CN1123935A - Device and method for software protection - Google Patents

Device and method for software protection Download PDF

Info

Publication number
CN1123935A
CN1123935A CN 94118035 CN94118035A CN1123935A CN 1123935 A CN1123935 A CN 1123935A CN 94118035 CN94118035 CN 94118035 CN 94118035 A CN94118035 A CN 94118035A CN 1123935 A CN1123935 A CN 1123935A
Authority
CN
China
Prior art keywords
detecting
protection software
normal conditions
impossible
bus
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 94118035
Other languages
Chinese (zh)
Inventor
徐世斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
United Microelectronics Corp
Original Assignee
United Microelectronics Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by United Microelectronics Corp filed Critical United Microelectronics Corp
Priority to CN 94118035 priority Critical patent/CN1123935A/en
Publication of CN1123935A publication Critical patent/CN1123935A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The device and method for protecting the software and data in memory from being illegally copied, intrusively used or used by unauthorized user features that a detector circuit is used to examine the program state. If the illegal use of software said above is found, data and address bus will generate random errors which cause some errors in the program data so that the software is protected.

Description

The device and method of protection software
The present invention relates to a kind of device and method of protecting software, reach to protect and leave the interior software of storer and the illicit copies of data in, prevent software pirate usefulness, perhaps under not authorized situation, be used.Software protecting equipment of the present invention and method, especially particularly suitable effectively prevents abuses such as counterfeit, illicit copies in the protection of the Games Software program of electronic game machine.
In today that intellecture property is respected fully, electronic goods prevent that plagiarizing counterfeit is a very important problem.The electronic game machine system of knowing (T.V.game system) uses fixing and standardized hardware main frame, is equipped with multifarious Games Software card or software diskette, according to user's hobby, can select various Games Softwares to play.The Games Software of bent type is stored in the memory integrated circuit card (memory IC catridges), can allow the user select on the hardware main frame of electronic game machine system at an easy rate and change, so that conversion game type and content.
Generally speaking, software program on the card and data, major part all stores with the IC storer, this storer comprises ROM (read-only memory) (Mask ROM), but erasing type memory (EPROM or EEPROM) or single programmable preface type storer (One Time PROM) etc., program and data in these storeies must be delivered to the microprocessor on the main frame when program is carried out.Because the bus that program and data all will see through on the main frame transmits, and reads so program and data are easily illegal businessman, is copied, peddles, particularly these IC storeies mostly are standard product, copy for the people easilier.
Software program and data are many people crystallization of wisdom, and the human and material resources of its input are all very huge.Owing to above-mentioned storer, very easy quilt is imitated, so the literary property owner of software there's no one who doesn't or isn't tries every possible means, takes precautions against other people counterfeit, so various protective device is kept up a steady flow of again.These protections are many with the usefulness of a kind of special integrated circuit as protection, to increase counterfeit difficulty.
And a counterfeit most important and necessary step is to read the routine data that is placed in the ROM.This utilizes the emulator (Emulator) of microprocessor just can read the routine data that is placed in the ROM at an easy rate in present existing technology.
Therefore; the present invention's one fundamental purpose is to provide a kind of software protecting equipment and method of computer program; particularly relevant for the protective device and the method for the Games Software program of electronic game machine system; can prevent that potential counterfeit infringer from utilizing microprocessor simulator, reads the Games Software contents of program that is stored in the storage card.
For reaching above-mentioned purpose; the present invention utilizes an additional protection circuit; when finding to have when attempting to read the routine data situation that is placed in the ROM; not timing ground disturbs the routine data of reading; comprise reading at the emulator that uses microprocessor; make that routine data is wrong a bit,, more increased counterfeiter's difficulty because wrong pattern is unfixed.
Under normal situation, microprocessor is carried out the program that is placed on ROM, owing in the program jump instruction (JUMP) is arranged, the event of execution subroutine and interruption (Interrupt), program implementation can not be carried out in proper order.And, be not that each address in the ROM storer all can be used to, be not program or data all will be put in each address among the ROM.
Relative, when attempting to read the routine data that is placed in the ROM, as utilize the emulator of microprocessor, must be one in proper order read action, and each address in the ROM all can be read.Therefore, it is different attempting to read the routine data that is placed in the ROM and the execution of general procedure.We can utilize and attempt the fetch program and can not use a certain address during normal the execution, or a string address, as the usefulness of differentiating emulator.When this undesired situation takes place, start a discontinuous signal generation device, produces interrupted signal, and with this discontinuous signal driving data bus a certain specific potential (V extremely CCOr GND), make that some is wrong in the routine data that is read.
The present invention utilizes a kind of particular address circuit for detecting in the protective device; when detecting the situation of attempting to read the contents of program in the storer; touch a kind of discontinuous signal and produce circuit; reading of not timing ground disturbance storage data content; so that the data of reading are wrong a bit; and wrong pattern is also unfixing, further increases counterfeiter's difficulty.
The present invention protects the basic composition of the device of software to comprise:
One arrangement for detecting, in order to monitor one of address bus, data bus and control bus at least, detecting is impossible storage access action under normal conditions;
One switching device shifter is connected to this arrangement for detecting, is used for starting the signal generation device of next stage when this arrangement for detecting detects under normal conditions the action of impossible storage access;
One signal generation device is connected to this switching device shifter, is used for producing a discontinuous signal when being started by this switching device shifter, to promote the circuit arrangement of next stage; And
At least one circuit arrangement is connected to this signal generation device, and is connected to arbitrary signal wire of address bus, data bus and control bus, is used for receiving and according to this discontinuous signal, this signal wire being urged to a predetermined potential.
The present invention protects the basic step of the method for software to comprise:
(a) routine data is left in the storer;
(b) provide a microprocessor, use from fetch program data in this storer and carry out;
(c) connect data bus, address bus and the control bus of this microprocessor to this storer;
(d) monitor one of address bus, data bus and control bus at least, so that detecting impossible storage access action under normal conditions; And
(e) under normal conditions, during the action of impossible storage access,, be urged to a predetermined potential intermittently when detecting above-mentioned microprocessor with at least a signal wire of address bus, data bus and control bus.
Other purpose of the present invention and characteristics are elaborated conjunction with figs. in the back.Among the accompanying drawing:
Fig. 1 is the circuit box synoptic diagram of a kind of typical electronic game machine system;
Fig. 2 is the circuit box synoptic diagram of software protecting equipment one preferred embodiment of the present invention;
Fig. 3 is the circuit box synoptic diagram of another preferred embodiment of software protecting equipment of the present invention;
Fig. 4 is an example of arrangement for detecting in the software protecting equipment of the present invention;
Fig. 5 is an example of interrupted signal generation device in the software protecting equipment of the present invention; And
Fig. 6 is an example of the discontinuous signal discontinuous signal that generation device produces among Fig. 5.
At first with reference to the circuit box synoptic diagram of typical TV game machine system shown among the figure 1.A typical electronic game machine can be divided into two major parts, that is the game host 10 of executive software games, and the Games Software card 30 of stores games software.The typical structure of game host 10 has mainly comprised the central processing unit CPU 14 that has comprised microprocessor, video processor 12, audio process 16, storer 18, and TV signal synthesizer 19.On the other hand, 30 on Games Software card includes the storer 32 of store software programs usually, and non-existent software protecting equipment 34 under some situation.
Then, wherein show the circuit box synoptic diagram of software protecting equipment one preferred embodiment of the present invention with reference to figure 2.The software protecting equipment 34 of this embodiment of the present invention can install among a Games Software (for example 30 among Fig. 1), as the protective device that is stored in the software code among the storer (for example storer among Fig. 1 32).Software protecting equipment 34 receives the address 20 that the computer game system is sent, and data 22 and control signal 24 are so that the defencive function of software program for execution sign indicating number.
The software protecting equipment 34 of this embodiment of the present invention, its result's composition includes 54, one discontinuous signal generators 56 of 52, one RS latchs of 50, one replacement addresses of particular address arrangement for detecting arrangement for detecting, and a nmos switch device 58.
When system just starts, the replacement address that can be sent out by the central processing unit CPU 14 of computer game system host (for example game host among Fig. 1 10), trigger replacement address arrangement for detecting 52, and RS latch 54 is reset via signal wire 66, make the Q of RS latch 54 be output as the O signal.The discontinuous signal generator 56 that this O signal and the unlikely Q output that influences RS latch 54 link.
After system start-up, particular address arrangement for detecting 50 promptly begins monitoring on the system address bus 20, the data read address that is sent out by the central processing unit CPU 14 of computer game system host 10.As narrating the front, because typical gaming software must not use all storage addresss, even when Games Software designs, more can stay some specific memory device address especially will not use.In other words, the address that these stay especially when Games Software is normally carried out by game host, can not appear on the system address bus 20.But, the people who attempts to read with emulator the Games Software contents of program can't know that fully which address is empty, and there are data which address, therefore just can't avoid reading the position that those reserve addresses.In case these " trap addresses " are read by emulator, particular address arrangement for detecting 50 just can detect, and with signal wire 64 setting signal is sent to RS latch 54 immediately, and the Q output of RS latch 54 is set at 1.
In case the Q of RS latch 54 output is set to 1, and be sent to discontinuous signal generator 56 and enable input end EN, discontinuous signal generator 56 just is enabled, and on the signal wire 90 that output terminal linked, send rule or erratic discontinuous signal, so that and then driving N MOS switchgear 58, the data timing signal on the data bus 22 of system or not timing ground drawn reduced to earthing potential.In case some predefined, that normal condition should not also can not be read trap address of this kind, after being read by unwitting counterfeiter, the data on the data bus of system just can be timed or not timing draw and reduce to earthing potential.In other words, some signal that originally should be noble potential has been converted to electronegative potential improperly, because the counterfeiter has no way of learning to be which data has been changed, therefore also can't be reduced.Moreover, therefore even can be designed to because discontinuous signal can be irregular generation: interest concessions still can be performed with the software of emulator illicit copies, but mistake can occur to not timing, benefit increases illegal manufacturer and illegal user's puzzlement, makes illegal manufacturer give up the thought of illicit copies eventually; The user gives up buying or using the thought of piracy software.
Fig. 3 shows another preferred embodiment circuit box synoptic diagram of software protection of the present invention.Embodiment difference among this embodiment and Fig. 2 is, its with data timing signal on the data bus 22 of system or not timing the mode that upset be: the current potential V that normal data signal is drawn high paramount signal potential CCThis utilizes a PMOS switchgear 58 to finish.
A kind of typical example that shows particular address arrangement for detecting 50 in the software protecting equipment of the present invention among Fig. 4.This circuit is the address signal that the central processing unit CPU 14 with system host (for example game host among Fig. 1 10) is sent out, utilize phase inverter (Inverter)/and (AND) logic gate decode, its decoded result is delivered to the S input of the RS latch 54 among Fig. 2 or Fig. 3, so that trigger discontinuous signal generator 56 in due course.
Then, wherein show an example of the discontinuous signal generation device 56 of software protecting equipment of the present invention with reference to figure 5.Shown discontinuous signal generation device 56 is based on one three digit counter (3-bit counter) 70 among Fig. 5, drive with a pulse signal CK71, and be connected one and logic gate again at its three carry-out bit Q0, Q1 and Q2 end, for example utilize one three input end with logic gate 92 logical operations in addition, its output signal 90 just can drive NMOS or the PMOS switchgear 58 among Fig. 2 or Fig. 3.
Fig. 6 by the discontinuous signal generation device 56 among Fig. 5 an example of generation discontinuous signal.
Certainly, the personage who is familiar with this area all can understand, and logic gate 92 can also be other any suitable logical circuit, for example one three import or door, or more complicated logic gate combination.And three digit counters 70 can also be replaced by other appropriate value generation device, and such as a tandom number generator, the latter can obtain higher random code degree of protection.
More than be to be that example has described method for protecting software of the present invention and device, so be familiar with this operator and should understand that content of the present invention also goes among other all software application fields that need protection equally with the electronic game machine system.

Claims (52)

1, a kind of device of protecting software leaves software in the storer in order to protection, and the device of this protection software comprises:
One arrangement for detecting, in order to monitor one of address bus, data bus and control bus at least, detecting is impossible storage access action under normal conditions;
One switching device shifter is connected to this arrangement for detecting, is used for starting the signal generation device of next stage when this arrangement for detecting detects under normal conditions the action of impossible storage access;
One signal generation device is connected to this switching device shifter, is used for producing a discontinuous signal when being started by this switching device shifter, to promote the circuit arrangement of next stage; And
At least one circuit arrangement is connected to this signal generation device, and is connected to arbitrary signal wire of address bus, data bus and control bus, is used for receiving and according to this discontinuous signal, this signal wire being urged to a predetermined potential.
2, protection software service as claimed in claim 1, wherein this arrangement for detecting has comprised when impossible storage access is moved under detecting normal conditions, produces the device of an output signal.
3, protection software service as claimed in claim 1, wherein this arrangement for detecting has comprised the circuit that is used for detecting impossible some storage address access action under the normal conditions.
4, protection software service as claimed in claim 1, wherein this arrangement for detecting has comprised the circuit that is used for detecting impossible certain a succession of storage address access action under the normal conditions.
5, protection software service as claimed in claim 1, wherein this switching device shifter can comprise a state holding device, when being used under detecting normal conditions the action of impossible storage access, starts this signal generation device.
6, protection software service as claimed in claim 1, wherein this switching device shifter comprises a state holding device; when being used under detecting normal conditions the action of impossible storage access; start this signal generation device, and comprise a reset signal, in order to the stop signal generation device.
7, protection software service as claimed in claim 1, wherein this predetermined potential is an earthing potential.
8, protection software service as claimed in claim 1, wherein this predetermined potential is the current potential of a supply voltage.
9, a kind of method of protecting software leaves the software in the storer and the illicit copies of data in order to protection, prevents that software data is stolen, or be used under unwarranted situation that this method comprises the following steps:
(a) routine data is left in the storer;
(b) provide a microprocessor, use from fetch program data in this storer and carry out;
(c) connect data bus, address bus and the control bus of this microprocessor to this storer;
(d) monitor one of address bus, data bus and control bus at least, so that detecting impossible storage access action under normal conditions; And
(e) under normal conditions, during the action of impossible storage access,, be urged to a predetermined potential intermittently when detecting above-mentioned microprocessor with at least a signal wire of address bus, data bus and control bus.
10, as protection software approach as described in the claim 9, wherein this step (e) comprises the following steps:
(f) provide a discontinuous signal generation device, be used for above-mentionedly under normal conditions, during the action of impossible storage access, producing a discontinuous signal detecting; And
(g) provide at least one circuit arrangement, be connected to this discontinuous signal generation device, and be connected to arbitrary signal wire of address bus, data bus and control bus, be used for receiving and, this signal wire being urged to this predetermined potential according to this discontinuous signal.
11, as protection software approach as described in the claim 10, wherein this discontinuous signal is produced by a circuit.
12, as protection software approach as described in the claim 10, wherein this step (d) comprises the access action of detecting some storer, and the access of these storeies is that impossible action produces under normal conditions.
13, as protection software approach as described in the claim 10, wherein this step (d) comprises the access action of detecting some storage address, and being accessed under the normal conditions of these addresses is impossible.
14, as protection software approach as described in the claim 10, wherein this step (d) comprises detecting impossible certain a succession of storage address access action under normal conditions.
15, as protection software approach as described in the claim 10, wherein the detecting of this step (d) is finished by a circuit for detecting.
16, as protection software approach as described in the claim 10, wherein this step (f) comprises and latchs step, is used for starting this discontinuous signal generation device, to produce this discontinuous signal.
17, as protection software approach as described in the claim 10, comprise that more one produces the step of reset signal, be used for stopping the generation of this discontinuous signal.
18, as protection software approach as described in the claim 10, wherein this predetermined potential is an earthing potential.
19, as protection software approach as described in the claim 10, wherein this predetermined potential is the current potential of a supply voltage.
20, a kind of method of protecting software leaves the TV game software in the ROM (read-only memory) and the illicit copies of data in order to protection, prevents that software data is stolen, and this method comprises the following steps:
(a) the electronic game machine software program data is left in the ROM (read-only memory);
(b) provide a microprocessor, use from reading the TV game software routine data in this ROM (read-only memory) and carry out, so that image unit produces vision signal, voice unit (VU) produces sound signal;
(c) connect data bus, address bus and the control bus of this microprocessor to this ROM (read-only memory);
(d) monitor one of address bus, data bus and control bus at least, so that detecting impossible storage access action under normal conditions; And
(e) above-mentioned under normal conditions during the action of impossible storage access when detecting, the arbitrary signal wire with address bus, data bus and control bus is urged to a predetermined potential intermittently.
21, as protection software approach as described in the claim 20, wherein this step (e) comprises the following steps:
(f) provide a discontinuous signal generation device, be used for above-mentionedly under normal conditions, during the action of impossible storage access, producing a discontinuous signal detecting; And
(g) provide at least one circuit arrangement, be connected to this discontinuous signal generation device, and be connected to arbitrary signal of address bus, data bus and control bus, be used for receiving and, this signal wire being urged to this predetermined potential according to this discontinuous signal.
22, as protection software approach as described in the claim 21, wherein this discontinuous signal is produced by a circuit.
23, as protection software approach as described in the claim 21, wherein this step (d) comprises the access action of detecting some storer, and the access of these storeies is that impossible action produces under normal conditions.
24, as protection software approach as described in the claim 12, wherein this step (d) comprises the access action of detecting some storage address, and being accessed under the normal conditions of these addresses is impossible.
25, as protection software approach as described in the claim 21, wherein this step (d) comprises detecting impossible certain a succession of storage address access action under normal conditions.
26, as protection software approach as described in the claim 21, wherein the detecting of this step (d) is finished by a circuit for detecting.
27, as protection software approach as described in the claim 21, wherein this step (d) comprises and latchs step, is used for starting this discontinuous signal generation device, to produce this discontinuous signal.
28, as protection software approach as described in the claim 21, comprise that more one produces the step of reset signal, be used for stopping the generation of this discontinuous signal.
29, as protection software approach as described in the claim 21, wherein this predetermined potential is an earthing potential.
30, as protection software approach as described in the claim 21, wherein this predetermined potential is the current potential of a supply voltage.
31, a kind of method of protecting software, software and data in order to prevention utilizes the emulator of microprocessor to read to leave in the storer prevent that software data is stolen, this method comprises the following steps:
(a) software program data is left in the storer;
(b) connect data bus, address bus and the control bus of microprocessor to this storer;
(c) monitor one of address bus, data bus and control bus at least, so that detecting impossible storage access action under normal conditions; And
(d) above-mentioned under normal conditions during the action of impossible storage access when detecting, at least one signal wire with address bus, data bus and control bus is urged to a predetermined potential intermittently;
Therefore, the routine data that emulator read of microprocessor is wrong a bit.
32, as protection software approach as described in the claim 31, wherein this step (d) comprises the following steps:
(e) provide a discontinuous signal generation device, be used for above-mentionedly under normal conditions, during the action of impossible storage access, producing a discontinuous signal detecting; And
(f) provide at least one circuit arrangement, be connected to this discontinuous signal generation device, and be connected to arbitrary signal wire of address bus, data bus and control bus, be used for receiving and, this signal wire being urged to this predetermined potential according to this discontinuous signal.
33, as protection software approach as described in the claim 32, wherein this discontinuous signal is produced by a circuit.
34, as protection software approach as described in the claim 32, wherein this step (c) comprises the access action of detecting some storer, and being accessed under the normal conditions of these storeies is that impossible action produces.
35, as protection software approach as described in the claim 32, wherein this step (c) comprises the access action of detecting some storage address, and being accessed under the normal conditions of these addresses is impossible.
36, as protection software approach as described in the claim 32, wherein this step (c) comprises detecting impossible certain a succession of storage address access action under normal conditions.
37, as protection software approach as described in the claim 32, wherein the detecting of this step (c) is finished by a circuit for detecting.
38, as protection software approach as described in the claim 32, wherein this step (e) comprises and latchs step, is used for starting this discontinuous signal generation device, to produce this discontinuous signal.
39, as protection software approach as described in the claim 32, comprise that more one produces the step of reset signal, be used for stopping the generation of this discontinuous signal.
40, as protection software approach as described in the claim 32, wherein this predetermined potential is an earthing potential.
41, as protection software approach as described in the claim 32, wherein this predetermined potential is the current potential of a supply voltage.
42, a kind of method of protecting software, software and data in order to prevention utilizes the emulator of microprocessor to read to leave in the storer prevent that software data is stolen, this method comprises the following steps:
(a) software program data is left in the storer;
(b) in the address space of this storer, keep at least one address, as the usefulness of the emulator of detecting microprocessor;
(c) connect data bus, address bus and the control bus of microprocessor to this storer;
(d) monitor one of address bus, data bus and control bus at least, so that detecting impossible storage access action under normal conditions; And
(e) above-mentionedly under normal conditions, during the action of impossible storage access,, be urged to a predetermined potential intermittently when detecting with at least one signal wire of address bus, data bus and control bus;
Therefore, the routine data that emulator read of microprocessor is wrong a bit.
43, as protection software approach as described in the claim 42, wherein this step (e) comprises the following steps:
(f) provide a discontinuous signal generation device, be used for above-mentionedly under normal conditions, during the action of impossible storage access, producing a discontinuous signal detecting; And
(g) provide at least one circuit arrangement, be connected to this discontinuous signal generation device, and be connected to arbitrary signal wire of address bus, data bus and control bus, be used for receiving and, this signal being urged to this predetermined potential according to this discontinuous signal.
44, as protection software approach as described in the claim 43, wherein this discontinuous signal is produced by a circuit.
45, as protection software approach as described in the claim 43, wherein this step (d) comprises the access action of detecting some storer, and being accessed under the normal conditions of these storeies is that impossible action produces.
46, as protection software approach as described in the claim 43, wherein this step (d) comprises the access action of detecting some storage address, and being accessed under the normal conditions of these addresses is impossible.
47, as protection software approach as described in the claim 43, wherein this step (d) comprises detecting impossible certain a succession of storage address access action under normal conditions.
48, as protection software approach as described in the claim 43, wherein the detecting of this step (d) is reached by a circuit for detecting.
49, as protection software approach as described in the claim 43, wherein this step (f) comprises and latchs step, is used for starting this discontinuous signal generation device, to produce this discontinuous signal.
50, as protection software approach as described in the claim 43, comprise that more one produces the step of reset signal, be used for stopping the generation of this discontinuous signal.
51, as protection software approach as described in the claim 43, wherein this predetermined potential is an earthing potential.
52, as protection software approach as described in the claim 43, wherein this predetermined potential is the current potential of a supply voltage.
CN 94118035 1994-12-03 1994-12-03 Device and method for software protection Pending CN1123935A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 94118035 CN1123935A (en) 1994-12-03 1994-12-03 Device and method for software protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 94118035 CN1123935A (en) 1994-12-03 1994-12-03 Device and method for software protection

Publications (1)

Publication Number Publication Date
CN1123935A true CN1123935A (en) 1996-06-05

Family

ID=5038644

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 94118035 Pending CN1123935A (en) 1994-12-03 1994-12-03 Device and method for software protection

Country Status (1)

Country Link
CN (1) CN1123935A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100580686C (en) * 2006-02-15 2010-01-13 施兆洲 Method for preventing software from being embezzled
CN101136049B (en) * 2006-09-01 2011-12-14 富士施乐株式会社 Information processing system, information processing method, information processing program, computer readable medium and computer data signal
CN109684239A (en) * 2017-10-18 2019-04-26 张英辉 The method for preventing the nonvolatile memory of System on Chip/SoC to be replicated

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100580686C (en) * 2006-02-15 2010-01-13 施兆洲 Method for preventing software from being embezzled
CN101136049B (en) * 2006-09-01 2011-12-14 富士施乐株式会社 Information processing system, information processing method, information processing program, computer readable medium and computer data signal
CN109684239A (en) * 2017-10-18 2019-04-26 张英辉 The method for preventing the nonvolatile memory of System on Chip/SoC to be replicated

Similar Documents

Publication Publication Date Title
US6006328A (en) Computer software authentication, protection, and security system
US5812662A (en) Method and apparatus to protect computer software
EP0447043B1 (en) Security system for software
EP2131524A2 (en) Tamper resistant methods and apparatus
JP4544739B2 (en) Method and apparatus for preventing unauthorized intrusion
KR20010023732A (en) A tamper resistant player for scrambled contents
EP2262259A1 (en) Method for monitoring execution of data processing program instructions in a security module
US6049876A (en) Data processing system and method which detect unauthorized memory accesses
WO1997004394A1 (en) Computer software authentication, protection, and security system
US20060085645A1 (en) Software application integrity verification method and device
US20040048660A1 (en) Security of gaming software
US5706426A (en) Software protection method and apparatus
JP4537003B2 (en) Method for protecting a computer from unauthorized manipulation of register contents and computer for implementing this method
CN1123935A (en) Device and method for software protection
US9781138B2 (en) Method and device for providing a security breach indicative audio alert
US20040064712A1 (en) Systems and methods for protecting media content
CN107180169A (en) A kind of software activation method and device
US7634640B2 (en) Data processing apparatus having program counter sensor
US20080040812A1 (en) Method and Device for Security Loading a Memory and an Associated Memory
US20030028780A1 (en) Software controlled device
JP3854572B2 (en) Microprocessor
CN1096030C (en) Software protective device and method using readable writable memory unit with different I/O data
AU725098B2 (en) Computer software authentication, protection, and security system
JPH09106690A (en) Rom with copy preventing function
JPH11175333A (en) Program analysis prevention method and controller provided with program analysis prevention function

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C01 Deemed withdrawal of patent application (patent law 1993)
WD01 Invention patent application deemed withdrawn after publication