BR0211375A - Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit - Google Patents
Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unitInfo
- Publication number
- BR0211375A BR0211375A BR0211375-9A BR0211375A BR0211375A BR 0211375 A BR0211375 A BR 0211375A BR 0211375 A BR0211375 A BR 0211375A BR 0211375 A BR0211375 A BR 0211375A
- Authority
- BR
- Brazil
- Prior art keywords
- unit
- processing
- unauthorized use
- software
- storage unit
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 7
- 230000001419 dependent effect Effects 0.000 abstract 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Remote Sensing (AREA)
- Radar, Positioning & Navigation (AREA)
- Storage Device Security (AREA)
- Executing Machine-Instructions (AREA)
- Logic Circuits (AREA)
Abstract
"PROCESSO PARA PROTEGER UM SOFTWARE VULNERáVEL CONTRA O SEU USO NãO AUTORIZADO; SISTEMA PARA A IMPLEMENTAçãO DO PROCESSO; UNIDADE PRé-PERSONALIZADA; UNIDADE QUE PERMITE EXECUTAR UM SOFTWARE PROTEGIDO E IMPEDIR SUA UTILIZAçãO NãO AUTORIZADA; CONJUNTO DE UNIDADES; CONJUNTO DE DISTRIBUIçãO DE UM SOFTWARE PROTEGIDO; UNIDADE DE PROCESSAMENTO E DE MEMORIZAçãO E CONJUNTO DE UNIDADES DE PROCESSAMENTO E DE MEMORIZAçãO". A presente invenção se refere a um processo para proteger, a partir de uma unidade, um software vulnerável contra seu uso não autorizado, sendo que o referido software vulnerável funciona em um sistema de processamento de dados. O processo de acordo com a presente invenção consiste em definir: Um conjunto de funções dependentes cujas funções dependentes são suscetíveis de serem executadas em uma unidade, - um conjunto de comandos de acionamento, sendo que esses comandos de acionamento são suscetíveis de serem executados no sistema de processamento de dados e de acionar a execução das funções dependentes em uma unidade, - para cada comando de acionamento, uma ordem, - um método de renomeação das ordens, - e meios de restauração destinados a serem implementados em uma unidade durante uma fase de utilização, e que permitem reencontrar a função dependente a ser executada, a partir da ordem renomeada."PROCESS TO PROTECT A VULNERABLE SOFTWARE AGAINST ITS UNAUTHORIZED USE; UNPersonalized SOFTWARE; SYSTEM FOR IMPLEMENTATION OF THE PROCESS; PRE-PERSONALIZED UNIT; PROCESSING AND STORAGE UNIT AND ASSEMBLY OF PROCESSING AND STORAGE UNITS ". The present invention relates to a method of protecting vulnerable software from unauthorized use from a drive, said vulnerable software operating in a data processing system. The process according to the present invention is to define: A set of dependent functions whose dependent functions are likely to be executed on a unit, - a set of trigger commands, which trigger commands are likely to be executed on the system. data processing and triggering the execution of dependent functions in a unit, - for each trigger command, an order, - a method of renaming the orders, - and restoration means intended to be implemented in a unit during a allow you to rediscover the dependent function to be performed from the renamed order.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0110246A FR2828303B1 (en) | 2001-07-31 | 2001-07-31 | METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "RENAMING" AGAINST ITS UNAUTHORIZED USE |
PCT/FR2002/002340 WO2003012604A2 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called renaming principle against its unauthorised use |
Publications (1)
Publication Number | Publication Date |
---|---|
BR0211375A true BR0211375A (en) | 2004-08-17 |
Family
ID=8866121
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR0211375-9A BR0211375A (en) | 2001-07-31 | 2002-07-04 | Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit |
Country Status (19)
Country | Link |
---|---|
EP (1) | EP1412837A2 (en) |
JP (1) | JP3949105B2 (en) |
KR (1) | KR20040032858A (en) |
CN (1) | CN1288524C (en) |
BR (1) | BR0211375A (en) |
CA (1) | CA2454094A1 (en) |
FR (1) | FR2828303B1 (en) |
HK (1) | HK1070154A1 (en) |
HR (1) | HRP20040048A2 (en) |
HU (1) | HUP0400232A2 (en) |
IL (1) | IL159951A0 (en) |
MA (1) | MA26127A1 (en) |
MX (1) | MXPA04000596A (en) |
NO (1) | NO20040231L (en) |
PL (1) | PL367440A1 (en) |
TN (1) | TNSN04013A1 (en) |
WO (1) | WO2003012604A2 (en) |
YU (1) | YU5604A (en) |
ZA (1) | ZA200400350B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100346252C (en) * | 2005-09-28 | 2007-10-31 | 珠海金山软件股份有限公司 | Computer software security loophole repairing apparatus and method |
JP4770425B2 (en) * | 2005-11-24 | 2011-09-14 | 富士ゼロックス株式会社 | Program, method and apparatus for creating protected execution program |
CN100437615C (en) * | 2006-10-16 | 2008-11-26 | 珠海金山软件股份有限公司 | Method for protecting dynamic chanining bank interface under windows platform |
CN103198244B (en) * | 2013-03-26 | 2016-06-29 | 北京深思数盾科技股份有限公司 | The method of protection dynamic link library |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2634917A1 (en) * | 1988-08-01 | 1990-02-02 | Pionchon Philippe | METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
WO1999001815A1 (en) * | 1997-06-09 | 1999-01-14 | Intertrust, Incorporated | Obfuscation techniques for enhancing software security |
DE69819790D1 (en) * | 1998-06-12 | 2003-12-18 | Gemplus Gemenos | METHOD FOR CONTROLLING THE EXECUTION OF A PROGRAM PRODUCT |
-
2001
- 2001-07-31 FR FR0110246A patent/FR2828303B1/en not_active Expired - Lifetime
-
2002
- 2002-07-04 CA CA002454094A patent/CA2454094A1/en not_active Abandoned
- 2002-07-04 IL IL15995102A patent/IL159951A0/en unknown
- 2002-07-04 MX MXPA04000596A patent/MXPA04000596A/en unknown
- 2002-07-04 YU YU5604A patent/YU5604A/en unknown
- 2002-07-04 KR KR10-2004-7000806A patent/KR20040032858A/en not_active Application Discontinuation
- 2002-07-04 HU HU0400232A patent/HUP0400232A2/en unknown
- 2002-07-04 PL PL02367440A patent/PL367440A1/en not_active Application Discontinuation
- 2002-07-04 EP EP02762526A patent/EP1412837A2/en not_active Withdrawn
- 2002-07-04 JP JP2003517722A patent/JP3949105B2/en not_active Expired - Fee Related
- 2002-07-04 WO PCT/FR2002/002340 patent/WO2003012604A2/en active Application Filing
- 2002-07-04 BR BR0211375-9A patent/BR0211375A/en not_active IP Right Cessation
- 2002-07-04 CN CNB028146719A patent/CN1288524C/en not_active Expired - Fee Related
-
2004
- 2004-01-16 ZA ZA2004/00350A patent/ZA200400350B/en unknown
- 2004-01-19 HR HR20040048A patent/HRP20040048A2/en not_active Application Discontinuation
- 2004-01-19 TN TNP2004000013A patent/TNSN04013A1/en unknown
- 2004-01-19 NO NO20040231A patent/NO20040231L/en not_active Application Discontinuation
- 2004-01-19 MA MA27493A patent/MA26127A1/en unknown
-
2005
- 2005-03-30 HK HK05102677A patent/HK1070154A1/en not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
JP3949105B2 (en) | 2007-07-25 |
HK1070154A1 (en) | 2005-06-10 |
ZA200400350B (en) | 2005-03-30 |
HRP20040048A2 (en) | 2004-06-30 |
IL159951A0 (en) | 2004-06-20 |
WO2003012604A2 (en) | 2003-02-13 |
KR20040032858A (en) | 2004-04-17 |
CA2454094A1 (en) | 2003-02-13 |
YU5604A (en) | 2006-08-17 |
FR2828303B1 (en) | 2010-09-03 |
MXPA04000596A (en) | 2005-02-17 |
MA26127A1 (en) | 2004-04-01 |
FR2828303A1 (en) | 2003-02-07 |
JP2004537800A (en) | 2004-12-16 |
CN1535408A (en) | 2004-10-06 |
PL367440A1 (en) | 2005-02-21 |
WO2003012604A3 (en) | 2004-01-22 |
TNSN04013A1 (en) | 2006-06-01 |
HUP0400232A2 (en) | 2004-09-28 |
CN1288524C (en) | 2006-12-06 |
EP1412837A2 (en) | 2004-04-28 |
NO20040231L (en) | 2004-03-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
NO20023964L (en) | Controlling a computer program's access to a resource using a digital signature | |
WO2000019317A8 (en) | Protection of boot block code while allowing write accesses to the boot block | |
BRPI0501171A (en) | Method and system for enforcing security policy via a virtual security mechanism | |
WO2006077443A3 (en) | Computer protection against malware affection | |
MY146723A (en) | System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container | |
BR9914651A (en) | Wrap for automatic banking machine | |
BRPI0501783A (en) | System and process for protected operating system boot using state validation | |
BR0012828A (en) | Modular method and system to perform database query | |
MX171879B (en) | A DEVICE AND METHOD TO PREVENT UNAUTHORIZED ACCESS TO BIOS IN A PERSONAL COMPUTER SYSTEM | |
DE59902955D1 (en) | METHOD FOR TESTING JAVA BYTECODE PROGRAMS FOR SECURITY PROPERTIES | |
EP1674965A3 (en) | Computer security management, such as in a virtual machine or hardened operating system | |
WO2004081707A3 (en) | Data processing system with peripheral access protection and method therefor | |
WO2009014779A3 (en) | System for malware normalization and detection | |
BR9802354A (en) | Method and system for preventing unauthorized access to a computer program | |
DE502004002908D1 (en) | CONTROLLED EXECUTION OF A PROGRAM PROVIDED FOR A VIRTUAL MACHINE ON A PORTABLE DATA CARRIER | |
BR0211375A (en) | Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit | |
AU4552600A (en) | Protection of the core part of a computer against external manipulation | |
BR0211371A (en) | Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit | |
NO973727L (en) | Method for checking predetermined data sets of the composition of a vehicle assembly | |
BR0211370A (en) | Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit | |
BR0211374A (en) | Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit | |
BR0211372A (en) | Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit | |
CN101178762A (en) | Method for inhibiting virus spreading through movable memory apparatus and movable memory apparatus thereof | |
ATE371211T1 (en) | METHOD FOR PROTECTING A MICRO COMPUTER SYSTEM AGAINST MANIPULATION OF ITS PROGRAM | |
BR0211373A (en) | Process to protect vulnerable software against unauthorized use; system for implementing the process; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and set of processing and storage units |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B08F | Application dismissed because of non-payment of annual fees [chapter 8.6 patent gazette] |
Free format text: REFERENTE A 8A E 9A A NUIDADES. |
|
B08K | Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette] |
Free format text: REFERENTE AO DESPACHO 8.6 PUBLICADO NA RPI 2108 DE 31/05/2011. |