CN101031859A - 程序源代码保护 - Google Patents
程序源代码保护 Download PDFInfo
- Publication number
- CN101031859A CN101031859A CNA2005800329130A CN200580032913A CN101031859A CN 101031859 A CN101031859 A CN 101031859A CN A2005800329130 A CNA2005800329130 A CN A2005800329130A CN 200580032913 A CN200580032913 A CN 200580032913A CN 101031859 A CN101031859 A CN 101031859A
- Authority
- CN
- China
- Prior art keywords
- file
- source document
- user
- reflection
- agent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims abstract description 23
- 230000008859 change Effects 0.000 claims description 14
- 238000012423 maintenance Methods 0.000 claims description 2
- 230000008520 organization Effects 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000010076 replication Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (23)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB0421774.1A GB0421774D0 (en) | 2004-09-30 | 2004-09-30 | Source code protection |
GB0421774.1 | 2004-09-30 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101031859A true CN101031859A (zh) | 2007-09-05 |
CN100568152C CN100568152C (zh) | 2009-12-09 |
Family
ID=33427849
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2005800329130A Expired - Fee Related CN100568152C (zh) | 2004-09-30 | 2005-09-29 | 程序源代码保护方法和工具 |
Country Status (7)
Country | Link |
---|---|
US (1) | US8935681B2 (zh) |
EP (1) | EP1810113A2 (zh) |
KR (1) | KR101190124B1 (zh) |
CN (1) | CN100568152C (zh) |
GB (1) | GB0421774D0 (zh) |
TW (1) | TWI298449B (zh) |
WO (1) | WO2006035227A2 (zh) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101764954A (zh) * | 2008-11-28 | 2010-06-30 | 新奥特(北京)视频技术有限公司 | 一种字幕单的备份和还原方法 |
CN101887500A (zh) * | 2010-06-10 | 2010-11-17 | 复旦大学 | 基于标签的程序控制流深度混淆方法 |
CN102483790A (zh) * | 2009-05-06 | 2012-05-30 | 埃德图加拿大公司 | 利用白盒密码术的联锁二进制保护 |
CN103218549A (zh) * | 2012-01-19 | 2013-07-24 | 阿里巴巴集团控股有限公司 | 一种Java源代码加解密的方法及装置 |
CN104123481A (zh) * | 2013-04-24 | 2014-10-29 | 贝壳网际(北京)安全技术有限公司 | 防止应用程序被篡改的方法及装置 |
CN104992083A (zh) * | 2015-07-09 | 2015-10-21 | 广州视源电子科技股份有限公司 | 应用程序的代码混淆方法和系统 |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100464301C (zh) * | 2007-08-09 | 2009-02-25 | 威盛电子股份有限公司 | 应用程序处理方法及系统 |
KR100907798B1 (ko) * | 2007-12-04 | 2009-07-15 | 주식회사 엘지씨엔에스 | 다운로드 가능한 콘텐츠 보안시스템 및 그 보안방법 |
US20100125827A1 (en) * | 2008-11-18 | 2010-05-20 | International Business Machines Corporation | Developing software code using parameterized annotations |
TWI384377B (zh) | 2008-12-04 | 2013-02-01 | Ind Tech Res Inst | 資料編碼及解碼方法 |
KR101292004B1 (ko) * | 2011-08-23 | 2013-08-23 | 주식회사 인프라웨어 | 웹 어플리케이션의 소스코드 패키지 보안 방법 및 이를 실행하기 위한 프로그램을 기록한 컴퓨터로 판독가능한 기록매체 |
TWI496071B (zh) * | 2013-02-01 | 2015-08-11 | Wei Ju Long | 可攜式虛擬印表機 |
US10075291B1 (en) * | 2015-05-27 | 2018-09-11 | Citigroup Technology, Inc. | Data deduplication and compression evaluation methods and systems |
WO2017066318A1 (en) * | 2015-10-12 | 2017-04-20 | Renesas Electronics America Inc. | Secure code delivery |
CN107992725B (zh) * | 2017-12-29 | 2020-08-07 | 北京星河星云信息技术有限公司 | 一种代码加密、解密方法及装置 |
CN112115501B (zh) * | 2019-06-04 | 2024-10-15 | 珠海金山办公软件有限公司 | 文档中图形形状的保护方法、装置、电子设备及存储介质 |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07271865A (ja) | 1994-04-01 | 1995-10-20 | Mitsubishi Corp | データベース著作権管理方法 |
EP0704785B1 (en) | 1994-09-30 | 2003-11-19 | Mitsubishi Corporation | Data copyright management system |
EP0709760B1 (en) | 1994-10-27 | 2006-05-31 | Intarsia Software LLC | Data copyright management system |
US6643775B1 (en) * | 1997-12-05 | 2003-11-04 | Jamama, Llc | Use of code obfuscation to inhibit generation of non-use-restricted versions of copy protected software applications |
US7130831B2 (en) | 1999-02-08 | 2006-10-31 | Copyright Clearance Center, Inc. | Limited-use browser and security system |
US6591367B1 (en) * | 1999-03-31 | 2003-07-08 | Atabok Japan, Inc. | Method and apparatus for preventing unauthorized copying and distributing of electronic messages transmitted over a network |
NO311197B1 (no) * | 2000-03-02 | 2001-10-22 | Ramirez Olguin Nelson Eric | Sikkerhetssystem mot ulovlig bruk eller kopiering av elektronisk data |
AU7593601A (en) * | 2000-07-14 | 2002-01-30 | Atabok Inc | Controlling and managing digital assets |
US7237123B2 (en) * | 2000-09-22 | 2007-06-26 | Ecd Systems, Inc. | Systems and methods for preventing unauthorized use of digital content |
US20020067833A1 (en) * | 2000-12-05 | 2002-06-06 | Han Ching-Chih (Jason) | Method and apparatus for providing conditional access to the source code of a program |
US7496767B2 (en) * | 2001-01-19 | 2009-02-24 | Xerox Corporation | Secure content objects |
JP4448623B2 (ja) * | 2001-03-29 | 2010-04-14 | セイコーエプソン株式会社 | デジタルコンテンツ提供システム,デジタルコンテンツ提供方法,サーバ装置及びデジタルコンテンツ提供プログラム |
US20030088783A1 (en) * | 2001-11-06 | 2003-05-08 | Dipierro Massimo | Systems, methods and devices for secure computing |
NO20023860D0 (no) * | 2002-08-14 | 2002-08-14 | Sospita As | Fremgangsmåte for å generere og prosessere dataströmmer som inneholder krypterte og dekrypterte data |
US7213201B2 (en) * | 2003-03-03 | 2007-05-01 | International Business Machines Corporation | Meta editor for structured documents |
US7515717B2 (en) * | 2003-07-31 | 2009-04-07 | International Business Machines Corporation | Security containers for document components |
US7721111B2 (en) * | 2003-12-14 | 2010-05-18 | Realnetworks, Inc. | Auto-negotiation of content output formats using a secure component model |
US7484107B2 (en) * | 2004-04-15 | 2009-01-27 | International Business Machines Corporation | Method for selective encryption within documents |
-
2004
- 2004-09-30 GB GBGB0421774.1A patent/GB0421774D0/en not_active Ceased
-
2005
- 2005-09-29 US US11/664,431 patent/US8935681B2/en not_active Expired - Fee Related
- 2005-09-29 KR KR1020077008385A patent/KR101190124B1/ko active IP Right Grant
- 2005-09-29 CN CNB2005800329130A patent/CN100568152C/zh not_active Expired - Fee Related
- 2005-09-29 EP EP05794690A patent/EP1810113A2/en not_active Ceased
- 2005-09-29 WO PCT/GB2005/003735 patent/WO2006035227A2/en active Application Filing
- 2005-09-30 TW TW094134228A patent/TWI298449B/zh not_active IP Right Cessation
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101764954A (zh) * | 2008-11-28 | 2010-06-30 | 新奥特(北京)视频技术有限公司 | 一种字幕单的备份和还原方法 |
CN101764954B (zh) * | 2008-11-28 | 2013-06-05 | 新奥特(北京)视频技术有限公司 | 一种字幕单的备份和还原方法 |
CN102483790A (zh) * | 2009-05-06 | 2012-05-30 | 埃德图加拿大公司 | 利用白盒密码术的联锁二进制保护 |
CN102483790B (zh) * | 2009-05-06 | 2016-01-20 | 爱迪德技术有限公司 | 利用白盒密码术的联锁二进制保护 |
CN101887500A (zh) * | 2010-06-10 | 2010-11-17 | 复旦大学 | 基于标签的程序控制流深度混淆方法 |
CN101887500B (zh) * | 2010-06-10 | 2013-01-02 | 复旦大学 | 基于标签的程序控制流深度混淆方法 |
CN103218549A (zh) * | 2012-01-19 | 2013-07-24 | 阿里巴巴集团控股有限公司 | 一种Java源代码加解密的方法及装置 |
CN103218549B (zh) * | 2012-01-19 | 2015-11-25 | 阿里巴巴集团控股有限公司 | 一种Java源代码加解密的方法及装置 |
CN104123481A (zh) * | 2013-04-24 | 2014-10-29 | 贝壳网际(北京)安全技术有限公司 | 防止应用程序被篡改的方法及装置 |
CN104992083A (zh) * | 2015-07-09 | 2015-10-21 | 广州视源电子科技股份有限公司 | 应用程序的代码混淆方法和系统 |
CN104992083B (zh) * | 2015-07-09 | 2018-02-16 | 广州视源电子科技股份有限公司 | 应用程序的代码混淆方法和系统 |
Also Published As
Publication number | Publication date |
---|---|
KR20070057938A (ko) | 2007-06-07 |
TW200622703A (en) | 2006-07-01 |
WO2006035227A3 (en) | 2006-05-26 |
GB0421774D0 (en) | 2004-11-03 |
US20110078669A1 (en) | 2011-03-31 |
CN100568152C (zh) | 2009-12-09 |
WO2006035227A2 (en) | 2006-04-06 |
KR101190124B1 (ko) | 2012-10-12 |
EP1810113A2 (en) | 2007-07-25 |
TWI298449B (en) | 2008-07-01 |
US8935681B2 (en) | 2015-01-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100568152C (zh) | 程序源代码保护方法和工具 | |
US10461930B2 (en) | Utilizing data reduction in steganographic and cryptographic systems | |
US6598161B1 (en) | Methods, systems and computer program products for multi-level encryption | |
US7123718B1 (en) | Utilizing data reduction in stegnographic and cryptographic systems | |
JP3130267B2 (ja) | 暗号エンベロープの作成方法 | |
WO2006130585A3 (en) | Data security | |
US8631235B2 (en) | System and method for storing data using a virtual worm file system | |
Senthilnathan et al. | An enhancing reversible data hiding for secured data using shuffle block key encryption and histogram bit shifting in cloud environment | |
CN111177666A (zh) | 基于脆弱水印的司法文书防伪防篡改方法及系统 | |
Zaidan et al. | StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem | |
JP2000122861A (ja) | データ等の不正改竄防止システム及びそれと併用される 暗号化装置 | |
ES2387030T3 (es) | Dispositivo y procedimiento para detectar una manipulación de una señal de información | |
JP2004259229A (ja) | データの真正性が保証されるデータベースとそのバックアップシステム及び方法 | |
Simpson et al. | Electronic Record Key Management for Digital Rights Management | |
CN113609505A (zh) | 基于md5加密的数字水印篡改监测方法 | |
JP3553733B2 (ja) | 画像編集方法およびシステム | |
Ebrahimi | Secure Media | |
JP2003264543A (ja) | 画像暗号装置及び暗号解読装置 | |
Son et al. | Intellectual Property Protection system for a workstation using policy based watermarking scheme | |
Dittmann et al. | Ensuring Media Integrity on Third-Party Infrastructures | |
CN117932674A (zh) | 一种基于区块链的作业数据化模板验证与溯源方法 | |
JP2000010478A (ja) | 署名情報埋め込み装置、署名情報抽出装置、署名情報埋め込み方法および署名情報抽出方法 | |
Khmelevsky | Information and data protection within a RDBMS | |
Krause | Information Technology-Security techniques and standardization | |
Zhang et al. | An fpga intellectual property authentication scheme through watermarking techniques |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C41 | Transfer of patent application or patent right or utility model | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20090327 Address after: Cayman Islands, Grand Cayman Applicant after: Cayman Morningstar Semiconductor Co-applicant after: MSTAR FRANCE S.A.S. Co-applicant after: Mstar Semiconductor,Inc. Co-applicant after: MSTAR SEMICONDUCTOR Inc. Address before: Cayman Islands Grand Cayman Applicant before: Cayman Morningstar Semiconductor Effective date of registration: 20090327 Address after: Cayman Islands Grand Cayman Applicant after: Cayman Morningstar Semiconductor Address before: Hertfordshire Applicant before: TTPCOM Ltd. |
|
ASS | Succession or assignment of patent right |
Owner name: KAIMAN CHENXING SEMICONDUCTOR CO., LTD. Free format text: FORMER OWNER: TTPCOM CO., LTD. Effective date: 20090327 |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20091209 Termination date: 20190929 |