BR0211374A - Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit - Google Patents

Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit

Info

Publication number
BR0211374A
BR0211374A BR0211374-0A BR0211374A BR0211374A BR 0211374 A BR0211374 A BR 0211374A BR 0211374 A BR0211374 A BR 0211374A BR 0211374 A BR0211374 A BR 0211374A
Authority
BR
Brazil
Prior art keywords
unit
software
processing
unauthorized use
storage unit
Prior art date
Application number
BR0211374-0A
Other languages
Portuguese (pt)
Inventor
Jean-Christophe Cuenod
Gilles Sgro
Original Assignee
Validy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Validy filed Critical Validy
Publication of BR0211374A publication Critical patent/BR0211374A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Remote Sensing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Storage Device Security (AREA)

Abstract

"PROCESSO PARA PROTEGER UM SOFTWARE VULNERáVEL CONTRA O SEU USO NãO AUTORIZADO; SISTEMA PARA A IMPLEMENTAçãO DO PROCESSO; UNIDADE PRé-PERSONALIZADA; UNIDADE QUE PERMITE EXECUTAR UM SOFTWARE PROTEGIDO E IMPEDIR SUA UTILIZAçãO NãO AUTORIZADA; CONJUNTO DE UNIDADES; CONJUNTO DE DISTRIBUIçãO DE UM SOFTWARE PROTEGIDO; UNIDADE DE PROCESSAMENTO E DE MEMORIZAçãO E CONJUNTO DE UNIDADES DE PROCESSAMENTO E DE MEMORIZAçãO". A presente invenção se refere a um processo para proteger um software vulnerável contra seu uso não autorizado, a partir de pelo menos uma unidade, sendo que o referido software vulnerável funciona em um sistema de processamento de dados. O processo consiste em criar um software protegido: - escolhendo-se na fonte do software vulnerável pelo menos uma variável, produzindo-se a fonte do software protegido através da modificação da fonte do software vulnerável, de modo que a variável escolhida resida em uma unidade."PROCESS TO PROTECT A VULNERABLE SOFTWARE AGAINST ITS UNAUTHORIZED USE; UNPersonalized SOFTWARE; SYSTEM FOR IMPLEMENTATION OF THE PROCESS; PRE-PERSONALIZED UNIT; PROCESSING AND STORAGE UNIT AND ASSEMBLY OF PROCESSING AND STORAGE UNITS ". The present invention relates to a process for protecting vulnerable software from unauthorized use from at least one drive, said vulnerable software operating in a data processing system. The process is to create protected software by: - choosing at least one variable from the source of the vulnerable software, producing the source of the protected software by modifying the source of the vulnerable software so that the chosen variable resides in one unit. .

BR0211374-0A 2001-07-31 2002-07-04 Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit BR0211374A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0110250A FR2828305B1 (en) 2001-07-31 2001-07-31 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE SAID "VARIABLE" AGAINST ITS UNAUTHORIZED USE
PCT/FR2002/002338 WO2003012649A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called variable principle against its unauthorised use

Publications (1)

Publication Number Publication Date
BR0211374A true BR0211374A (en) 2004-07-20

Family

ID=8866125

Family Applications (1)

Application Number Title Priority Date Filing Date
BR0211374-0A BR0211374A (en) 2001-07-31 2002-07-04 Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit

Country Status (29)

Country Link
EP (1) EP1412861A2 (en)
JP (1) JP3949107B2 (en)
KR (1) KR100940347B1 (en)
CN (1) CN1288525C (en)
AP (1) AP2004002958A0 (en)
AU (1) AU2002325998B2 (en)
BR (1) BR0211374A (en)
CA (1) CA2454090A1 (en)
CO (1) CO5550508A2 (en)
CR (1) CR7231A (en)
EA (1) EA005465B1 (en)
EC (1) ECSP044951A (en)
FR (1) FR2828305B1 (en)
GE (1) GEP20053647B (en)
HK (1) HK1070155A1 (en)
HR (1) HRP20040049A2 (en)
HU (1) HUP0400228A2 (en)
IL (1) IL159953A0 (en)
IS (1) IS7121A (en)
MA (1) MA26126A1 (en)
MX (1) MXPA04000488A (en)
NO (1) NO20040232L (en)
OA (1) OA12699A (en)
PL (1) PL367366A1 (en)
TN (1) TNSN04012A1 (en)
UA (1) UA77186C2 (en)
WO (1) WO2003012649A2 (en)
YU (1) YU5404A (en)
ZA (1) ZA200400348B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2852415B1 (en) * 2003-03-11 2005-06-24 Actikey KEY TYPE MEDIUM, CONTROL OF ACCESS TO DATA AND / OR SOFTWARE, AND CORRESPONDING METHOD
CN107194212B (en) * 2017-06-21 2020-04-17 株洲中车时代电气股份有限公司 Method for protecting protocol content in source code of display

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (en) * 1988-08-01 1990-02-02 Pionchon Philippe METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
AU7957998A (en) * 1997-06-09 1999-01-25 Intertrust, Incorporated Obfuscation techniques for enhancing software security
JP2002518727A (en) * 1998-06-12 2002-06-25 ジェムプリュス How to control the execution of software products

Also Published As

Publication number Publication date
IS7121A (en) 2004-01-20
CN1535410A (en) 2004-10-06
KR20040027881A (en) 2004-04-01
MXPA04000488A (en) 2005-03-07
IL159953A0 (en) 2004-06-20
OA12699A (en) 2006-06-23
WO2003012649A2 (en) 2003-02-13
CR7231A (en) 2005-07-21
HRP20040049A2 (en) 2004-06-30
HUP0400228A2 (en) 2004-09-28
GEP20053647B (en) 2005-10-25
EA005465B1 (en) 2005-02-24
NO20040232L (en) 2004-03-30
JP3949107B2 (en) 2007-07-25
EA200400057A1 (en) 2004-06-24
WO2003012649A3 (en) 2003-12-24
FR2828305B1 (en) 2010-09-03
ECSP044951A (en) 2004-04-28
CO5550508A2 (en) 2005-08-31
JP2004537806A (en) 2004-12-16
AP2004002958A0 (en) 2004-03-31
ZA200400348B (en) 2005-03-30
AU2002325998B2 (en) 2008-10-30
TNSN04012A1 (en) 2006-06-01
YU5404A (en) 2006-08-17
CN1288525C (en) 2006-12-06
PL367366A1 (en) 2005-02-21
EP1412861A2 (en) 2004-04-28
CA2454090A1 (en) 2003-02-13
MA26126A1 (en) 2004-04-01
FR2828305A1 (en) 2003-02-07
UA77186C2 (en) 2006-11-15
KR100940347B1 (en) 2010-02-04
HK1070155A1 (en) 2005-06-10

Similar Documents

Publication Publication Date Title
WO2004081707A3 (en) Data processing system with peripheral access protection and method therefor
BRPI0501171A (en) Method and system for enforcing security policy via a virtual security mechanism
US20200159676A1 (en) Cryptographic computing using encrypted base addresses and used in multi-tenant environments
GB2375641A (en) Small memory footprint system and method for separating applications within a single virtual machine
BR0111732A (en) 2-Deoxy beta-1-nucleoside prodrugs
BR9813004A (en) Process for producing new polyketides
NO20023964L (en) Controlling a computer program's access to a resource using a digital signature
BR9914651A (en) Wrap for automatic banking machine
TW200708952A (en) Providing extended memory protection
BR0301721A (en) System and methods for safe video card output
WO2005001639A3 (en) Trusted computer system
WO2007077362A3 (en) Method for authenticating applications of a computer system
WO2004049096A3 (en) Creation of local usage rights voucher
PT985180E (en) PROCESS FOR PREVENTING CONFLICTS BETWEEN MEMORIES, COVER, DATA, DATA FLOW COMPUTERS
AU2003222411A1 (en) Access to a wide memory
WO2001053931A3 (en) Microprocessor system and method for operating a microprocessor system
EP2215544B1 (en) Enhanced microprocessor or microcontroller
BR0211374A (en) Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit
AR024470A1 (en) DEVICE FOR DATA PROCESSING AND THE CORRESPONDING METHOD
BR0211370A (en) Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit
BR0211371A (en) Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit
BR0211372A (en) Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit
Hiser et al. Evaluating fragment construction policies for SDT systems
BR0211375A (en) Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit
BR0307114A (en) data processing device, in particular a smart card, method for updating encoded data stored in a memory of a data processing device, such as a smart card and computer program for updating data stored in a memory of a processing device like a smart card

Legal Events

Date Code Title Description
B08F Application dismissed because of non-payment of annual fees [chapter 8.6 patent gazette]

Free format text: REFERENTE A 12A ANUIDADE.

B08K Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette]

Free format text: REFERENTE AO DESPACHO 8.6 PUBLICADO NA RPI 2261 DE 06/05/2014.