BR0211375A - Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit - Google Patents

Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit

Info

Publication number
BR0211375A
BR0211375A BR0211375-9A BR0211375A BR0211375A BR 0211375 A BR0211375 A BR 0211375A BR 0211375 A BR0211375 A BR 0211375A BR 0211375 A BR0211375 A BR 0211375A
Authority
BR
Brazil
Prior art keywords
unit
processing
unauthorized use
software
storage unit
Prior art date
Application number
BR0211375-9A
Other languages
Portuguese (pt)
Inventor
Jean-Christophe Cuenod
Gilles Sgro
Original Assignee
Validy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Validy filed Critical Validy
Publication of BR0211375A publication Critical patent/BR0211375A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Remote Sensing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Storage Device Security (AREA)
  • Executing Machine-Instructions (AREA)
  • Logic Circuits (AREA)

Abstract

"PROCESSO PARA PROTEGER UM SOFTWARE VULNERáVEL CONTRA O SEU USO NãO AUTORIZADO; SISTEMA PARA A IMPLEMENTAçãO DO PROCESSO; UNIDADE PRé-PERSONALIZADA; UNIDADE QUE PERMITE EXECUTAR UM SOFTWARE PROTEGIDO E IMPEDIR SUA UTILIZAçãO NãO AUTORIZADA; CONJUNTO DE UNIDADES; CONJUNTO DE DISTRIBUIçãO DE UM SOFTWARE PROTEGIDO; UNIDADE DE PROCESSAMENTO E DE MEMORIZAçãO E CONJUNTO DE UNIDADES DE PROCESSAMENTO E DE MEMORIZAçãO". A presente invenção se refere a um processo para proteger, a partir de uma unidade, um software vulnerável contra seu uso não autorizado, sendo que o referido software vulnerável funciona em um sistema de processamento de dados. O processo de acordo com a presente invenção consiste em definir: Um conjunto de funções dependentes cujas funções dependentes são suscetíveis de serem executadas em uma unidade, - um conjunto de comandos de acionamento, sendo que esses comandos de acionamento são suscetíveis de serem executados no sistema de processamento de dados e de acionar a execução das funções dependentes em uma unidade, - para cada comando de acionamento, uma ordem, - um método de renomeação das ordens, - e meios de restauração destinados a serem implementados em uma unidade durante uma fase de utilização, e que permitem reencontrar a função dependente a ser executada, a partir da ordem renomeada."PROCESS TO PROTECT A VULNERABLE SOFTWARE AGAINST ITS UNAUTHORIZED USE; UNPersonalized SOFTWARE; SYSTEM FOR IMPLEMENTATION OF THE PROCESS; PRE-PERSONALIZED UNIT; PROCESSING AND STORAGE UNIT AND ASSEMBLY OF PROCESSING AND STORAGE UNITS ". The present invention relates to a method of protecting vulnerable software from unauthorized use from a drive, said vulnerable software operating in a data processing system. The process according to the present invention is to define: A set of dependent functions whose dependent functions are likely to be executed on a unit, - a set of trigger commands, which trigger commands are likely to be executed on the system. data processing and triggering the execution of dependent functions in a unit, - for each trigger command, an order, - a method of renaming the orders, - and restoration means intended to be implemented in a unit during a allow you to rediscover the dependent function to be performed from the renamed order.

BR0211375-9A 2001-07-31 2002-07-04 Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit BR0211375A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0110246A FR2828303B1 (en) 2001-07-31 2001-07-31 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "RENAMING" AGAINST ITS UNAUTHORIZED USE
PCT/FR2002/002340 WO2003012604A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called renaming principle against its unauthorised use

Publications (1)

Publication Number Publication Date
BR0211375A true BR0211375A (en) 2004-08-17

Family

ID=8866121

Family Applications (1)

Application Number Title Priority Date Filing Date
BR0211375-9A BR0211375A (en) 2001-07-31 2002-07-04 Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit

Country Status (19)

Country Link
EP (1) EP1412837A2 (en)
JP (1) JP3949105B2 (en)
KR (1) KR20040032858A (en)
CN (1) CN1288524C (en)
BR (1) BR0211375A (en)
CA (1) CA2454094A1 (en)
FR (1) FR2828303B1 (en)
HK (1) HK1070154A1 (en)
HR (1) HRP20040048A2 (en)
HU (1) HUP0400232A2 (en)
IL (1) IL159951A0 (en)
MA (1) MA26127A1 (en)
MX (1) MXPA04000596A (en)
NO (1) NO20040231L (en)
PL (1) PL367440A1 (en)
TN (1) TNSN04013A1 (en)
WO (1) WO2003012604A2 (en)
YU (1) YU5604A (en)
ZA (1) ZA200400350B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100346252C (en) * 2005-09-28 2007-10-31 珠海金山软件股份有限公司 Computer software security loophole repairing apparatus and method
JP4770425B2 (en) * 2005-11-24 2011-09-14 富士ゼロックス株式会社 Program, method and apparatus for creating protected execution program
CN100437615C (en) * 2006-10-16 2008-11-26 珠海金山软件股份有限公司 Method for protecting dynamic chanining bank interface under windows platform
CN103198244B (en) * 2013-03-26 2016-06-29 北京深思数盾科技股份有限公司 The method of protection dynamic link library

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (en) * 1988-08-01 1990-02-02 Pionchon Philippe METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
WO1999001815A1 (en) * 1997-06-09 1999-01-14 Intertrust, Incorporated Obfuscation techniques for enhancing software security
DE69819790D1 (en) * 1998-06-12 2003-12-18 Gemplus Gemenos METHOD FOR CONTROLLING THE EXECUTION OF A PROGRAM PRODUCT

Also Published As

Publication number Publication date
JP3949105B2 (en) 2007-07-25
HK1070154A1 (en) 2005-06-10
ZA200400350B (en) 2005-03-30
HRP20040048A2 (en) 2004-06-30
IL159951A0 (en) 2004-06-20
WO2003012604A2 (en) 2003-02-13
KR20040032858A (en) 2004-04-17
CA2454094A1 (en) 2003-02-13
YU5604A (en) 2006-08-17
FR2828303B1 (en) 2010-09-03
MXPA04000596A (en) 2005-02-17
MA26127A1 (en) 2004-04-01
FR2828303A1 (en) 2003-02-07
JP2004537800A (en) 2004-12-16
CN1535408A (en) 2004-10-06
PL367440A1 (en) 2005-02-21
WO2003012604A3 (en) 2004-01-22
TNSN04013A1 (en) 2006-06-01
HUP0400232A2 (en) 2004-09-28
CN1288524C (en) 2006-12-06
EP1412837A2 (en) 2004-04-28
NO20040231L (en) 2004-03-30

Similar Documents

Publication Publication Date Title
NO20023964L (en) Controlling a computer program's access to a resource using a digital signature
WO2000019317A8 (en) Protection of boot block code while allowing write accesses to the boot block
BRPI0501171A (en) Method and system for enforcing security policy via a virtual security mechanism
WO2006077443A3 (en) Computer protection against malware affection
MY146723A (en) System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container
BR9914651A (en) Wrap for automatic banking machine
BRPI0501783A (en) System and process for protected operating system boot using state validation
BR0012828A (en) Modular method and system to perform database query
MX171879B (en) A DEVICE AND METHOD TO PREVENT UNAUTHORIZED ACCESS TO BIOS IN A PERSONAL COMPUTER SYSTEM
DE59902955D1 (en) METHOD FOR TESTING JAVA BYTECODE PROGRAMS FOR SECURITY PROPERTIES
EP1674965A3 (en) Computer security management, such as in a virtual machine or hardened operating system
WO2004081707A3 (en) Data processing system with peripheral access protection and method therefor
WO2009014779A3 (en) System for malware normalization and detection
BR9802354A (en) Method and system for preventing unauthorized access to a computer program
DE502004002908D1 (en) CONTROLLED EXECUTION OF A PROGRAM PROVIDED FOR A VIRTUAL MACHINE ON A PORTABLE DATA CARRIER
BR0211375A (en) Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit
AU4552600A (en) Protection of the core part of a computer against external manipulation
BR0211371A (en) Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit
NO973727L (en) Method for checking predetermined data sets of the composition of a vehicle assembly
BR0211370A (en) Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit
BR0211374A (en) Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit
BR0211372A (en) Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit
CN101178762A (en) Method for inhibiting virus spreading through movable memory apparatus and movable memory apparatus thereof
ATE371211T1 (en) METHOD FOR PROTECTING A MICRO COMPUTER SYSTEM AGAINST MANIPULATION OF ITS PROGRAM
BR0211373A (en) Process to protect vulnerable software against unauthorized use; system for implementing the process; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and set of processing and storage units

Legal Events

Date Code Title Description
B08F Application dismissed because of non-payment of annual fees [chapter 8.6 patent gazette]

Free format text: REFERENTE A 8A E 9A A NUIDADES.

B08K Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette]

Free format text: REFERENTE AO DESPACHO 8.6 PUBLICADO NA RPI 2108 DE 31/05/2011.