | |
NO20023964D0 (en) | Controlling a computer program's access to a resource using a digital signature | |
WO2004081707A3 (en) | Data processing system with peripheral access protection and method therefor | |
WO2001063412A3 (en) | Small memory footprint system and method for separating applications within a single virtual machine | |
US12079197B2 (en) | Systems and methods for updating metadata | |
ATE386290T1 (en) | PROTECTED CONTENT ACCESS SYSTEM AND METHODS IN A PERMISSION MANAGEMENT SYSTEM | |
ATE511671T1 (en) | MINIMAL USER RIGHTS THROUGH RESTRICTED ACCESS PERMISSIONS | |
WO2003104981A3 (en) | System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container | |
MY151284A (en) | Computer security management, such as in a virtual machine or hardened operating system | |
AU7340700A (en) | Fast write instruction for micro engine used in multithreaded parallel processorarchitecture | |
WO2007077362A3 (en) | Method for authenticating applications of a computer system | |
WO2012099945A1 (en) | System and method for supporting jit in a secure system with randomly allocated memory ranges | |
BRPI0404095A (en) | Secure entry and exit to a trusted agent on a system with a strong execution environment | |
BR0114014A (en) | Method and apparatus for improving the protection of information presented by a computer. | |
MY115760A (en) | Method and system for preventing unauthorized access to a computer program | |
BR0211371A (en) | Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit | |
DE50008116D1 (en) | anonymization PROCEDURE | |
WO2001069374A3 (en) | Task control block for a computing environment | |
BR0211374A (en) | Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit | |
BR0211372A (en) | Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit | |
BR0211370A (en) | Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit | |
DE69627303D1 (en) | CD-ROM SOFTWARE PROTECTION SYSTEM |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B08F | Application dismissed because of non-payment of annual fees [chapter 8.6 patent gazette] |
Free format text: REFERENTE A 8A E 9A A NUIDADES. |
|
B08K | Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette] |
Free format text: REFERENTE AO DESPACHO 8.6 PUBLICADO NA RPI 2108 DE 31/05/2011. |