CN1552010A - Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use - Google Patents
Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use Download PDFInfo
- Publication number
- CN1552010A CN1552010A CNA028146859A CN02814685A CN1552010A CN 1552010 A CN1552010 A CN 1552010A CN A028146859 A CNA028146859 A CN A028146859A CN 02814685 A CN02814685 A CN 02814685A CN 1552010 A CN1552010 A CN 1552010A
- Authority
- CN
- China
- Prior art keywords
- protected software
- unit
- software
- during
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 181
- 238000010494 dissociation reaction Methods 0.000 title description 2
- 230000005593 dissociations Effects 0.000 title description 2
- 230000002123 temporal effect Effects 0.000 title description 2
- 238000012545 processing Methods 0.000 claims abstract description 47
- 230000006870 function Effects 0.000 claims description 216
- 230000008569 process Effects 0.000 claims description 61
- 238000001514 detection method Methods 0.000 claims description 43
- 230000004048 modification Effects 0.000 claims description 40
- 238000012986 modification Methods 0.000 claims description 39
- 238000011084 recovery Methods 0.000 claims description 10
- 230000001419 dependent effect Effects 0.000 claims description 8
- 230000001960 triggered effect Effects 0.000 claims description 7
- 230000008901 benefit Effects 0.000 claims description 5
- 230000014509 gene expression Effects 0.000 description 30
- 238000012546 transfer Methods 0.000 description 17
- 230000006872 improvement Effects 0.000 description 8
- 238000000354 decomposition reaction Methods 0.000 description 6
- 230000008859 change Effects 0.000 description 4
- 238000006243 chemical reaction Methods 0.000 description 4
- 230000000153 supplemental effect Effects 0.000 description 4
- 230000002093 peripheral effect Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000009795 derivation Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 230000009897 systematic effect Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
- 238000010977 unit operation Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Storage Device Security (AREA)
Abstract
The invention concerns a method for protecting, from a unit, a vulnerable software, against unauthorised use, said vulnerable software operating on a data processing system. The inventive method consists in creating a protected software: by selecting at least an algorithmic processing; by producing the source of the protected software from the vulnerable software source, by modifying the vulnerable software source, so that at least a selected algorithmic processing is broken down such that when the protected software is executed there occur several separate steps, namely: providing at least an operand for the unit; production by the unit, of the functionality of the algorithmic processing on at least said operand; and optionally, production of at least a result, by the unit for the data processing system.
Description
Present invention relates in general to the technical field of data handling system, more precisely at the method that prevents the software that the operation unauthorized uses on described data handling system.
Theme of the present invention is handled and storage unit particularly in using, and the physical key (material key) that is embodied as usually in chip card or the USB port such as this unit prevents that unauthorized from using the module of software.
In above-mentioned technical field, subject matter relates to by user's unauthorized of not paying license fee uses software.The illegal use of this of software causes software programming person, software distribution people and/or software is integrated into the your conspicuous loss of product.For avoiding this illegal copies, in the prior art, proposed various schemes and protected software.
Therefore, protection scheme is known, and it utilizes the hardware protection system, such as the physical unit that is called protection key (protection key) or " dongle (dongle) ".This protected key should guarantee only have under the situation of key executive software.Yet it must be admitted that, and this scheme is a poor efficiency, because there is the not convenient property that is not easy to ignore in it.Under the help of specific purpose tool such as disassembler, the people of malice or hacker can delete the steering order of protected key.Then, become and to carry out illegal copies corresponding to the revision of the software that can under situation about not protecting, move.In addition, this scheme can not be summarized into all softwares, because it is difficult to the protected key greater than two is connected on the same system.
Theme of the present invention is to use special the processing and storage unit by proposing to prevent that unauthorized from using the method for software, is necessary because this unit works fully to software, thereby accurately finds out the solution of the problems referred to above.
For realizing this purpose, theme of the present invention relates at least one blank cell that use comprises processing module and memory module at least, prevent that unauthorized from using the method for leaky software (vulnerable software), described leaky software be produce by a source and on data handling system, move.The method according to this invention comprises:
→ during the protection stage
● create protected software:
-by selecting at least one algorithm process, during carrying out leaky software, it uses at least one operand and makes and obtains at least one result,
-at least one part in source by selecting to comprise the leaky software that at least one selected algorithm handles;
-the source that produces protected software by source from leaky software, at least one the selected part by revising leaky software is revised part with at least one of the source that obtains protected software, and this is revised as:
During carrying out protected software, in data handling system, carry out first operating part, and behind download message, by execution second operating part in the unit of blank cell acquisition,
Second operating part is carried out the functional of at least one selected algorithm processing at least;
Separate at least one selected algorithm process so that during carrying out protected software,, several different steps occur by second operating part,
That is:
◇ is provided with at least one operand and uses for this unit,
◇ carries out algorithm process functional of relevant described at least operand by the unit,
◇ and possibly by the unit, handles at least one result by data handling system,
To at least one selected algorithm process, definition step order is carried out each step order and trigger the step of carrying out by second operating part in the unit by first operating part so that during carrying out protected software,
And the order of in the ordered set that allows the protected software of execution, selecting the step order,
-and by producing:
Produce first object part of protected software from the source of protected software; described first object part is during carrying out protected software; appear in the data handling system and to carry out and its at least a portion is considered according to selected order first operating part of execution in step order
And second object part of protected software, described second object part is after being loaded into blank cell, and during carrying out protected software, second operating part occurs, by this second operating part, carries out the step that is triggered by first operating part,
● and for obtaining the unit, second operating part is loaded on the blank cell,
→ and during operational phase, carrying out protected software during this period:
● when having the unit, and be included at every turn step order in the part of first operating part utilize (impose) it the time, in the unit, carry out corresponding step so that correctly carry out described part, therefore, protected software works fully,
● and when lacking the unit, although carry out a step in the part request trigger element of first operating part, can not correctly fulfil described request, so that carry out described at least part improperly, therefore, protected software not exclusively works.
According to preferred embodiment, the method according to this invention comprises:
→ during the protection stage:
● revise protected software:
-by selecting to be used at least one variable at least one algorithm process, during carrying out protected software, described algorithm process partly defines the state of protected software,
-passing through at least one selected part in the source of the protected software of modification, this is revised as during carrying out protected software, and at least one copy of at least one selected variable or selected variable resides in the unit,
-and by producing
First object part of protected software, described first object part are that at least one part of first operating part considers that also at least one copy of at least one variable or variable resides in the unit during carrying out protected software,
And second object part of protected software; described second object part is for after being loaded into blank cell; and during carrying out protected software; second operating part appears; by this second operating part; at least one copy of at least one selected variable or selected variable also resides in the unit
→ and during operational phase:
● when having the unit, and the part of each first operating part is when utilizing it, uses the copy that resides in variable in the unit or variable, so that correctly carry out described part, therefore, protected software works fully,
● and when lacking the unit; although the variable reside in the unit or the copy of variable are used in the part request of first operating part, can not correctly fulfil described request, so that carry out described at least part improperly; therefore, protected software not exclusively works.
According to another preferred embodiment, the method according to this invention comprises:
→ during the protection stage:
● definition:
-basic function collection is easy to carry out its basic function in the unit,
-and the basic command collection that is used for described basic function collection, be easy in data handling system, carry out described basic command and trigger and in the unit, carry out basic function,
● structure allow the unit carry out described collection basic function utilize module, trigger and carry out described basic function by in data handling system, carrying out basic command,
● and revise protected software:
-passing through at least one selected part in the source of the protected software of modification, this is revised as:
Separately at least one step by second operating part, is used basic function so that during carrying out protected software, carries out described step,
To at least one step of separating, basic command is assembled the source of protected software, so that during carrying out protected software, carry out each basic command, and in the unit, trigger and carry out basic function by second operating part by first operating part,
And the order of in the ordered set that allows the protected software of execution, selecting basic command,
-and by producing:
First object part of protected software, described first object part is during carrying out protected software, and according to selected order, at least one part of first operating part is also carried out basic command,
And second object part that comprises the protected software that utilizes module, described second object part is after being loaded into the unit, and during carrying out protected software; second operating part appears; by second operating part, carry out the basic function that triggers by first operating part
→ and during operational phase:
● when having the unit, and when being included in basic command in the part of first operating part at every turn and utilizing it, carry out corresponding basic function in the unit, so that correctly carry out described part, therefore, protected software works fully,
● and when lacking the unit, in the unit, carry out a basic function although the part request of first operating part triggers, and still can not correctly fulfil described request, so that carry out described at least part improperly, therefore, protected software not exclusively works.
According to another preferred embodiment, the method according to this invention comprises:
→ during the protection stage:
● definition:
-at least one software is carried out characteristic, in this unit, is easy to be monitored to small part,
At least one criterion that-at least one software executing characteristic is observed,
-the detection module realized in this unit also allows to detect at least one software and carries out characteristic and observe at least one correlation criterion,
-and pressure (coercion) module that in this unit, realizes, and allowing when not observing at least one criterion, notification data disposal system and/or revise the software of carrying out,
● structure allows this unit also to realize the module of utilizing of detection module and pressure module,
● and revise protected software:
-carry out characteristic by carry out at least one software of selecting in the characteristic to monitor at the software that is easy to monitor,
-carry out at least one criterion that characteristic is observed by the software of selecting at least one selection,
-by in the source of protected software, selecting to monitor the basic function of at least one selected software execution characteristic,
-at least one selected part in source by revising protected software; this is revised as during carrying out protected software; monitor at least one selected characteristic of carrying out by second operating part; and the fact of not observing criterion causes the execution of informing data handling system and/or revising protected software
-and second object part that comprises the protected software that utilizes module by generation; also realize detection module and force module; described second object part is for after being loaded into this unit; and during carrying out protected software; monitor that the fact that at least one software is carried out characteristic and do not observed criterion causes the execution of informing data handling system and/or revising protected software
→ and during operational phase:
● when having this unit:
-as long as observe all criterions, allow described part nominal ground (nominally) operation of protected software corresponding to the execution characteristic of all supervision of all modifications part of protected software, therefore, allow protected software nominal ground operation,
If observe at least one criterion corresponding to the execution characteristic of the part of the protected software that monitors; it is informed data handling system and/or revise this part operation (functioning) of protected software, so that revise the operation of protected software.
According to different embodiment, the method according to this invention comprises:
→ during the protection stage:
● definition:
-be that the software that is easy to monitor is carried out characteristic with the variable-definition of the tolerance of functional use of software,
-at least one threshold value relevant with the variable of each tolerance is defined as the criterion of observing,
-and implementation (actualization) module that allow to upgrade the variable of at least one tolerance,
● structure allows this unit also to realize carrying out the module of utilizing of module,
● and revise protected software:
-by at least one Variables Selection of the tolerance of at least one functional use of software is carried out characteristic for the software that monitors,
-by selecting:
Use the variable of tolerance to be easy to monitor that at least one of protected software of its use is functional,
Be used for quantizing at least one variable of the tolerance of described functional use,
With at least one relevant threshold value of variable corresponding to the selected tolerance of the restriction of described functional use,
And, upgrade at least a method of the variable of selected tolerance according to described functional use,
-passing through at least one selected part in the source of the protected software of modification, this is revised as during carrying out protected software, according to described functional use; by second operating part; realize the variable of tolerance, and consider that at least one threshold value crosses (crossing)
→ and during operational phase; when having this unit; and use at least one threshold value of restriction to cross under the situation detecting corresponding at least one, with its operation of informing data handling system and/or revising protected software, so that revise the operation of protected software.
According to different embodiment, the method according to this invention comprises:
→ during the protection stage:
● definition:
-be used for several dependent thresholds of the variable of at least one tolerance,
-and force module corresponding to each difference of described threshold value,
● and revise protected software:
-by in the source of protected software, select must with the variable corresponding at least one relevant selected tolerance of several threshold values of the different restrictions of functional use,
-by selecting at least two the relevant threshold values of variable with selected tolerance,
-and at least one selected part in the source by revising protected software, this is revised as during carrying out protected software, by second operating part, differently considers to cross different threshold values,
→ and during operational phase:
● under the situation that has this unit:
-detecting under the situation of crossing first threshold, order protected software not re-use function corresponding,
-and detecting under the situation of crossing second threshold value, make at least a portion of function corresponding and/or protected software invalid.
According to different embodiment, the method according to this invention comprises:
→ during the protection stage:
● definition allows by at least one other use, trusts benefit dress (refill) module of at least one software functionality that is monitored by the variable of measuring,
● structure also allows this unit to realize mending the module of utilizing of dress module,
● and revise protected software:
The variable of-use by in the source of protected software, select allowing limitation function and at least one tolerance of selecting that must trust by at least one other use,
-and by revising at least one selected part, this is revised as during being called the additional stage, can trust at least one functional at least one the other use corresponding to the variable of selected tolerance,
→ and during mending dress:
● realize variable and/or at least one dependent thresholds of the tolerance that at least one is selected again, so that allow functional at least one other use.
According to different embodiment, the method according to this invention comprises:
→ during the protection stage:
● definition:
-profile (profile) of software use is defined as the software execution characteristic that is easy to monitor,
-and at least one software executing characteristic is defined as the criterion of observing,
● and revise protected software:
-the software that is chosen as supervision by the profile that at least one software is used is carried out characteristic,
-carry out feature by at least one that select that at least one selected use profile must observe,
-and at least one selected part in the source by revising protected software, this modification is during carrying out protected software, second operating part is observed all selected execution features,
→ and during operational phase, when having this unit, and observe under at least one situation of carrying out feature not detecting, it is informed data handling system and/or revise the operation of the part of protected software, so that revise the operation of protected software.
According to different embodiment, the method according to this invention comprises:
→ during the protection stage:
● definition:
-in this unit, be easy to carry out the instruction set of its instruction,
-be used for the designated command collection of described instruction set, be easy in data handling system, carry out described designated command and in this unit, trigger execution command,
-will instruct link to be defined as the use profile,
-expection the link definition that will be used to execute instruction is for carrying out feature,
-will to allow to detect the instruction link be not detection module corresponding to the module definition of the instruction link of expection,
-and will allow when instruction link during corresponding to the instruction link of expection, the notification data disposal system and/or the module definition of function that changes protected software be for forcing module,
● structure also allow this unit execution command collection instruction utilize module, trigger by execution command order in data handling system and carry out described instruction,
● and revise protected software:
-at least one selected part in source by revising protected software:
By specify in this unit carry out them during, the link that at least some instructions must be observed,
And by basic command being transformed into the designated command corresponding to employed instruction,
→ and during operational phase; when having this unit; the instruction carried out in detecting this unit link is under the situation corresponding to the instruction link of expection, it informed data handling system and/or revise the operation of the part of protected software, so that revise the operation of protected software.
According to different embodiment, the method according to this invention comprises:
→ in the protection stage:
● definition:
-at least some instructions are worked with register and for returning a result, are used the instruction set of at least one operand to be defined as instruction set with it,
-at least some instructions to working with register:
And the definition expection link that is used to execute instruction and comprise part corresponding to following bit field:
The identification field of ◇ instruction,
◇ and each operand that is used to instruct:
* attribute field,
* and the expection identification field of operand,
-utilize module and by each register that instruction set is used to belonging to, the sign that will return last instruction of its result automatically is stored in the identification field that is generated in the described register,
-and will allow during executing instruction, to each operand, when attribute field is utilized it, inspection is detection module corresponding to the module definition of the equation (equality) of the identification field that is generated of the register that is used by the original expection identification field of described operand and described operand
If at least one of the equation of being checked for false, will allow modify instruction result's module definition for forcing module.
According to another preferred embodiment, the method according to this invention comprises:
→ during the protection stage:
● definition:
-basic command or designated command are defined as trigger command,
-be related function with basic function or instruction definition,
-near small part is defined as an order (order) corresponding at least one argument (argument) that is used for trigger command of the information that is sent to the unit by data handling system, carries out corresponding related function so that trigger,
-allow the rename order so that obtain to have the order rename method of the trigger command of rename order,
-and be designed to during operational phase, in the unit, use and allow and recover related function so that the recovery module of carrying out by the rename order,
● structure allows this unit also to realize recovering the module of utilizing of module,
● and revise protected software:
-by in the source of protected software, selecting trigger command,
-by the order of the selected trigger command of rename, revise at least one selected part in the source of protected software, so that hide the identity (identity) of corresponding related function,
-and by producing:
First object part of protected software, described first object part are during carrying out protected software, carry out the trigger command with rename order,
And second object part that comprises the protected software that utilizes module; also realize recovering module; described second object part is for after being loaded into this unit; and during carrying out protected software; by second operating part; recovery triggers the identity of the related function of its execution by first operating part, carries out related function by second operating part
→ and during operational phase:
● when having this unit; and when being included in trigger command in the part of first operating part at every turn and utilizing it with rename order; in this unit, recover the characteristic of corresponding related function and carry out it; so that correctly carry out described part; therefore; protected software works fully
● and when lacking this unit, in this unit, carry out related function although the part request of first operating part triggers, and still can not correctly fulfil described request, so that carry out described at least part improperly, therefore, protected software not exclusively works.
According to different embodiment, the method according to this invention comprises:
→ during the protection stage,
● be equivalence at least one related function definition algorithm, but the gang's related function that triggers by the different trigger command of its rename order,
● and revise protected software:
-by in the source of protected software, selecting to have at least one trigger command of rename order,
-and, revise at least one selected part in the source of protected software by replace the rename order of a selected trigger command at least with another rename order with rename order, trigger related function mutually of the same clan.
According to different embodiment, the method according to this invention comprises:
→ during the protection stage, be the related function of equivalence at least one related function definition gang algorithm:
-by the noise field is connected (concatenate) on the information of the funtion part of definition related function so that in this unit, carry out,
-or by the identification field of use instruction and the expection identification field of operand.
According to different embodiment, the method according to this invention comprises:
→ during the protection stage:
● definition:
-the encryption method that will encrypt order is defined as the rename method of order,
-and will realize deciphering rename order, thus the identity of related function recovered so that the module definition of the decryption method of carrying out is for recovering module in the unit.
According to another preferred embodiment, the method according to this invention comprises:
→ during the protection stage:
● revise protected software
-by in the source of protected software, being chosen at least one conditional branching of carrying out at least one selected algorithm process,
-passing through at least one selected part in the source of the protected software of modification, this is revised as during carrying out protected software, by second operating part, carries out the functional of at least one selected conditional branching in this unit,
-and by producing:
First object part of protected software, described first object part are during carrying out protected software, carry out the functional of at least one selected conditional branching in the unit,
And second object part of protected software, described second object part is after being loaded into this unit, and during carrying out protected software, second operating part occurs, by second operating part, carries out the functional of at least one selected conditional branching,
→ and during operational phase:
● when having this unit, and the part of each first operating part carries out the functional of at least one conditional branching when utilizing it in this unit, so that correctly carry out described part, therefore, protected software works fully,
● and when lacking this unit; although the part request of first operating part executive condition branch functional in this unit still can not correctly be fulfiled described request, so that carries out described at least part improperly; therefore, protected software not exclusively works.
According to different embodiment, the method according to this invention comprises: during the protection stage, revise protected software:
-by the selected conditional branching of at least one series of selection in the source of protected software,
-passing through at least one selected part in the source of the protected software of modification, this is revised as during carrying out protected software, by second operating part, carries out all functionality of the conditional branching of at least one selected series in this unit,
-and by producing:
First object part of protected software, described first object part are during carrying out protected software, and the conditional branching of at least one selected series of execution is functional in this unit,
And second object part of protected software; described second object part is after being loaded into this unit, and during carrying out protected software, second operating part occurs; by second operating part, carry out all functionality of the conditional branching of at least one selected series.
Therefore the method according to this invention allows by using a processing and protect bit cell software to use, and this processing and storage unit demonstrate the characteristic of a part that comprises the software of just carrying out.Thereby attempt not have handling and any derivation version of the software of storage unit operation force the term of execution, establishment is included in the software section in processing and the storage unit again, perhaps the software version of described derivation will not exclusively work.
Various other features occur from the following description that provides with reference to the accompanying drawings, accompanying drawing is represented the embodiment and the realization of theme of the present invention as unrestricted example.
Figure 10 and 11 is functional block diagrams of various expressions of the software of the protection that is not subjected to and is subjected to the method according to this invention of example explanation respectively.
Figure 20 to 22 illustrates the various embodiment of the module that realizes the method according to this invention.
Figure 30 to 31 is functional block diagrams that the General Principle of the method according to this invention clearly is described.
Figure 40 to 43 is the example explanation realizes protection philosophy by variable figure according to guard method of the present invention.
Figure 50 to 54 is that the example explanation is by the interim figure according to guard method of the present invention that decomposes (temporal dissociation) realization protection philosophy.
Figure 60 to 64 is the example explanation realizes protection philosophy by basic function (elementary function) figure according to guard method of the present invention.
Figure 70 to 74 is that the example explanation is by detecting and force to realize the figure according to guard method of the present invention of protection philosophy.
Figure 80 to 85 is the example explanation realizes protection philosophy by rename figure according to guard method of the present invention.
Figure 90 to 92 is the example explanation realizes protection philosophy by conditional branching figure according to guard method of the present invention.
Figure 100 is the figure of the different phase of example realization that theme of the present invention is described.
The explanation of Figure 110 example allows the embodiment of realization according to the system of the structural level in protection of the present invention stage.
The explanation of Figure 120 example is used in the embodiment according to the customization units in advance in the guard method of the present invention.
The explanation of Figure 130 example allows to realize the embodiment of generation according to the system of the instrument of the level (stage) in protection of the present invention stage.
The explanation of Figure 140 example allows the embodiment of realization according to the system of guard method of the present invention.
The explanation of Figure 150 example is used in the embodiment according to the customization units in the guard method of the present invention.
In remaining is described, will use following definitions:
● data handling system 3 is systems of energy executive routine.
● processing and storage unit are energy
The data that-acceptance is provided by data handling system 3,
-data are turned back to data handling system 3
Even-store data in confidence and cut off this unit to small part, also can remain to the described data of small part,
-execution algorithm is handled on data, and partly or entirely the result is for maintaining secrecy.
● unit 6 is processing and the storage unit that realize the method according to this invention.
● blank cell 60 is the unit that can not realize the method according to this invention, but it can receive it is transformed into data in the unit 6.
● Ding Zhi unit 66 is to allow to have received the blank cell 60 that will transform to the partial data in the unit 6 after receiving supplementary data in advance.
● the unit 66 that information is loaded into blank cell 60 or customization in advance is corresponding to being sent to information the blank cell 60 or the unit 66 of customization in advance, and the information that transmitted of storage.Transmission can comprise the change information format.
● the variable, function or the data that are included in the data handling system 3 will be represented by capitalization, and the variable, function or the data that are included in the unit 6 will be represented with lowercase.
● " protected software " is the software that has stood at least one protection of the protection philosophy realized by the method according to this invention.
● " leaky software " is the software that is not subjected to by arbitrary protection philosophy protection of the method according to this invention realization.
● under the unessential situation of difference between leaky software and protected software, use term " software ".
● according to the moment of considering in its life cycle, software has various expressions:
-source-representation,
-object representation,
-distribute (distribution),
-or dynamically expression.
● the source-representation of software is interpreted as after conversion, causes the expression of object representation.Source-representation can provide the various levels from conceptual abstraction level (level) to the level of can be directly being carried out by data handling system or processing and storage unit.
● the object representation of software corresponding to be sent to distribute and be loaded into data handling system or processing and storage unit after, the level of the expression that can carry out.It can be for example binary code, interpre(ta)tive code or the like.
● distribution is to comprise the physics of object representation or virtual support, and described distribution is freely handled so that allow them to use software by the user.
● dynamically expression is corresponding to the execution from the software of its distribution.
● part software is corresponding to the some parts of software and for example, continuous or discrete command corresponding to one or several, and/or one or several continuous or discontinuous functional block, and/or one or several function, and/or one or several subroutine, and/or one or several module.Part software can also be corresponding to all described software.
Figure 10 and 11 is the generally speaking leaky software 2v of example explanation and be subjected to the various expressions of the protected software 2p of the method according to this invention protection respectively.
The various expressions of the leaky software 2v that the explanation of Figure 10 example occurred during its life cycle.Therefore, leaky software 2v can appear in any one time in following expression:
● source-representation 2vs,
● purpose is represented 2vo,
● distribution 2vd.Described distribution can have the form of physical distribution medium usually, the form of the file that distributes such as CDROM or by network (GSM, Internet or the like),
● or corresponding to the data handling system 3 at any known type, it generally includes the dynamic expression 2ve of the leaky software 2v that carries out at least four processors.
The various expressions of the protected software 2p that the explanation of Figure 11 example occurred during its life cycle.Therefore, protected software 2p appears in any one time in following expression:
● software represents that 2ps comprises that part is used for the first source part of data handling system 3, and the second source part that is used for unit 6, and the part of described source part can be included in the common file usually,
● object representation 2po comprises the first object part 2pos that is used for data handling system 3, and comprises the second object part 2pou that is used for unit 6,
● distribution 2pd comprises:
-the first distribution part 2pds, comprise the first object part 2pos, the described first distribution part 2pds is used for the form that data handling system 3 also can have form such as the CDROM of physical distribution medium usually or pass through the file of network (GSM, Internet or the like) distribution
-and the second distribution part 2pdu have form:
At least one unit that customizes in advance 66 has been loaded the part of the second object part 2pou and by loading supplementary data, the user must finish customization so that obtain unit 6, for example, by downloading from network, can obtain described benefit dress data
● or dynamically represent 2pe, corresponding to carrying out protected software 2p.Described dynamic expression 2pe is included in first operating part 2pes that carries out in the data handling system 3 and the second operating part 2peu that carries out in unit 6.
Under the unessential situation of difference between the difference of protected software 2p is represented, should use the first of the protected software of wording and the second portion of protected software.
The module 1p that comprises the data handling system 3 that is connected with unit 6 by link road 5 is used in realization according to the method for the present invention of the dynamic expression of Figure 11.Data handling system 3 is any kinds and generally includes at least one processor 4.Data handling system 3 can be a computing machine or for example generally speaking, the parts of various machines, equipment, fixing or mobile product or vehicle.Can realize linking road 5 in any possible mode, such as serial link road for example, usb bus, radio link road, light link road, network linking road or to direct electrical connection of the circuit of data handling system 3 or the like.It should be noted that unit 6 may be that physics is arranged in the integrated circuit identical with the processor of data handling system 3.In this case, unit 6 can be regarded as the coprocessor of magnetic being arranged and linking road 5 at IC interior with the processor 4 of data handling system 3.
Figure 20 to 22 is with the example and the mode of restriction not, and expression allow to realize the various embodiment according to the module 1p of guard method of the present invention.
In the embodiment shown in Figure 20, protection module 1p comprises as the computing machine of data handling system 3 and as the chip card 7 of unit 6 and be commonly referred to the interface 8 of card reader.By link road 5 computing machine 3 is connected on the unit 6.During carrying out protected software 2p, first operating part 2pes that carries out in computing machine 3 and the second operating part 2peu that carries out in chip card 7 and interface 8 thereof must be functional so that protected software 2p works fully.
In the embodiment shown in Figure 21, protection module 1p generally speaking has product 9, comprises the various parts 10 that are suitable for by the function of this product 9 supposition.Protection module 1p comprises the data handling system in the embedded product 9 on the one hand, on the other hand, comprises the unit 6 relevant with product 9.Therefore, product 9 works fully, and protected software 2p must work fully.Therefore, during carrying out protected software 2p, first operating part 2pes that carries out in data handling system 3 and the second operating part 2peu that carries out in unit 6 must work.Therefore, described protected software 2p allows to prevent indirectly that unauthorized from using a product 9 or an one function.For example, product 9 can be facility, system, machine, toy, a kind of housed device, phone or the like.
In the embodiment shown in Figure 22, protection module 1p comprises several computing machines, and the part communication network.Data handling system 3 is first computing machines that are connected to the unit 6 that is made of second computing machine by the link road 5 of network type.To realization of the present invention, second computing machine, 6 usefulness act on the permit server of protected software 2p.During carrying out protected software 2p, first operating part 2pes that carries out in first computing machine 3 and the second operating part 2peu that carries out in second computing machine 6 must work so that protected software 2p works fully.
Figure 30 allows to be illustrated more clearly in according to guard method of the present invention.It should be noted that leaky software 2v is considered as all carrying out in data handling system 3.On the other hand; under the situation that realizes protected software 2p; data handling system 3 comprises by link road 5 and is connected to delivery module 12 into the delivery module 13 of the part of unit 6, sets up between the first operating part 2pec that allows at protected software 2p and the second operating part 2peu and communicates by letter.
It should be noted that delivery module the 12, the 13rd, software and/or ardware feature also can provide and may optimize the data communication of 6 of data handling system 3 and unit.Described delivery module 12,13 is used for allowing to have with the employed type that links road 5 irrespectively freely handling protected software 2p.Described delivery module 12,13 is not the part of theme of the present invention, because they are very known for the skilled person, does not therefore describe more accurately.The first of protected software 2p comprises order.During carrying out protected software 2p, carry out described order by the first operating part 2pes and allow to communicate by letter between the first operating part 2pes and the second operating part 2peu.In all the other are described, represent described order with IN, OUT or TRIG.
As shown in figure 31, for allowing to realize the second operating part 2peu of protected software 2p, unit 6 comprises protection module 14.Protection module 14 comprises memory module 15 and processing module 16.
For simplifying all the other descriptions, during carrying out protected software 2p, select to consider to have unit 6 or lack unit 6.In fact, when carrying out protected software 2p improperly, provide the unit 6 of the protection module 14 of the second operating part 2peu that is not suitable for carrying out protected software 2p also to be considered as lacking at every turn.In other words:
● physics exists and comprises that the unit 6 of the protection module 14 of the second operating part 2peu that is suitable for carrying out protected software 2p always is regarded as existing.
● physics exists but comprises and being not suitable for, and the unit 6 of the second operating part 2peu that does not promptly allow the protected software 2p of correct execution is regarded as existence, and when it is worked improperly, is considered as lacking (missing) when its correct work,
● and the unit 6 that physics lacks always is regarded as lacking.
Be made of under the situation of unit 6 chip card 7 and interface 8 thereof, delivery module 13 is divided into two parts, one on interface 8, and another is on chip card 7.In this embodiment, lack chip card 7 and be regarded as being equivalent to and lack unit 6.In other words, lack chip card 7 and/or its interface 8, protection module 14 can not access and is not allowed to carry out the second operating part 2peu of protected software 2p, and so far, protected software 2p not exclusively works.
According to another advantageous feature of the present invention, guard method is used for realizing being called the protection philosophy of " the interim decomposition ", will carry out its description with reference to Figure 50 to 54.
For by realizing protection philosophy interim the decomposition, use at least one operand and return at least one result, in leaky software 2vs, select at least one algorithm process.Also select to comprise at least one part in the source of the leaky software 2vs that at least one selected algorithm handles.
Revise at least one selected part in the source of leaky software 2vs then, so that obtain the source of protected software 2ps.This is revised as wherein:
● during carrying out protected software 2p, at least a portion of the first operating part 2pes that carries out in data handling system 3 is considered functional that at least one selected algorithm of execution is handled in unit 6,
● during carrying out protected software 2p, the second operating part 2peu that carries out in unit 6 carries out the functional of at least one selected algorithm processing at least,
● during carrying out protected software 2p, each selected algorithm processing is divided into several different steps, that is:
-step 1: operand is transferred to unit 6 freely handle,
-step 2: in unit 6, use described operand to carry out the functional of selected algorithm process,
-and step 3: perhaps,, selected algorithm process result is transferred to data handling system 3 freely handle by unit 6.
● with the execution of step command definition one-tenth triggering step,
● and in the ordered set that allows the protected software 2p of execution, select the step command sequences.
The first operating part 2pes of the protected software 2p that carries out in data handling system 3 carries out the step order that triggers in unit 6, carry out the step of each previous definition by the second operating part 2peu.
The example of leaky software 2v is carried out in the explanation of Figure 50 example.At this example, during carrying out leaky software 2v,, in data handling system 3, occur corresponding to representing and use the result of the algorithm process of operand X and Y to distribute to Z ← F (X, calculating Y) of Z with function F sometime.
The example of the realization of the present invention of the algorithm process of the selection of Figure 51 example explanation in unit 6 medium-long ranges processing (remote) Figure 50.In this example, in data handling system 3, carry out during the first operating part 2pes of protected software 2p, and when having unit 6, occur:
● at moment t
1,, that is, carry out to trigger that data X and Y are sent to the memory block x of the memory module 15 that is arranged in unit 6 and the step order CE of y respectively from data handling system 3 in step 1
1, described step order CE
1With OUT (x, X), OUT (y, Y) expression,
● at moment t
2, step 2 promptly, is carried out the step order CE in the trigger element 6
2, carry out function f by the second operating part 2peu, described function f is to be equivalent to function F and described step order CE on the algorithm
2, with TRIG (f) expression.More particularly, execution in step order CE2 causes carrying out the function f of the content of using memory block x and y, and its result is turned back to the memory block z of unit 6,
● and at moment t
3, step 3 promptly, is carried out the result who triggers the function f among the memory block z that will be included in unit 6 and is sent to data handling system 3 so that it is distributed to the step order CE of variable Z
3, described step order CE
3Represent with IN (z).
In the example of example, execution in step 1 to 3 continuously.It should be noted that and can cause two improvement:
● first improvement relates to the 6 medium-long ranges processing several algorithms processing in the unit, and the situation of being used the result of an algorithm process at least by another algorithm process.In this case, can remove some transfer step.
● second improves some order that relates at select the step order in the ordered set that allows the protected software 2p of execution.In this one side, preferably, select the step command sequences of interim decomposition execution in step by between them, being inserted in the code section of carrying out in the data handling system 3 and comprising or do not comprise the step order that is used for determining other data.Figure 52 and 53 examples illustrate the principle of this embodiment.
Figure 52 represents to carry out the example of leaky software 2v.In this example, during carrying out leaky software 2v, in data handling system 3, occur carrying out two algorithm process that cause determining Z and Z ', so that Z ← F (X, Y) and Z ' ← F ' (X ', Y ').
The example of the realization of the method according to this invention of two algorithm process that the explanation of Figure 53 example is selected in unit 6 medium-long ranges processing Figure 52.According to this example, in data handling system 3, carry out during the first operating part 2pes of protected software 2p, and when having unit 6, occur as mentioned above, carry out corresponding to the step order CE that determines Z
1, CE
2, CE
3And corresponding to the step order CE that determines Z '
1', CE
2', CE
3'.As shown in the figure, since inserting step order CE1 ' to CE3 ' and other code sections, execution in step order CE discontinuously
1To CE
3In example, thereby carry out following order: CE
1, part is inserted sign indicating number, CE
2, part is inserted sign indicating number, CE
1', part is inserted sign indicating number, CE
2', part is inserted sign indicating number, CE
3', part is inserted sign indicating number, CE
3
It should be noted that during carrying out protected software 2p, and when having unit 6, when being included in step order in the part of the first operating part 2pes of protected software 2p at every turn and utilizing it, in unit 6, carry out corresponding step.Therefore, appear at when having unit 6, correctly carry out described part, therefore, protected software 2p works fully.
Figure 54 example illustrates when lacking unit 6, the example that the execution of protected software 2p is attempted.In this example, in data handling system 3, carry out during the first operating part 2pes of protected software 2p:
● at moment t1, consider to lack unit 6, execution in step order OUT (x, X), OUT (y Y) can not trigger data X and Y are sent to each memory block x and Y,
● at moment t2, consider to lack unit 6 that execution in step order TRIG (f) can not trigger the execution function f,
● and at moment t3, consider to lack unit 6 that execution in step order IN (z) can not trigger the result of tansfer function f.
Therefore, appear at when lacking unit 6, can not correctly fulfil at least one request trigger element 6 of part of the first operating part 2pes and carry out a step, so that carry out described at least part improperly, therefore, protected software 2p not exclusively works.
According to the present invention, guard method is used for realizing being called the protection philosophy of " variable ", carries out its description with reference to Figure 40 to 43.
For realizing protection philosophy by variable, in the source of leaky software 2vs, select at least one variable, during carrying out leaky software 2v, this at least one variable partly defines its state.By the state of software, it must be understood that at the appointed time, need carry out many information sets of described software fully, so far, lack this selected variable and be unfavorable for carrying out fully described software.Also selection comprises the source of the leaky software 2vs of at least a portion of at least one selected variable.
Revise the source of the leaky software 2vs of at least one selected part then, so that obtain the source of protected software 2ps.This modification is during carrying out protected software 2p, and at least a portion of the first operating part 2pes that carries out in data handling system 3 considers that variable that at least one is selected or at least one copy of selected variable reside in the unit 6.
Figure 40 example illustrates the example of the execution of leaky software 2v.In this example, in data handling system 3, carry out during the leaky software 2v, occur:
● at moment t
1, X distributes to variable V with data
1, use V
1← X represents,
● at moment t
2, with variable V
1Value distribute to variable Y, with Y ← V
1Expression,
● and at moment t
3, with variable V
1Value distribute to variable Z, with Z ← V
1Expression.
Figure 41 example explanatory variable resides in the example of first form of the realization of the present invention in the unit 6.In this example, in data handling system 3, carry out during the first operating part 2pes of protected software 2p, when having unit 6, occur:
● at moment t
1, carry out to trigger that data X is sent to the variable V of the memory module 15 that is arranged in unit 6 from data handling system 3
1Transfer command, described transfer command is with OUT (v
1, x) expression, and finally corresponding to data X is assigned to variable v
1,
● at moment t
2, carry out and trigger the variable v that will reside in the unit 6
1Value be sent to data handling system 3 so that it is distributed to the transfer command of variable Y, described transfer command is with IN (v
1) expression, and finally corresponding to variable v
1Value distribute to variable Y,
● and at moment t
3, carry out and trigger the variable v that will reside in the unit 6
1Be sent to data handling system 3 so that it is distributed to the transfer command of variable Z, described transfer command is with IN (v
1) expression and finally corresponding to variable v
1Value be assigned to variable Z.
Should observe during carrying out protected software 2p, at least one variable resides in the unit 6.Therefore; when the part of the first operating part 2pes of protected software 2p is utilized it; and when having unit 6; reside in that described variate-value in the unit 6 is sent to data handling system 3 so that use by the first operating part 2pes of protected software 2p; so far; so that correctly carry out described part, thereby protected software 2p works fully.
The copy of Figure 42 example explanatory variable resides in the example of second form of the realization of the present invention in the unit 6.In this example, in data handling system 3, carry out during the first operating part 2pes of protected software 2p, and when having unit 6, occur:
● at moment t
1, data X is distributed to the variable V that is arranged in data handling system 3
1, and carry out to trigger data X is sent to the variable v of the memory module 15 that is arranged in unit 6 from data handling system 3
1Transfer command, described transfer command is with OUT (v
1, X) expression,
● at moment t
2, with variable V
1Value be assigned to variable Y,
● and at moment t
3, carry out and trigger the variable v that will reside in the unit 6
1Value be sent to deal with data system 3 so that make its transfer command that changes to variable Z, described transfer command is with IN (v
1) expression.
It should be noted that at least one copy of variable resides in the unit 6 during carrying out protected software 2p.Therefore; when the part of the first operating part 2pes of protected software 2p is utilized it; and when having unit 6; the described copy value that resides in the variable in the unit 6 is sent to data handling system 3 so that use by the first operating part 2pes of protected software 2p; so far; correctly carry out described part, therefore, protected software 2p works fully.
Figure 43 example illustrates when lacking unit 6, the example that the execution of protected software 2p is attempted.In this example, in data handling system 3, carry out during the first operating part 2pes of protected software 2p:
● at moment t
1, consider to lack unit 6, carry out transfer command OUT (v
1, x) can not trigger data X is sent to variable v
1,
● at moment t
2, consider to lack unit 6, carry out transfer command IN (v
1) can not trigger variable v
1Value be sent to data handling system 3,
● and at moment t
3, consider to lack unit 6, carry out transfer command IN (v
1) can not trigger variable v
1Value be sent to data handling system 3.
Therefore, obviously, when lacking unit 6; can not correctly fulfil at least one request of the part of the first operating part 2pes that uses the variable reside in the unit 6 or variant duplication; so that carry out described at least part improperly, therefore, protected software 2p not exclusively works.
It should be noted that data that data handling system 3 shown in the former example and unit are 6 transmit only uses simple the distribution, and the technician will know how they to be operated to combine with other and obtain complicated operations such as for example OUT (v
1, 2*X+3) or Z ← (5*v
1+ v
2).
According to another advantageous feature of the present invention, guard method is used for realizing being called the protection philosophy of " basic function ", carries out its description with reference to Figure 60 to 64.
For realizing protection philosophy by basic function, definition:
● the basic function collection, in unit 6,, easily carry out its basic function, and can transmit data in data handling system 3 and 6 of unit by the second operating part 2peu,
● and the basic command collection that is used for described basic function collection, in data handling system 3, be easy to carry out described basic command and in unit 6, trigger the corresponding basic function of execution.
For realizing protection philosophy by basic function, also constitute the use device that allows blank cell 60 is transformed into the unit 6 that can carry out basic function, the execution of described basic function is triggered by carry out basic command in data handling system 3.
For realizing protection philosophy, use at least one algorithm process of also in the source of leaky software 2vs, selecting at least one operand of use and returning at least one result by basic function.Also select to comprise at least one part in the source of the leaky software 2vs that at least one selected algorithm handles.
Revise at least one selected part in the source of leaky software 2vs then, so that obtain the source of protected software 2ps.Wherein, this modification is consequently:
● during carrying out protected software 2p, consider functional that at least one selected algorithm of execution is handled in unit 6, in data handling system 3, carry out at least one part of the first operating part 2pes,
● during carrying out protected software 2p, the second operating part 2peu that carries out in unit 6 carries out the functional of at least one selected algorithm processing at least,
● separately each selected algorithm is handled so that during carrying out protected software 2p, by the second operating part 2peu, uses basic function, carries out each selected algorithm process.Best, the algorithm process that each is selected is divided into basic function fe
n(wherein, n changes from 1 to N), that is:
-one or several basic function of allowing to be provided with one or several operand uses for unit 6,
-basic function, some use operand and combination to use described operand to carry out the functional of selected algorithm process,
-allowing by unit 6, the result that selected algorithm process is set transfers to one or several basic function that data handling system 3 is used.
● from the ordered set that allows the protected software 2p of execution, select the order of basic command.
The first operating part 2pes of the protected software 2p that carries out in data handling system 3 carries out the basic command CFE that triggers in unit 6
n(wherein n from 1 to N) carries out each basic function fe in preceding definition by the second operating part 2peu
n
The example of leaky software 2v is carried out in the explanation of Figure 60 example.In this example, in data handling system 3, carry out during the leaky software 2v, at some constantly, occur corresponding to will with function F represent and use the result of the algorithm process of operand X and Y distribute to Z calculating Z ← F (X, Y).
The example of Figure 61 example explanation realization of the present invention of selected algorithm process in unit 6 medium-long ranges processing Figure 60.In this example, in data handling system 3, carry out during the first operating part 2pes of protected software 2p, and when having unit 6, occur:
● at moment t
1, t
2, carry out the initial function CFE that in unit 6, triggers
1, CFE
2, by the second operating part 2peu, carrying out provides data X, and Y is sent to the memory block x of the memory module 15 that is arranged in unit 6, the corresponding basic function fe of y respectively from data handling system 3
1, fe
2, described basic command CFE
1, CFE
2Use respectively OUT (x, X), OUT (y, Y) expression,
● at moment t
3To t
N-1, carry out the basic command CFE that in unit 6, triggers
3To CFE
N-1, carry out corresponding basic function fe by the second operating part 2peu
3To fe
N-1, use TRIG (fe respectively
3) to TRIG (fe
N-1) the described basic command CFE of expression
3To CFE
N-1In conjunction with performed basic function fe
3To fe
N-1Sequence is equivalent to function F on algorithm.Or rather, carry out described basic command and cause in unit 6 carrying out and use memory block x, the content of y also turns back to the result basic function fe of the memory block z of unit 6
3To fe
N-1,
● and at moment t
N, carry out the basic command CFE that in unit 6, triggers
N, carrying out by the second execution unit 2peu provides the result who will be included in the algorithm process among the memory block z of unit 6 to be sent to the basic function fe of data handling system 3
N, so that it is distributed to variable Z, described basic command CFE
NRepresent with IN (z).
In an example shown, carry out basic command 1 continuously to N.It should be noted that and can cause two improvement:
● first improvement relates to the result that 6 medium-long ranges are handled the several algorithms processing and used an algorithm process at least by another algorithm in the unit.In this case, can remove some basic commands that can be used to transmit.
● second improves at allowing to carry out in the ordered set of protected software 2p, selects the associated order of basic command.At this on the one hand, preferably by between them, being inserted in the code section of carrying out in the data handling system 3 and comprising or do not comprise the basic command that is used for determining other data, select interim basic command order of decomposing the execution of basic function.Figure 62 and 63 examples illustrate the principle of this embodiment.
Figure 62 represents to carry out the example of leaky software 2v.In this example, during carrying out leaky software 2v, in data handling system 3, occur carrying out two algorithm process that cause determining Z and Z ', so that Z ← F (X, Y) and Z ' ← (X ', Y ').
The explanation of Figure 63 example is according to the example of the realization of the method for the present invention of handling two selected among Figure 62 algorithm process at unit 6 medium-long ranges.According to this example, in data handling system 3, carry out during the first operating part 2pes of protected software 2p, and when having unit 6, as mentioned above, basic command CFE occurs carrying out corresponding to determining Z
1To CFE
NWith the basic command CFE that carries out corresponding to definite Z '
1' to CFE
M'.As shown, because insert basic command CFE
1' to CFE
M' and other partial codes, carry out basic command CFE discontinuously
1To CFE
NIn this example, thereby carry out following order, CFE
1, part inserts sign indicating number, CFE
1', CFE
2, part inserts sign indicating number, CFE
2', CFE
3', part inserts sign indicating number, CFE
4', CFE
3, CFE
4..., CFE
N, CFE '
M
It should be noted that during carrying out protected software 2p, and when having unit 6, when being included in basic command in the part of the first operating part 2pes of protected software 2p at every turn and utilizing it, 6 carry out corresponding basic function in the unit.Therefore, appear at when having unit 6, correctly carry out described part, therefore, protected software 2p works fully.
The explanation of Figure 64 example is carried out the example of the trial of protected software 2p when lacking unit 6.In this example; in data handling system 3, carry out during the first operating part 2pes of protected software 2p, at each constantly, carry out basic command and can not trigger the corresponding basic function of execution; because lack unit 6, therefore correctly determine to be assigned to the value of variable Z.
Therefore; appear at when lacking unit 6, can not correctly fulfil at least one request that the basic function in a part of trigger element 6 of the part first operating part 2pes of protected software 2p is carried out, so that carry out described at least part improperly; therefore, protected software 2p not exclusively works.
According to another advantageous feature of the present invention, guard method will be carried out its description with reference to Figure 70 to 74 at the protection philosophy of realizing being called " detecting and pressure ".
For realizing protection philosophy by detection and pressure, definition:
● at least one software that is subject to monitor to small part in unit 6 is carried out characteristic,
● carry out at least one criterion that characteristic is observed by at least one software,
● the detection module of realizing in unit 6 17 and at least one software that allows detection not observe at least one correlation criterion are carried out characteristic,
● and the pressure module 18 that realizes in unit 6 also allows when not observing at least one criterion the execution of notification data disposal system 3 and/or modification software.
For by detecting and force to realize protection philosophy, also constitute to allow blank cell 60 is converted to the module of utilizing of the unit 6 realizing detection module 17 at least and force module 18.
The explanation of Figure 70 example realizes the module that this protection philosophy is required by detecting and forcing.Unit 6 comprises the detection module 17 that belongs to processing module 16 and forces module 18.Force module 18 not observe criterion by detection module 17 notices.
Or rather, detection module 17 uses from delivery module 13 and/or from memory module 15 and/or from the information of processing module 16, carries out characteristic so that monitor one or several software.Each software is carried out characteristic, at least one criterion that will observe is set.
Detecting at least one software execution characteristic in accordance with at least one criterion, detection module 17 is forced module 18 with this notice.Also adopt described pressure module 18 to revise the state of unit 6 with suitable mode.
For realizing protection philosophy, also select by detection and pressure:
● at least one software is carried out characteristic, carries out characteristic so that monitor the software that is subject to monitor,
● carry out at least one criterion that characteristic is observed at least one selected software,
● in the source of leaky software 2vs, will monitor at least one algorithm process of its at least one software execution characteristic,
● and in the source of leaky software 2vs, at least one part comprises at least one selected algorithm and handles.
Revise at least one selected part in the source of leaky software 2vs then, so that obtain the source of protected software 2ps.This modification is during carrying out protected software 2p, wherein:
● at least one part of the first operating part 2pes of execution is considered and will be carried out characteristic at least partially at least one the selected software that monitors in the unit 6 in data handling system 3,
● and the second operating part 2peu that carries out in unit 6 is to the selected software execution characteristic of small part supervision.
Carry out by detect and protected software 2p that compulsory this protection philosophy is protected during, and when having unit 6:
● as long as partly all of all modifications of observing corresponding to protected software 2p are monitored all criterions of carrying out characteristic, the described modification part of protected software 2p is worked, so that described protected software 2p is worked,
If ● and do not observe at least one criterion of carrying out characteristic that monitored, it is informed data handling system 3 and/or revise part functional of protected software 2p, so that revise the function of protected software 2p corresponding to protected software 2p part.
Certainly, when lacking unit 6, the part that can not correctly fulfil the first operating part 2pes of protected software 2p is used at least one request of unit 6, so that carry out at least one described part improperly, therefore, protected software 2p not exclusively works.
For realizing protection philosophy, preferably use two kinds of softwares to carry out characteristic by detecting and forcing.
First kind of software is carried out characteristic variable and second kind of profile that uses corresponding to software corresponding to the tolerance of software execution.Can independence or be used in combination described two specific characters.
For the variable that uses the tolerance that software carries out as carrying out characteristic, by detecting and force to realize protection philosophy, definition:
● in memory module 15, storage is used for quantizing the probability of at least one variable of tolerance of at least one functional use of software,
● in detection module 17, monitor the probability of at least one threshold value relevant with the variable of each tolerance,
● and, allow the implementation module of the variable of each tolerance of renewal according to each functional use relevant with it.
Except that detection module 17 and pressure module 18, also constitute the module of utilizing that realizes carrying out module.
In the source of leaky software 2vs, also select:
● at least one of leaky software 2v is functional, uses the variable of tolerance, easily monitors its use,
● be used for quantizing the variable of at least one tolerance of described functional use,
● with at least one relevant threshold value of variable corresponding to the tolerance of the restriction of described functional use,
● and according to described functional use, at least a method of the renewal of the variable of tolerance.
Revise the source of leaky software 2vs then, so that obtain the source of protected software 2ps, this change is during carrying out protected software 2p, and second carries out 2peu:
● according to described functional use, realize the variable of tolerance,
● and consider that at least one threshold value crosses.
In other words; during carrying out protected software 2p; according to described functional use; upgrade the variable of tolerance; and when crossing threshold value; detection module 17 notices force module 18 to make the processing that suitable decision comes notification data disposal system 3 and/or modification to be carried out by processing module 16, and the function of the part of protected software 2p is revised in processing module 16 permissions, so that revise the function of protected software 2p.
For by detecting and forcing, use the variable of measuring as characteristic, realize the first preferred different embodiment of protection philosophy, definition:
● several dependent thresholds of at least one variable that is used to measure,
● and corresponding to the different pressure module of each described threshold value.
In the source of leaky software 2vs, also select:
● be used for quantizing at least one functional use of software and must be at least one variable corresponding to the tolerance of relevant several threshold values of the difference of described functional use restriction,
● and with tolerance at least two relevant threshold values of variable.
Revise the source of leaky software 2vs then so that obtain the source of protected software 2ps, this modification can make protected software 2p the term of execution, the second operating part 2peu:
● according to described functional use, realize the variable of tolerance,
● and differently consider crossing of each threshold value.
In other words, usually, during carrying out protected software 2p, when crossing first threshold, the unit protected software 2p of 6 notification data disposal systems, 3 orders does not re-use described functional.If it is described functional that protected software 2p continues to use, may cross second threshold value.Under the situation of crossing second threshold value, it is selected functional invalid and/or make protected software 2p invalid to force module 18 to make.
For passing through to use of detection and the pressure of the variable of tolerance as characteristic; realize the second preferred different embodiment of protection philosophy; the definition permission is by at least one other use, and trust (credit) is adorned module by the benefit of at least one software functionality that the variable of measuring monitors.
Except that detection module 17, pressure module 18 and implementation module, also structure realizes mending the module of utilizing of adorning module.
In the source of leaky software 2vs, also select to be used for restricted software at least one functional use and must be by at least one other use, at least one variable of the tolerance that can be trusted.
Revise the source of leaky software 2vs then, so that obtain the source of protected software 2ps, this modification is during calling supplemental stages, can trust at least one functional at least one the other use corresponding to the variable of selected tolerance.
During supplemental stages, carry out at least one selected variable of tolerance and/or the realization again of at least one dependent thresholds, so that allow at least one other use of function corresponding.In other words, during supplemental stages, can trust at least one functional other use of protected software 2p.
For the profile by using the software utilization as the detection of characteristic with force to realize protection philosophy, the criterion of at least one characterizing definition that software is carried out for observing for the profile of described utilization.
In the source of leaky software 2vs, also select:
● at least one utilizes profile to monitor,
● and at least one selected at least one execution feature of utilizing profile to observe.
Then, change the source of leaky software 2vs, so that obtain the source of protected software 2ps, this modification is during carrying out protected software 2p, and the second operating part 2peu observes selected execution feature.In other words, under situation of not observing at least one execution feature, unit 6 itself monitors mode and the energy notification data disposal system 3 that the second operating part 2peu carry out and/or revises the function of protected software 2p.
During the protected software 2p that carries out by this principle protection, when having unit 6:
● need only all execution features of the part of crossing in accordance with all modifications of protected software 2p, work to the part nominal of the described modification of protected software 2p, consequently work to described protected software 2p nominal,
● and if at least one of a part of not observing protected software 2p carry out feature, notification data disposal system 3 and/or revise this part the function of protected software 2p, so that revise the function of protected software 2p.
Can consider the different features of carrying out of supervision, for example monitor to exist the instruction or the supervision that comprise mark to be used for the execution link that at least a portion is instructed.
For being used as the detection of the execution feature of observing and forcing to realize protection philosophy, definition by the execution link that supervision is used at least a portion instruction:
● instruction set, its instruction are easy to carry out in unit 6,
● be used for the designated command collection of described instruction set, described designated command is easily carried out in data handling system 3.In data handling system 3, carry out each designated command, trigger and in unit 6, carry out corresponding instruction,
● allow to detect and instruct the detection module 17 that links not corresponding to one that expects,
● and when instruction link during, allow notification data disposal system 3 and/or revise the pressure module 18 of the execution of software not corresponding to of expection.
Also structure allow unit 6 also execute instruction collection instruction utilize module, carry out described instruction and be triggered by execution command order in data handling system 3.
Also in leaky software 2vs, select must be in the unit 6 medium-long ranges handle and with at least one algorithm process of the link of at least a portion of monitor command.
Revise the source of leaky software 2vs then, so that obtain the source of protected software 2ps, this modification is during carrying out protected software 2p:
● the second operating part 2peu carries out the functional of selected algorithm process at least,
● selected algorithm process is divided into a plurality of instructions,
● in designating unit 6 they the term of execution, the link that at least some instructions must be observed,
● and the first operating part 2pes of protected software 2p carries out the designated command that triggers execution command in unit 6.
During the protected software 2p that carries out by this principle protection, when having unit 6:
● the instruction that needs only all modifications part of the protected software 2p that carries out in unit 6 links corresponding to one that expects, works to the modification part nominal of described protected software 2p, consequently work to protected software 2p nominal,
If ● and the instruction of the part of the protected software 2p that carries out in unit 6 link is not corresponding to one that expects, with its function of informing data handling system 3 and/or revising the part of protected software 2p, so that revise the function of protected software 2p.
The explanation of Figure 71 example uses the execution link that monitors at least a portion instruction as the execution feature of observing under the situation of observing the expection link, by detecting and forcing, realizes the example of protection philosophy.
The first operating part 2pes of the protected software 2p that carries out in data handling system 3 carries out to trigger and carry out the instruction i that belongs to instruction set in unit 6
iDesignated command CI
iIn described instruction set, the part that the part expection that each of at least some instructions comprises functional part of defined instruction and allows verification to be used to execute instruction links.In this example, with TRIG (i
i) the order CI of presentation directives
i, and the expection that is used to execute instruction is linked as i
n, i
N+1And i
N+2I executes instruction in the unit 6
nProvide a and execution command i as a result
N+1Provide b as a result.Instruction i
N+2Be used as operand, instruction i
nAnd i
N+1A as a result and b and execution thereof provide c as a result.
Consider the described instruction link of carrying out corresponding to one that expects in unit 6, it causes the function of the normal or nominal of protected software 2p.
The explanation of Figure 72 example is used as the execution feature of observing with the execution link that monitors at least a portion of these instructions under situation about not linking in accordance with expection, by detecting and pressure, realize the example of protection philosophy.
According to this example, the expection link that is used to execute instruction still is i
n, i
N+1And i
N+2Yet, by using instruction i
n' replacement instruction i
n, revise to carry out link, so as actual carry out be linked as i
n', i
N+1And i
N+2Execution command in ' provides a as a result, promptly with execution command i
nIdentical result.Yet, at the latest at execution command i
N+2During this time, detection module 17 detects instruction i
n' not corresponding to generating as instruction i
N+2The expecting instruction of a as a result of operation.Detection module 17 is informed it and is forced module 18, thus modify instruction i
N+2Function so that the execution command i
N+2Provide the c ' as a result that can be different from c.Certainly, if execution command i
n' provide be different from the instruction i
nThe a ' as a result of a as a result, instruct i obviously
N+2The result also be different from c.
Because therefore the execution of the instruction of carrying out in unit 6 link, can obtain the improvement of the function of protected software 2p not corresponding to one of expection.
The execution feature that the execution link effect of at least a portion of monitor command is observed in Figure 73 and the explanation of 74 examples is by detecting and the preferred different embodiment that force to realize protection philosophy.According to these preferred different embodiment, the defined instruction collection, its at least some instructions are worked with register and for return results, are used at least one operand.
Shown in Figure 73, at least some instructions that definition is worked with register, the part PE of functional part RF of defined instruction and the expection that definition is used to execute instruction link.Part PF is corresponding to operational code known to the skilled.Part PE definition expection link comprises corresponding to following bit field:
● the identification field of instruction CII,
● and each operand k that is used to instruct, wherein k is from 1 to K, and K instruction operands:
-attribute field CD
k, represent whether it is suitable for verification operation and counts the initial of K,
-and the expection identification field CIP of operand
k, represent that generating run counts the expection sign of instruction of the content of k.
Shown in Figure 74, instruction set comprises V the register that belongs to processing module 16, and each register is called R
v, wherein v from 1 to V.To each register R
v, define two fields, that is:
● function field CF known to the skilled
v, and the result who allows storage instruction to carry out,
● and the identification field CIG that is generated
v, allow to store systematic function field CF
vThe sign of instruction of content.By systematic function field CF
vThe content of identification field of instruction CII, upgrade the identification field CIG of described generation automatically
vDescribed generation identification field CIG
vCan not access, can not be by any modifying of order, and only be used for detection module 17.
During executing instruction, to each operand k, detection module 17 is carried out following operation:
● read attribute field CD
k,
If ● attribute field CD
kUtilize it, read expection identification field CIP simultaneously corresponding to the register that uses by operand k
kWith the identification field CIG that is generated
v,
● check two field CIP
kAnd CIG
vEquation,
● and if equation is false, and detection module 17 is thought the execution link of observing instruction.
When detection module 17 has informed that they do not observe the instruction link, force module 18 to allow the modify instruction result.The funtion part RF of the funtion part PF of the instruction by revising current execution or instruction thereafter carries out preferred embodiment.
According to another advantageous feature of the present invention, guard method will be described with reference to Figure 80 to 85 at the protection philosophy of realizing being called " rename ".
For realizing protection philosophy by rename, definition:
● one group of related function (dependent function), by the second operating part 2peu, be easy in unit 6, carry out its related function, and can transmit data in data handling system 3 and 6 of unit, described related function energy collecting is limited or unlimited,
● be used for one group of trigger command of described related function, described trigger command is easy to carry out in data handling system 3 and trigger in unit 6 and carry out corresponding related function,
● to each trigger command, order (order) to small part corresponding to the information that is sent to the second operating part 2peu by the first operating part 2pes so that trigger to carry out corresponding related function, described order has the form of at least one argument of trigger command,
● be designed in the rename method of revising the order that uses during the leaky software 2v, this method allows these order of rename so that obtain the trigger command that the identity of corresponding related function is cancelled in permission by the rename order,
● and be designed to during operational phase, be used in the recovery module 20 in the unit 6 and allow order by rename, recover initial order, so that recover to carry out related function.
For realize protection philosophy by rename, also structure allows blank cell 60 is converted to the module of utilizing of the unit 6 of realizing recovering module 20 at least.
For realizing protection philosophy, in leaky software 2vs, also select by rename:
● use at least one operand and return at least one algorithm process of at least one result,
● and the source that comprises the leaky software 2vs of at least a portion of at least one selected algorithm processing.
Revise the source of leaky software 2vs then, thereby obtain the source of protected software 2ps.This modification is, wherein:
● during carrying out protected software 2p, at least a portion first operating part 2pes that carries out in data handling system 3 considers to carry out the functional of at least one selected algorithm processing in unit 6,
● during carrying out protected software 2p, the second operating part 2peu that carries out in unit 6 carries out the functional of at least one selected algorithm processing at least,
● separately each selected algorithm process by the second operating part 2peu, is used related function so that during carrying out protected software 2p, carries out each selected algorithm process.Best, the algorithm process that each is selected is divided into related function fd
n(wherein n from 1 to N), that is:
-one or several related function that one or several operand is set uses for unit 6,
-related function, some related functions use operands also to use described operand, in conjunction with carrying out the functional of the algorithm process selected,
-and may, allowing by unit 6, one or several related function that the result of selected algorithm process is set is transferred to data handling system 3 uses,
● during carrying out protected software 2p, the second operating part 2peu carries out related function fd
n,
● during carrying out protected software 2p, by triggering related function with rename order trigger command,
● in the ordered set that allows the protected software 2p of execution, select the order of trigger command.
In data handling system 3, carry out the first operating part 2pes of protected software 2p by the rename order being sent to the heavy command order of unit 6; carry out trigger command; and by recovering module 20; in unit 6, trigger and recover order, carry out each related function fd by the second operating part 2peu then in preceding definition
n
In other words; order by the rename trigger command; execution is by the protection philosophy of rename; so that trigger command by the rename of execution in data handling system 3; in unit 6, trigger and carry out by unnamed order; the related function that triggers by trigger command, yet, the protection function 2p of the characteristic that allows to determine performed related function do not checked.
The example of leaky function 2v is carried out in the explanation of Figure 80 example.In this example, in data handling system 3, carry out during the leaky software 2V, some occur constantly corresponding to will be with function F and use the result of the algorithm process that operand X and Y represent distribute to variable Z calculating Z ← F (X, Y).
Figure 81 and 82 examples illustrate the example of realization of the present invention.
Figure 81 example illustrates local implementation of the present invention.In this example, in data handling system 3, carry out during the first operating part 2pes of protected software 2p, and when having unit 6, occur:
● at moment t
1, t
2, carry out trigger command CD
1, CD
2, it triggers in unit 6, by the second operating part 2peu, carries out to provide that data X, Y are sent to the memory block x of the memory module 15 that is arranged in unit 6, the corresponding related function fd of y respectively from data handling system 3
1, fd
2, described trigger command CD
1, CD
2Use respectively OUT (x, X) and OUT (y, Y) expression,
● at moment t
3To t
N-1, carry out trigger command CD
3To CD
N-1, it triggers in unit 6, by the second operating part 2peu, carries out corresponding related function fd
3To fd
N-1, described trigger command CD
3To CD
N-1Use TRIG (fd respectively
3) to TRIG (fd
N-1) expression.In conjunction with the related function fd that carries out
3To fd
N-1Sequence on algorithm, be equivalent to function F.Be, carry out described trigger command and cause in unit 6 carrying out and use memory block x that the content of y also turns back to the result related function fd of the memory block z of unit 6 more accurately
3To fd
N-1,
● and at moment t
N, carry out trigger command CD
N, it triggers in unit 6, by the second operating part 2peu, the result provide being included in the algorithm process among the memory block z of unit 6 is provided is sent to data handling system 3, so that it is distributed to the related function fd of variable Z
N, described order is represented with IN (z).
In this example,, first argument of trigger command OUT and the argument of trigger command TRIG and IN are chosen as order for realizing the present invention fully.Use the rename method of order, the order that rename is selected in this way.In this way, rename trigger command CD
1To CD
NOrder, that is, and x, y, fd
3, fd
N-1, z is so that obtain R (x), R (y), R (fd respectively
3) ..., R (fd
N-1), R (z).
Figure 82 example illustrates whole realization of the present invention.In this example, in data handling system 3, carry out during the first operating part 2pes of protected software 2p, and when having unit 6, occur:
● at moment t
1, t
2, by rename order CDCR
1, CDCR
2Carry out trigger command, rename order R (x), R (y) are sent to unit 6, in unit 6, trigger by recovering module 20 and recover the rename order, promptly so that recover order, memory block x, the identity of y then, provides data X by second operating part 2peu execution, Y is sent to the memory block x of the memory module 15 that is arranged in unit 6, the corresponding related function fd of y respectively from data handling system 3
1, fd
2, have rename order CDCR
1, CDCR
2Described trigger command use respectively OUT (R (x), X), OUT (R (y), Y) expression.
● at moment t
3To t
N-1, by rename order CDCR
3To CDCRN-1, carry out trigger command, with rename order R (fd
3) to R (fd
N-1) be sent to unit 6, in unit 6, trigger by recovering module 20 and recover order, that is, and fd
3To fd
N-1, then,, carry out related function fd by the second operating part 2peu
3To fd
N-1, have rename order CDCR
3To CDCR
N-1Described trigger command use TRIG (R (fd respectively
3)) to TRIG (R (fd
N-1)) expression,
● at moment t
N-1, by rename order CDCR
NCarry out trigger command, rename order R (z) is sent to unit 6, in unit 6, trigger by recovering module 20 and recover order, be the characteristic of memory block z, carrying out by the second operating part 2peu then provides the result who will be included in the algorithm process among the memory block z of unit 6 to be sent to the related function fd of data handling system 3
N,, have rename order CDCR so that it is distributed to variable Z
NDescribed trigger command with IN (R (z)) expression.
In an example shown, carry out trigger command continuously with rename order 1 to N.It should be noted that and can produce two kinds of improvement:
● first improves the situation that relates to unit 6 teleprocessing several algorithms processing and used the result of an algorithm process at least by another algorithm process.In this case, can remove some trigger commands with the rename order that is used to transmit.
● second improves at allowing to carry out in the ordered set of protected software 2p, and selection has the associated order of the trigger command of rename order.At this on the one hand, preferably, select the temporary transient order that breaks away from the trigger command of carrying out related function with rename order by between them, being inserted in the code section of carrying out in the data handling system 3 and comprising or do not comprise trigger command with the rename order that is used for definite other data.Figure 83 and 84 examples illustrate the principle of this embodiment.
Figure 83 represents to carry out the example of leaky software 2p.In this example, during carrying out leaky software 2p, appear at and carry out two algorithm process that cause determining Z and Z ' in the data handling system 3, such as Z ← F (X, Y) and Z ' ← F ' (X ', Y ').
The example of the realization of the method according to this invention of two selected algorithm process among Figure 84 example explanation unit 6 teleprocessing Figure 83.According to this example, in data handling system 3, carry out during the first operating part 2pes of protected software 2p and when having unit 6, as mentioned above, carry out corresponding to determining that Z's has a rename order CDCR
1To CDCR
NTrigger command and carry out corresponding to determining that Z's ' has a rename order CDCR
1' and CDNR
M' trigger command.As shown in the figure, execution has rename order CDCR discontinuously
1To CDCR
NTrigger command have rename order CDCR because inserted
1' to CDCR
M' trigger command and other code sections.In this example, thereby carry out following order, CDCR
1, insert code section, CDCR
1', CDCR
2, insert code section, CDCR
2', CDCR
3', insert code section, CDCR
4', CDCR
3, CDCR
4..., CDCR
N, CDCR '
M
It should be noted that; during the part of the first operating part 2pes that carries out protected software 2p; the trigger command of carrying out in data handling system 3 with rename order triggers the characteristic of recovering corresponding related function in unit 6, and their execution then.Therefore, when having unit 6, occur correctly carrying out described part, therefore, protected software 2p works fully.
The explanation of Figure 85 example is carried out the example of the trial of protected software 2p when lacking unit 6.In this example; in data handling system 3, carry out during the first operating part 2pes of protected software 2p; because lack unit 6, at each constantly, carry out trigger command and can not trigger and recover order and can not carry out corresponding related function with rename order.Therefore, can not correctly determine to distribute to the value of variable Z.
Therefore; appear at when lacking unit 6; the part that can not correctly fulfil the first operating part 2pes of protected software 2p triggers at least one request that recovers order and carry out related function in unit 6; so that can not correctly carry out described part at least; therefore, protected software 2p not exclusively works.
Because by this protection philosophy of rename, the characteristic of the related function that must carry out is can not determine in the inspection in the protected software 2p of the trigger command with rename order in unit 6.It should be noted that during the leaky software 2v of modification becomes protected software 2p the rename of execution order.
According to a modification of the protection philosophy by rename, definition is used for equivalence on the algorithm of at least one related function but gang's related function of being triggered by the different trigger commands with rename order.According to this modification, to using at least one algorithm process of related function, described algorithm process is divided into a plurality of related functions, wherein at least one in them uses the related function with gang to replace, rather than keeps occurring several times same functions.For this reason, revise trigger command so that consider to use related function to replace related function with gang with rename order.In other words, have different order, therefore, have the different trigger commands of rename order with two related functions of gang, and by checking that protected software 2p finds that the equivalence on algorithm of said related function is impossible.
According to one of the protection philosophy by the rename first different preferred embodiment; on the information that the noise field is connected to the funtion part that defines related function, at least one related function defines the related function of equivalence on gang's algorithm so that carry out in unit 6.
According to one of the protection philosophy by the rename second different preferred embodiment,, be gang's related function of equivalence at least one related function definition algorithm by using identification field.
According to preferred one different embodiment of the protection philosophy by rename, will allow to encrypt order so that the encryption method that they are transformed into the rename order is defined as the method for rename order.Remember rename at protection stage P execution order.To this advantageous variant, recovering module 20 is to realize allowing deciphering rename order, thereby recovers the identity of related function so that the module of the decryption method of carrying out in unit 6.In unit 6, realize described recovery module, and can be software or hardware attributes.Require described recovery module during operational phase U, for triggering in unit 6, the each execution in data handling system 3 when having the trigger command of rename order carried out related function.
According to another advantageous feature of the present invention, guard method at realize being called " conditional branching " and protection philosophy, will describe with reference to Figure 90 to 92.
For realizing protection philosophy, in the source of leaky software 2vs, select at least one conditional branching BC by conditional branching.Also select to comprise at least a portion in source of the leaky software 2vs of at least one selected conditional branching BC.
Revise at least one selected part in the source of leaky software 2vs then, so that obtain the source of protected software 2ps.This modification is during carrying out protected software 2p, wherein:
● at least one part of the first operating part 2pes, it is carried out in data handling system, and consider and in unit 6, carry out the functional of at least one selected conditional branching BC,
● and the second operating part 2peu, it is carried out in unit 6, and an information carrying out the functional of at least one selected conditional branching BC at least and will allow the first operating part 2peu to continue its execution at selected point is transferred to data handling system 3 and freely handled.
The first operating part 2pes executive condition branch order of the protected software 2p that carries out in data handling system 3, it triggers in unit 6 by the second operating part 2peu and carries out its functional functional teleprocessing conditional branching bc that is equivalent to selected conditional branching BC.
The example of leaky software 2v is carried out in the explanation of Figure 90 example.In this example, in data handling system 3, carry out during the leaky software 2v, at some constantly, appearance promptly, may be put B for three to the point that leaky software 2v represents to continue its execution
1, B
2Or B
3In one conditional branching BC.It must be understood that conditional branching BC adopts at a B
1, B
2Or B
3Continue the decision of executive software.
The example corresponding to the realization of the present invention of the selected conditional branching of conditional branching BC of Figure 91 example explanation unit 6 teleprocessing.In this example, when in data handling system 3, carrying out the first operating part 2pes of protected software 2p and having unit 6, occur:
● at moment t
1, the order CBC of executive condition branch
1, it triggers in unit 6 by being equivalent to the teleprocessing conditional branching bc of conditional branching BC, described conditional branching order CBC on the second operating part 2peu execution algorithm
1With TRIG (bc) expression,
● and at moment t
2,, promptly put B with allowing the first operating part 2pes at selected point
1, B
2Or B
3The information that continues its execution 6 is sent to data handling system 3 from the unit.
It should be noted that during the part of the first operating part 2pes that carries out protected software 2p, the conditional branching command triggers of carrying out is carried out respective remote treatment conditions branch in unit 6 in data handling system 3.Therefore, appear at when having unit 6, correctly carry out described part, therefore, protected software 2p works fully.
The explanation of Figure 92 example is carried out the example of the trial of protected software 2p when lacking unit 6.In this example, in data handling system 3, carry out during the first operating part 2pes of protected software 2p:
● at moment t
1, consider when lacking unit 6 the order CBC of executive condition branch
1Can not trigger and carry out teleprocessing conditional branching bc,
● and at moment t
2, consider when lacking unit 6, transmit this segment information that allows the first operating part 2pes to carry out at selected point.
Therefore; appear at when lacking unit 6; the part that can not correctly fulfil the first operating part 2pes triggers at least one request of carrying out the teleprocessing conditional branching in unit 6, so that carries out described at least part improperly, thereby protected software not exclusively works.
In the previous description relevant with Figure 90 to 92, theme of the present invention is the 6 medium-long range treatment conditions branches in the unit.Certainly, by in the unit 6 medium-long ranges handle functional a series of conditional branchings that its overall function is equivalent to all conditions branch of teleprocessing, carry out the preferred embodiments of the present invention.The all functionality of carrying out described teleprocessing conditional branching sequence causes being provided with the first operating part 2pes that allows protected software 2p and continues a segment information of its execution at Chosen Point by data handling system 3 uses.
Reference Figure 40 to 92 in preceding description, six different software protection principles have irrespectively clearly been described each other.By using the protection philosophy that decomposes by interim, may realize according to guard method of the present invention in conjunction with one or several other protection philosophy.Under situation about realizing by at least one another protection philosophy of realization by the interim protection philosophy that decomposes; protection philosophy by variable and/or the protection philosophy by basic function and/or the protection philosophy by conditional branching have advantageously replenished the protection philosophy that decomposes by interim.
And when the protection philosophy also realized by variable, take turns to successively by the protection philosophy of basic function and/or by the protection philosophy of conditional branching and realize it.
And when the protection philosophy also realized by basic function, take turns to successively by detect and the protection philosophy realization of the protection philosophy of involuntary conversion and/or the protection philosophy by rename and/or the condition of passing through it.
And when also realizing by detecting and during the protection philosophy of involuntary conversion, take turns to successively protection philosophy by rename and/or the protection philosophy realization by conditional branching it.
And when the protection philosophy also realized by rename, take turns to successively by the protection philosophy of conditional branching and realize it.
According to preferred one different embodiment, replenish, replenish, replenish, replenish, replenish by protection philosophy and pass through the interim protection philosophy that decomposes by conditional branching by protection philosophy by rename by protection philosophy by detection and involuntary conversion by protection philosophy by basic function by the protection philosophy that passes through variable.
Using protection philosophy, replenish under the situation by the interim protection philosophy that decomposes, consider that its combination realizes that it must comprise following improvement in the explanation of preceding finishing:
● must be with the conceptual understanding of leaky software and to the leaky software of the protection philosophy of just describing.Therefore, protection philosophy is being applied under the situation of leaky software, the reader must be interpreted as wording " leaky software " wording " software of the protection philosophy protection that is subjected to have used ";
● the software of the protection philosophy protection just described of the conceptual understanding of protected software must being served as reasons.Therefore, under the situation of using protection philosophy, the reader must be interpreted as wording " protected software " wording " the protected software of redaction ";
● and the selection of doing for the protection philosophy of realizing just describing must be thought of as the selection that protection philosophy that realization used is done.
Remaining description allows to understand better the realization according to guard method of the present invention.Represent more accurately that as Figure 100 this guard method according to the present invention is made up of following:
● at first, protection stage P during it, revises leaky software becoming protected software 2p,
● secondly, operational phase U during it, uses protected software 2p.
During this stage U:
-when having unit 6, when the part of each first operating part 2pes that carries out is utilized it, in unit 6, carry out utilized functional in data handling system 3, so that correctly carry out described part, therefore, protected software 2p works fully,
-lacking unit 6, functional although the part request of the first operating part 2pes is carried out in unit 6, can not correctly fulfil described request, so that carry out described at least part improperly, thereby protected software 2p not exclusively works,
● and possible supplemental stages R, during it, the variable of measuring is used as characteristic, trust functional at least one other use of protecting by the second advantageous variant embodiment that realizes detection and compulsory protection philosophy.
Protection stage P can be divided into two protection sub P
1And P
2Be called at preceding protection sub P
1Phase one and the leaky software 2v of protection irrespectively take place.Be called protection sub P thereafter
2Subordinate phase P
2Relevant with the leaky software 2v of protection.It should be noted that by two different people or two different modes, can advantageously carry out at preceding protection sub P
1With next protection sub P
2For example, carry out at preceding protection sub P by people that the security system for software exploitation is provided or company
1, and carry out next protection sub P by people that claimed software development is provided or company
2Certainly, also can carry out at preceding protection sub P by same person or team
1With next protection sub P
2Be obviously.
At preceding protection sub P
1By different task that is used for to carry out or several grades of S of work
11...., S
1iForm.
This is at preceding protection sub P
1The first order be called " definition level a S
11", at this definition level S
11:
● select:
The type of-unit 6, as illustrative example, chip card reader 8 can be chosen as unit 6 with the chip card 7 relevant with reader,
-and be designed to the delivery module 12,13 of realization in data handling system 3 and unit 6 respectively, during operational phase U, can be provided at 6 of data handling system 3 and unit and transmit data,
● and when guard method according to the present invention realizes passing through the protection philosophy of basic function, also definition:
-basic function collection, its basic function are easy to carry out in unit 6,
-and the basic command collection that is used for described basic function collection, described basic command is easy to carry out in data handling system 3, and triggers in unit 6 and carry out basic function,
● and when guard method according to the present invention realizes by detection and compulsory protection philosophy, also definition:
-at least one software is carried out characteristic, is easy in unit 6, be monitored to small part,
-at least one software is carried out at least one criterion that characteristic is observed,
The detection module 17 of-realization in unit 6 allows to detect at least one software and carries out characteristic in accordance with at least one correlation criterion,
-and the pressure module 18 that realizes in unit 6 when not observing at least at least one criterion, allows notification data disposal system 3 and/or revises executive software,
● and at the variable of the tolerance of using software to carry out as characteristic, realize by detecting and forcing to realize under the situation of protection philosophy according to guard method according to the present invention, also will:
The variable-definition of the tolerance of functional use of-software is that the software that easily monitors is carried out characteristic,
-at least one threshold value relevant with the variable of each tolerance is defined as the criterion of observing,
-and define the implementation module that the variable of at least one tolerance is upgraded in permission,
● and the variable of also realizing using the tolerance that software carries out in guard method according to the present invention is as characteristic, by detect and the situation of the first preferred different embodiment of compulsory protection philosophy under, also define:
-be used for several dependent thresholds of the variable of at least one tolerance,
-and force module corresponding to the difference of each described threshold value,
● and the variable of tolerance of also realizing using executive software in guard method according to the present invention is as characteristic; by detect and the situation of the second preferred different embodiment of compulsory protection philosophy under; also definition allows the use that at least one is other to be increased to by the benefit dress module at least one software functionality of the variable supervision of measuring
● and the profile of also realizing using the software utilization factor in guard method according to the present invention also will under the situation of protection philosophy by detecting and forcing to realize as characteristic
The profile that-software uses is defined as the software that is subject to monitor and carries out characteristic,
The criterion of at least one characterizing definition that-software is carried out for observing,
● and the supervision that also realizes carrying out link in guard method according to the present invention is as the execution feature that will observe, by detecting and forcing to realize under the situation of protection philosophy, also:
The instruction set that its instruction of-definition is easily carried out in unit 6,
-definition is used for the designated command collection of described instruction set, and described designated command is easily carried out in data handling system 3, and triggers execution command in unit 6,
-these instructions are linked the profile that is defined as use,
-expection the link definition that will be used to execute instruction is for carrying out characteristic,
-will to allow to detect the module definition that instruction connects not corresponding to the instruction link of one of expection be detection module 17,
-and when instruction link during not corresponding to one of expection, the module definition of functional (functionality) of part that allows notification data disposal system 3 and/or revise protected software 2p is for forcing module 18,
● and in guard method according to the present invention with the execution that monitored link as the execution feature that will observe, by detecting and when forcing to realize an advantageous variant embodiment of protection philosophy, also:
-at least some instructions are worked with register and for return results, are used the instruction set of at least one operand to be defined as instruction set with it,
-at least some instructions to working with register:
And definition is used to execute instruction and comprises the part of the expection link of bit field, described bit field corresponding to:
The identification field of ◇ instruction CII
◇ and each operand of being used to instruct:
* attribute field CD
k,
* and the expection identification field CIP of operand
k,
-to belonging to each register that utilizes module and use, the identification field CIG that definition generates by instruction set
v, the sign that wherein will return last instruction of its result is stored in the described register automatically,
-will allow to be used between the order period of each operand, as attribute field CD in execution
kWhen using it, check the identification field CIG that is generated corresponding to the register that uses by described operand
vEquation, and the initial expection identification field CIP of described operand
kModule definition be detection module 17,
If at least one of-equation that will be checked is for false, the module definition that allows the modify instruction result is for forcing module.
● and when guard method according to the present invention realizes protection philosophy by rename, also will
-basic command or designated command are defined as trigger command,
-basic function or instruction given a definition is related function,
-will be used for being defined as an order corresponding at least one argument of the trigger command of the information that is sent to unit 6 by data handling system 3 to small part, carry out corresponding related function so that trigger,
-definition allows the rename order so that obtain to have the method for rename order of the trigger command of rename order,
-and definition be designed to during operational phase U, be used in the unit 6 and allow to recover the recovery module 20 of related function to carry out with the rename order,
● and realize in guard method according to the present invention under the different situation of the protection philosophy by rename that also definition is used for equivalence on the algorithm of at least one related function, but by gang's related function of the different trigger command triggering of its rename order,
● and realize in guard method according to the present invention under one the situation of a different preferred embodiment of the protection philosophy by rename that also definition is used for equivalent gang's related function on the algorithm of at least one related function:
-by on the information of funtion part that the noise field is connected to the definition related function so that in unit 6, carry out,
-or by the identification field of use instruction CII and the expection identification field CIP of operand
k
● and realize by rename in guard method according to the present invention under the preferred one different situation of protection philosophy, also will:
-the encryption method that will encrypt order is defined as the rename method of order,
-and will realize deciphering rename order, thus the module definition of the decryption method of the identity of the related function that recovery will be carried out in unit 6 is for recovering module 20.
At preceding protection sub P
1During this time, definition level S
11Afterwards for being called " structure level S
12" level.At this one-level S
12During this time, structure delivery module 12,13 and possibility are corresponding to a definition level S
11Definition utilize module.
At this structure level S
12During this time, therefore, carry out:
● structure delivery module 12,13, allow during operational phase U, between data handling system 3 and unit 6, to transmit data,
● and when the protection philosophy realized by basic function, the basic function that is configured to allow unit 6 during operational phase U, to carry out the basic function collection utilize module,
● and when also realizing by detection and compulsory protection philosophy, structure:
-allow unit 6 during operational phase U, also to realize the module of utilizing of detection module 17 and pressure module 18,
-and may, allow unit 6 during operational phase U, also to realize and realize carrying out the module of utilizing of module,
-and may, allow unit 6 during operational phase U, also to realize mending the module of utilizing of dress module,
-and may, the instruction that allows unit 6 during operational phase U, execute instruction to collect utilize module,
● and when the protection philosophy also realized by rename, constitute the module of utilizing that allows unit 6 during operational phase U, also to realize recovering module.
Usually defining a level S by program development unit and consideration
11The structure that utilizes module is carried out in middle definition of inserting.In Figure 110 other have been described this unit in describing.
At preceding protection sub P
1During this time, structure level S
12Afterwards for being called " the S of customization level in advance
12" level.Customize a grade S in advance at this
13During this time, near small part delivery module 13 and/or utilize module loading to arrive at least one blank cell 60 is so that obtain at least one unit that customizes in advance 66.When noticing, as long as be sent to customization units 66 in advance, outside described customization units in advance 66, no longer direct access utilizes the part of module.By the customization units in advance that is fit to, can carry out the transfer that utilizes module to arrive blank cell 66, its residue at Figure 120 is described in describing.With regard to customization units 66 in advance, constitute by chip card 7 and reader 8 thereof, customization in advance only relates to chip card 7.
At preceding protection sub P
1During this time, at definition level S
11Afterwards, and may, at structure level S
12Afterwards, can be called " instrument generation level a S
14" level.Generate level S at this instrument
14During this time, generate the instrument that allows to help to generate protected software or automated software protection.This instrument allows:
● in leaky software 2v, help selection or automatic selection to protect:
-be easy to be divided into can the step that 6 medium-long ranges are handled in the unit algorithm process,
-the part that is easy to revise,
-and when the protection philosophy realized by variable, but be easy to the variable of teleprocessing in unit 6,
-and when the protection philosophy also realized by basic function, be easy to be divided into the basic function that 6 medium-long ranges are handled in the unit,
-and when also realizing by detecting and during compulsory protection philosophy, with the execution characteristic that monitors with, perhaps, but be easy to be divided into the algorithm process of the instruction of teleprocessing in unit 6,
-and when the protection philosophy also realized by rename, be easy to be divided into 6 medium-long ranges are handled in the unit related function and can rename be used for the algorithm process of order of its trigger command,
-and when the protection philosophy also realized by conditional branching, it is functional to be easy to conditional branching that 6 medium-long ranges are handled in the unit,
● and may, for helping to generate protected software or automated software protection.
Has various forms independently or in conjunction with these different instruments of execution and each instrument, such as for example pretreater, assembler, compiler or the like.
At preceding protection sub P
1Be next protection sub P relevant afterwards with the leaky software 2v of protection
2This next protection sub P
2Also form by several grades.The first order corresponding to the protection philosophy of realizing by interim decomposition is called " creates level S
21".At this establishment level S
21During this time, use at definition level S
11The selection of making during this time.Described selection and or, generate a level S at instrument
14Under the help of the instrument of Chuan Jianing, create protected software 2p during this time by following manner:
● by selecting at least one algorithm process, during carrying out leaky software 2v, it uses at least one operand and can obtain at least one result,
● at least a portion in the source of the leaky software 2vs by selecting to comprise at least one selected algorithm process,
● the source that produces protected software 2ps by source by leaky software 2vs, at least one the selected part by revising leaky software 2vs is revised part so that obtain at least one of source of protected software 2ps, and this is revised as
-during carrying out protected software 2p, in data handling system 3, carry out the first operating part 2pes and behind download message, carry out the second operating part 2peu in the unit 6 that obtains by blank cell 60,
-the second operating part 2peu carries out the functional of at least one selected algorithm processing at least,
-separately at least one selected algorithm is handled so that during carrying out protected software 2p, by the second operating part 2peu, several different steps occur, that is:
Realize algorithm process functional of relevant described at least operand by unit 6,
And possibly, handle at least one result by data handling system 3 by unit 6,
-at least one selected algorithm process, definition step order is so that during carrying out protected software 2p, carry out each step order by the first operating part 2pes, and triggering is carried out a step by the second execution in step 2peu in the unit 6,
-and, select the order of step order allowing to carry out in the ordered set of protected software 2p,
● and by producing:
-produce the first object part 2pos of protected software 2p from the source of protected software 2ps; the described first object part 2pos is during carrying out protected software 2p; appear in the data handling system 3 carry out and at least its part consider according to selected order; the first operating part 2pes of execution in step order
And the second object part 2pou of protected software 2p; the described second object part 2pou is for after being loaded into blank cell 60; and during carrying out protected software 2p; the second operating part 2peu appears; by the second operating part 2peu, carry out the step that triggers by the first operating part 2pes.
Certainly, during the new software of exploitation, can directly use according to the protection philosophy by interim decomposition of the present invention, and not require at the leaky software 2v of preceding realization.In this way, directly obtain protected software 2p.
During next protection sub P2, and when except that by the interim protection philosophy that decomposes, when also using at least another protection philosophy, " revising a level S22 " takes place.During this modification level S22, use the definition of in definition level S11, inserting.In described definition and possibly, generate at instrument under the help of the instrument of constructing during the level S14, revise protected software 2p so that allow and realize protection philosophy according to of the configuration of preceding definition.
When realizing passing through the protection philosophy of variable, protected software 2p is modified to:
● by selecting to be used at least one variable at least one selected algorithm processing, during carrying out protected software 29, it partly defines the state of protected software 2p,
● at least one selected part in the source by revising protected software 2ps, this is revised as during carrying out protected software 2p, and the copy of at least one selected variable or at least one selected variable resides in the unit 6,
● and by producing:
The first object part 2pos of-protected software 2p, the described first object part 2pos are that at least a portion of the first operating part 2pes considers that also the copy of at least one variable or at least one variable resides in unit 6 during carrying out protected software 2p,
-and the second object part 2pou of protected software 2p; the described second object part 2pou is for during being loaded into 6 backs, unit and carrying out protected software 2p; second operating part appears; by second operating part, the variable that at least one is selected and at least one copy of selected variable also reside in the unit 6.
When the protection philosophy of realizing by basic function, revise protection software 2p:
● at least one selected part in the source by revising protected software 2ps, this is revised as:
-separately at least one selects step so that during carrying out protected software 2p, uses basic function, by the second operating part 2peu, carries out described step,
-at least one step of separating, basic command is assembled the source of protected software 2ps, so that during carrying out protected software 2p; carry out each basic command by the first operating part 2pes; and in unit 6, trigger by the second operating part 2peu, carry out basic function
-and the order of in allow carrying out the ordered set of protected software 2p, selecting basic command,
● and by producing:
The first object part 2pos of-protected software 2p, the described first object part 2pos are that according to selected order, at least one part of the first operating part 2pes is also carried out basic command during carrying out protected software 2p,
-and the second object part 2pou that also comprises the protected software 2p that utilizes module; the described second object part 2pou is for after being loaded into unit 6; and during carrying out protected software 2p; the second operating part 2peu appears; by second operating part, also carry out the basic function that triggers by the first operating part 2pes.
When realizing, revise protected software 2p by detection and compulsory protection philosophy:
● by at least one software executing characteristic of in the software executing characteristic that easily monitors, selecting to monitor monitoring,
● carry out at least one criterion of the characteristic of being observed by selecting at least one selected software,
● by select basic function in the source of protected software 2ps, at least one the selected software that supervision is used for this basic function is carried out characteristic,
● at least one selected part in the source by revising protected software 2ps; this is revised as during carrying out protected software 2p; monitor at least one selected characteristic of carrying out by the second operating part 2peu; and the fact of not observing criterion cause data handling system 3 be apprised of/or revise the execution of protected software 2p
● and the second object part 2pou that comprises the protected software 2p that utilizes module by generation; also realize detection module 17 and force module 18; the described second object part 2pou is for after being loaded into unit 6; and during carrying out protected software 2p; monitor at least one software executing characteristic, and the fact of not observing criterion causes data handling system 3 to be apprised of and/or to revise the execution of protected software 2p.
For the variable of tolerance that software is carried out is used as characteristic, realize protection philosophy by detecting and forcing, revise protected software 2p:
● the software that is chosen as supervision by at least one change with the tolerance of at least one functional use of software is carried out characteristic,
● by selecting:
-use the variable of tolerance, be easy to monitor that at least one of protected software 2p of its use is functional,
-be used for quantizing at least one variable of the tolerance of described functional use,
-with at least one relevant threshold value of variable corresponding to the selected tolerance of the restriction of described functional use,
-and according to described functional use, at least a method of the renewal of the variable of selected tolerance,
● and at least one selected part of passing through the source of the protected software 2ps of modification; this is revised as during carrying out protected software 2p; according to described functional use, realize the variable of tolerance by the second operating part 2peu, and consider that at least one threshold value crosses.
For using the variable of measuring,, revise protected software by detecting and force to realize the first preferred one different embodiment of protection philosophy as characteristic:
● by in the source of protected software 2ps, select must with the variable corresponding at least one relevant selected tolerance of several threshold values of the different restrictions of functional use,
● by selecting at least two the relevant threshold values of variable with selected tolerance,
● and at least one selected part of passing through the source of the protected software of modification, this modification is during carrying out protected software 2p, by the second operating part 2peu, differently considers crossing of different threshold values.
For the variable with tolerance is used as characteristic,, revise protected software 2p by detecting and force to realize the second preferred one different embodiment of protection philosophy:
● the variable of use by in the source of protected software 2ps, select allowing limitation function and at least one tolerance of selecting that must be trusted by at least one other use,
● and by revising at least one selected part, this is revised as the stage of mending dress being called, and can trust at least one functional at least one the other use corresponding to the variable of selected tolerance.
For the profile that software is used is used as characteristic, realize protection philosophy by detecting and forcing, revise protected software:
● be chosen as software by at least one profile that software is used and carry out characteristic with supervision,
● at least one carries out feature by the profile of selecting at least one selected use must be observed,
● and at least one selected part of passing through the source of the protected software 2ps of modification, this is revised as during carrying out protected software 2p, and the second operating part 2peu observes all execution characteristics of selecting.
For the supervision that will carry out link is used as the execution characteristic of observing, realize protection philosophy by detecting and forcing, revise protected software:
● at least one selected part in the source by revising protected software 2ps:
-by converting basic function to instruction,
-by specify in the unit 6 carry out them during, the link that at least some instructions must be observed,
-and by basic command being converted to the designated command corresponding to employed instruction.
When the protection philosophy realized by rename, revise protected software:
● by in the source of protected software 2ps, selecting trigger command,
● by the order of the selected trigger command of rename, revise at least one selected part in the source of protected software 2ps, so that cancel the identity of corresponding related function,
● and by producing:
The first object part 2pos of-protected software 2p, the described first object part 2pos are during carrying out protected software 2p, carry out the trigger command with rename order,
-and the second object part 2pou that comprises the protected software 2p that utilizes module also realize recovering module; the described second object part 2pou is for during being loaded into 6 backs, unit and carrying out protected software 2p; by the second operating part 2peu; recovery triggers the identity of the related function of its execution by the first operating part 2pes; and, carry out related function by the second operating part 2peu.
For realize a difference of protection philosophy by rename, revise protected software 2p:
● by in the source of protected software 2ps, selecting to have at least one trigger command of rename order,
● and pass through to replace at least one rename order of a selected trigger command with rename order with another rename order, revise at least one selected part in the source of protected software 2ps, trigger related function mutually of the same clan.
When realizing passing through the protection philosophy of conditional branching, revise protected software 2p:
● by in the source of protected software 2ps, being chosen at least one conditional branching of carrying out at least one selected algorithm process,
● at least one selected part in the source by revising protected software 2ps, this is revised as during carrying out protected software 2p, in unit 6, by the second operating part 2peu, carries out the functional of at least one selected conditional branching,
● and by producing:
The first object part 2pos of-protected software 2p, the described first object part pos are during carrying out protected software 2p, carry out the functional of at least one selected conditional branching in unit 6,
-and the second object part 2pou of protected software 2p; the described second object part 2pou is after being loaded into unit 6, and during carrying out protected software 2p, the second operating part 2peu occurs; by this second operating part 2peu, carry out the functional of at least one selected conditional branching.
For realize the preferred embodiment of protection philosophy by conditional branching, revise protected software 2p:
● by the selected conditional branching of at least one series of selection in the source of protected software 2ps,
● at least one selected part in the source by revising protected software 2ps, this is revised as during carrying out protected software 2p, in unit 6, by the second operating part 2peu, the overall function of at least one selected series of executive condition branch,
● and by producing:
The first object part 2pos of-protected software 2p, the described first object part 2pos are that at least one selected sequence of executive condition branch is functional in unit 6 during carrying out protected software 2ps,
-and the second object part 2pou of protected software 2p; the described second object part 2pou is for after being loaded into unit 6; and during carrying out protected software 2p; the second operating part 2peu appears; by the second operating part 2peu, carry out all functionality of the conditional branching of at least one selected series.
Certainly, during the new software of exploitation, can directly use, and not need the previous indirect protection software of carrying out according to protection philosophy of the present invention.In this way, can carry out an establishment level S together
21With a modification level S
22So that directly obtain protected software 2p.
At next protection sub P
2During this time, at the establishment level S of protected software 2p
21After, and or, revising level S
22After, " customization level S appears being called
23" level.At this customization level S
23During this time, for obtaining at least one unit 6, may comprise and utilize the second object part 2pou of module to be loaded at least one blank cell 60, or for obtaining at least one unit 6, the part that may comprise the second object part 2pou that utilizes module is loaded at least one unit that customizes in advance 66.Load this customized information and allow to make at least one unit 6 operation.It should be noted that, described message part, as long as transfer to unit 6, can not direct access outside described unit 6.By the customization units of describing in other descriptions in Figure 150 that is fit to, can carry out the unit 66 that customized information is sent to blank cell 60 or customizes in advance.Under the situation of unit 6, constitute by chip card 7 and reader 8 thereof, customization only relates to chip card 7.
For realizing protection stage P, various technology modules are described more accurately with reference to Figure 110,120,130,140 and 150.
The embodiment of Figure 110 example illustrative system 25, system 25 allow to realize to consider the structure level S12 of the definition of inserting and during the structure level during definition level S11, structure delivery module 12,13 and may, be used for the module of utilizing of unit 6.This system 25 comprises the program development unit or the workstation of the form of computers that has usually, comprise and system unit, screen, peripherals such as keyboard-mouse and in addition comprise following program: file editor, assembler, pretreater, compiler, interpreter, debugger and link edit's device.
Figure 120 example is illustrated as the unit 66 that acquisition customizes in advance, allow to small part with delivery module 13 and/or utilize module loading to arrive the embodiment of the customization units in advance 30 of at least one blank cell 60.Described customization units in advance 30 comprise permission pre-electronically before the module for reading and writing 31, blank cell 60 of customization so that obtain to have loaded delivery module 13 and/or utilize the unit 66 of customization in advance of module.Customization units 30 can also comprise the physics customized module 32 of blank cell 60 in advance, and blank cell 60 can have for example form of printer.Constituting under the situation of unit 6 with chip card 7 and reader 8 thereof, customization in advance only relates to chip card 7 usually.
The explanation of Figure 130 example allows the embodiment of the system 35 of execution Core Generator, and these instruments allow to help to generate protected software or automated software protection.This system 35 comprises program development unit or the engineering station that has form of computers usually, comprise and system unit, screen, peripherals such as keyboard-mouse and in addition also comprise following program: file editor, assembler, pretreater, compiler, interpreter, debugger and link road editing machine.
The explanation of Figure 140 example allows directly to create protected software 2p or is to obtain the embodiment that protected software 2p revises the system 40 of leaky software 2v.This system 40 comprises program development unit or the workstation that has form of computers usually; comprise system unit, screen, peripherals such as keyboard and mouse and in addition; comprise following program: file editor, assembler, pretreater, compiler, interpreter, debugger and link edit's device, and the instrument that allows to help to generate protected software or robotization protection software.
Figure 150 example is illustrated as and obtains at least one unit 6, permission is loaded at least one blank cell 60 with the second object part 2pou, or, the part of the second object part 2pou is loaded into the embodiment of the customization units 45 at least one unit that customizes in advance 66 for obtaining at least one unit 6.This customization units 45 comprises and allows module for reading and writing 46, at least one blank cell 60 that customizes electronically or the unit 66 that at least one customizes in advance, so that obtain at least one unit 6.When finishing this customization, unit 6 comprises the required information of protected software 2p of carrying out.Customization units 45 can also comprise the physics customized module 47 that is used at least one unit, and at least one unit 6 can have for example form of printer.Under the situation about being made of chip card 7 and reader 8 thereof in unit 6, customization only relates to chip card 7 usually.
Can realize according to guard method of the present invention by following improvement:
● it is planned into several processing of common use and storage unit; between these several processing and storage unit; the second object part 2pou that is divided into protected software 29 is so that when lacking at least one of described processing and storage unit; their common use allows to carry out protected software 29, prevents to use protected software 2p.
In a like fashion, at the S of customization level in advance
13After, and at customization level S
23During this time, the part that the unit 66 of customization in advance is transformed into the second required object part 2pou of unit 6 can be included in the processing used by customization units 45 and the storage unit so that the described part of the restriction access second object part 2pou.Certainly, can be in the described part of dividing the second object part 2pou between several processing and storage unit in case only common use described processing and storage unit during, described part that can the access second object part 2pou.
Claims (36)
1. guard method; use at least one blank cell (60) that comprises memory module (15) and processing module (16) at least; prevent that unauthorized from using leaky software (2v), described leaky software (2v) is gone up operation in data handling system (3), and described guard method comprises:
→ during the protection stage (P)
● create protected software (2p):
-by selecting at least one algorithm process, during carrying out leaky software (2v), it uses at least one operand and makes and obtains at least one result,
-at least one part in source by selecting to comprise the leaky software (2vs) that at least one selected algorithm handles;
-the source that produces protected software (2ps) by source by leaky software (2vs), at least one the selected part by revising leaky software (2vs) is revised part with at least one of the source that obtains protected software (2ps), and this is revised as:
During carrying out protected software (2p), in data handling system (3), carry out first operating part (2pes), and behind download message, by execution second operating part (2peu) in the unit (6) of blank cell (60) acquisition,
Second operating part (2peu) is carried out the functional of at least one selected algorithm processing at least;
Separately at least one selected algorithm process is so that during carrying out protected software (2p), by second operating part (2peu), several different steps occur, that is:
Carry out algorithm process functional of relevant described at least operand by unit (6),
To at least one selected algorithm process, definition step order is carried out each step order and trigger the step of carrying out by second operating part (2peu) in unit (6) by first operating part (2pes) so that during carrying out protected software (2p),
And the order of in the ordered set that allows the protected software of execution (2p), selecting the step order,
-and by producing:
Produce first object part (2pos) of protected software (2p) by the source of protected software (2ps); described first object part (2pos) is during carrying out protected software (2p); appearing at the middle execution of data handling system (3) and its at least a portion considers according to selected order; first operating part (2pes) of execution in step order
And second object part (2pou) of protected software (2p); described second object part (2pou) is for after being loaded into blank cell (60); and during carrying out protected software (2p); second operating part (2peu) appears; by this second operating part (2peu); the step that execution is triggered by first operating part (2pes)
● and for obtaining unit (6), second object part (2pou) is loaded on the blank cell (60),
→ and during operational phase (U), carrying out protected software (2p) during this period:
● when having unit (6), and when being included in step order in the part of first operating part (2pes) at every turn and utilizing it, in unit (6), carry out corresponding step; so that correctly carry out described part; therefore, protected software (2p) works fully
● and when lacking unit (6); although carry out a step in the part request trigger element (6) of first operating part (2pes), can not correctly fulfil described request, so that carry out described at least part improperly; therefore, protected software (2p) not exclusively works.
2. the method for claim 1 comprises:
→ during the protection stage (P):
● revise protected software (2p):
-by selecting to be used at least one variable at least one algorithm process, during carrying out protected software (2ps), described algorithm process partly defines the state of protected software (2p),
-passing through at least one selected part in the source of the protected software of modification (2ps), this is revised as during carrying out protected software (2p), and at least one copy of at least one selected variable or selected variable resides in the unit (6),
-and by producing
First object part (2pos) of protected software (2p); described first object part (2pos) is during carrying out protected software (2p); at least one part of first operating part (2pes) considers that also at least one copy of at least one variable or variable resides in the unit (6)
And second object part (2pou) of protected software (2p); described second object part (2pou) is for after being loaded into unit (6); and during carrying out protected software (2p); second operating part (2peu) appears; by this second operating part (2peu); at least one copy of at least one selected variable or selected variable also resides in the unit (6)
→ and during operational phase (U):
● when having unit (6), and the part of each first operating part (2pes) is when utilizing it, uses the copy that resides in a variable in the unit (6) or a variable, so that correctly carry out described part, therefore, protected software (2p) works fully,
● and when lacking unit (6); although the variable reside in the unit (6) or the copy of a variable are used in the part request of first operating part (2pes); can not correctly fulfil described request; so that carry out described at least part improperly; therefore, protected software (2p) not exclusively works.
3. method as claimed in claim 1 or 2 comprises:
→ during the protection stage (P):
● definition:
-basic function collection is easy to carry out its basic function in unit (6),
-and the basic command collection that is used for described basic function collection, be easy in data handling system (3), carry out described basic command and trigger execution basic function in unit (6),
● structure allow unit (6) carry out described collection basic function utilize module, trigger the described basic function of execution by in data handling system (3), carrying out basic command,
● and revise protected software (2p):
-passing through at least one selected part in the source of the protected software of modification (2ps), this is revised as:
Separately at least one step by second operating part (2peu), is used basic function so that during carrying out protected software (2p), carries out described step,
To at least one step of separating; basic command is assembled the source of protected software (2ps); so that during carrying out protected software (2p); (2pes) carries out each basic command by first operating part; and in unit (6), trigger and carry out basic function by second operating part (2peu)
And the order of in the ordered set that allows the protected software of execution (2p), selecting basic command,
-and by producing:
First object part (2pos) of protected software (2p), described first object part (2pos) are that according to selected order, at least one part of first operating part (2pes) is also carried out basic command during carrying out protected software (2p),
And second object part (2pou) that comprises the protected software (2p) that utilizes module; described second object part (2pou) is for after being loaded into unit (6); and during carrying out protected software (2p); second operating part (2peu) appears; by second operating part (2peu); the basic function that execution is triggered by first operating part (2pes)
→ and during operational phase (U):
● when having unit (6), and when being included in basic command in the part of first operating part (2pes) at every turn and utilizing it, in unit (6), carry out corresponding basic function; so that correctly carry out described part; therefore, protected software (2p) works fully
● and when lacking unit (6); in unit (6), carry out basic function although the part request of first operating part (2pes) triggers, still can not correctly fulfil described request, so that carry out described at least part improperly; therefore, protected software (2p) not exclusively works.
4. method as claimed in claim 3 comprises:
→ during the protection stage (P):
● definition:
-at least one software is carried out characteristic, in unit (6), is easy to be monitored to small part,
At least one criterion that-at least one software executing characteristic is observed,
The detection module (17) of-realization in unit (6) also allows to detect at least one software execution characteristic in accordance with at least one correlation criterion,
-and the pressure module that in unit (6), realizes, and allowing when not observing at least one criterion, notification data disposal system (3) and/or revise software woman's execution,
● structure allows unit (6) also to realize the module of utilizing of detection module (17) and pressure module (18),
● and revise protected software (2p):
-carry out characteristic by carry out at least one software of selecting in the characteristic to monitor at the software that is easy to monitor,
-carry out at least one criterion that characteristic is observed by selecting at least one selected software,
-by in the source of protected software (2ps), selecting to monitor the basic function of at least one selected software execution characteristic,
-at least one selected part in source by revising protected software (2ps); this is revised as during carrying out protected software (2p); monitor at least one selected characteristic of carrying out by second operating part (2peu); and the fact of the not observing criterion execution that causes informing data handling system (3) and/or revise protected software (2p)
-and second object part (2pou) that comprises the protected software (2p) that utilizes module by generation; also realize detection module (17) and force module (18); described second object part (2pou) is for after being loaded into unit (6); and during carrying out protected software (2p); monitor that at least one software carries out characteristic and do not observe the execution that the fact of criterion causes informing data handling system (3) and/or revises protected software (2p)
→ and during operational phase (U):
● when having unit (6):
-as long as observe all criterions, allow the described part nominal ground operation of protected software (2p) corresponding to the execution characteristic of all supervision of all modifications part of protected software (2p), therefore, allow the operation of protected software (2p) nominal ground,
If observe at least one criterion corresponding to the execution characteristic of the part of the protected software (2p) that monitors; it is informed data handling system (3) and/or revise this part operation of protected software (2p), so that revise the operation of protected software (2p).
5. method as claimed in claim 4 for limiting the use of protected software (2p), comprising:
→ during the protection stage (P):
● definition:
-be that the software that is easy to monitor is carried out characteristic with the variable-definition of the tolerance of functional use of software,
-at least one threshold value relevant with the variable of each tolerance is defined as the criterion of observing,
-and implementation module that allow to upgrade the variable of at least one tolerance,
● structure allows unit (6) also to realize carrying out the module of utilizing of module,
● and revise protected software (2p):
-by at least one Variables Selection of the tolerance of at least one functional use of software is carried out characteristic for the software that monitors,
-by selecting:
Use the variable of tolerance to be easy to monitor that at least one of protected software (2p) of its use is functional,
Be used for quantizing at least one variable of the tolerance of described functional use,
With at least one relevant threshold value of variable corresponding to one of the restriction of described functional use selected tolerance,
And, upgrade at least a method of the variable of selected tolerance according to described functional use,
-passing through at least one selected part in the source of the protected software of modification (2ps), this is revised as during carrying out protected software (2p), according to described functional use; by second operating part (2peu); realize the variable of tolerance, and consider that at least one threshold value crosses
→ and during operational phase (U); when having unit (6); and detecting under the situation of crossing corresponding at least one threshold value of at least one use restriction; it is informed data handling system (3) and/or revise the part operation of protected software (2p), so that revise the operation of protected software (2p).
6. method as claimed in claim 5 comprises:
→ during the protection stage (P):
● definition:
-be used for several dependent thresholds of the variable of at least one tolerance,
-and corresponding to each different pressure module of described threshold value,
● and revise protected software (2p):
-by in the source of protected software (2ps), select must with the variable corresponding at least one relevant selected tolerance of several threshold values of the different restrictions of functional use,
-by selecting at least two the relevant threshold values of variable with selected tolerance,
-and at least one selected part in the source by revising protected software (2ps), this is revised as during carrying out protected software (2p), by second operating part (2peu), differently considers crossing of different threshold values,
→ and during operational phase (U):
● under the situation that has unit (6):
-detecting under the situation of crossing of first threshold, order protected software (2p) not re-use function corresponding,
-and detecting under the situation of crossing of second threshold value, make at least a portion of function corresponding and/or protected software (2p) invalid.
7. as claim 5 or 6 described methods, comprising:
→ at protection stage (P):
● define and allow to pass through at least one other use, trust is adorned module by the benefit of at least one software functionality of the variable supervision of a tolerance,
● structure also allows unit (6) to realize mending the module of utilizing of dress module,
● and revise protected software (2p):
The variable of-use by in the source of protected software (2ps), select allowing limitation function and at least one tolerance of selecting that must be trusted by at least one other use,
-and by revising at least one selected part, this is revised as during being called the additional stage, can trust at least one functional at least one the other use corresponding to the variable of selected tolerance,
→ and during mending dress:
● realize variable and/or at least one dependent thresholds of the tolerance that at least one is selected again, so that allow functional at least one other use.
8. method as claimed in claim 4 comprises:
→ during the protection stage (P):
● definition:
-profile of software use is defined as the software execution characteristic that is easy to monitor,
-and at least one software executing characteristic is defined as the criterion of observing,
● and revise protected software (2p):
-the software that is chosen as supervision by the profile that at least one software is used is carried out characteristic,
-carry out feature by at least one that select that at least one selected use profile must observe,
-and at least one selected part in the source by revising protected software (2ps), this modification is during carrying out protected software (2p), second operating part (2peu) is observed all selected execution features,
→ and during operational phase (U); when having unit (6); and detecting under situation of not observing at least one execution feature, with its operation of informing data handling system (3) and/or revising the part of protected software (2p), so that revise the operation of protected software (2p).
9. method as claimed in claim 8 comprises:
→ during the protection stage (P):
● definition:
-in unit (6), be easy to carry out the instruction set of its instruction,
-be used for the designated command collection of described instruction set, be easy in data handling system (3), carry out described designated command and in unit (6), trigger execution command,
-will instruct link to be defined as the use profile,
-expection the link definition that will be used to execute instruction is for carrying out feature,
-will to allow to detect the instruction link be not detection module (17) corresponding to the module definition of the instruction link of expection,
-and will allow when instruction link during corresponding to the instruction link of expection, the notification data disposal system (3) and/or the module definition of function of part that changes protected software (2p) be for forcing module (18),
● structure also allow unit (6) execution command collection instruction utilize module, trigger the described instruction of execution by execution command order in data handling system (3),
● and revise protected software (2p):
-at least one selected part in source by revising protected software (2ps):
By basic function is transformed into instruction,
By specify in carry out them in the unit (6) during, the link that at least some instructions must be observed,
And by basic command being transformed into the designated command corresponding to employed instruction,
→ and during operational phase (U); when having unit (6); the instruction link of carrying out in detecting unit (6) is not under the situation corresponding to the instruction link of expection; with its operation of informing data handling system (3) and/or revising the part of protected software (2p), so that revise the operation of protected software (2p).
10. method as claimed in claim 9 comprises:
→ at protection stage (P):
● definition:
-be return results, at least some instructions are worked with register and are used the instruction set of at least one operand to be defined as instruction set with it,
-at least some instructions to working with register:
And the definition expection link that is used to execute instruction and comprise a part corresponding to following bit field:
* attribute field (CD
k),
* and the expection identification field (CIP of operand
k),
-utilize module and by each register that instruction set is used to belonging to, the sign that will return last instruction of its result automatically is stored in the identification field (CIG that is generated in the described register
v),
-and will allow during executing instruction, to each operand, as attribute field (CD
k) when utilizing it, check the identification field (CIG that is generated corresponding to the register that uses by described operand
v) and the original expection identification field (CIP of described operand
k) the module definition of equation be detection module (17),
If at least one of the equation of being checked for false, will allow the result's of modify instruction module definition to be pressure module (18).
11., comprising as claim 3 or 9 described methods:
→ during the protection stage (P):
● definition:
-basic command or designated command are defined as trigger command,
-be related function with basic function or instruction definition,
-near small part is defined as an order corresponding at least one argument that is used for trigger command of the information that is sent to unit (6) by data handling system (3), carries out corresponding related function so that trigger,
-allow these order of rename so that obtain to have the order rename method of the trigger command of rename order,
-and be designed to during operational phase (U), in unit (6), use and allow and recover related function so that the recovery module of carrying out (20) from the rename order,
● structure allows unit (6) also to realize recovering the module of utilizing of module,
● and revise protected software (2p):
-by in the source of protected software (2ps), selecting trigger command,
-by the order of the selected trigger command of rename, revise at least one selected part in the source of protected software (2ps), so that cancel the characteristic of corresponding related function,
-and by producing:
First object part (2pos) of protected software (2p), described first object part (2pos) are during carrying out protected software (2p), carry out the trigger command with rename order,
And second object part (2pou) that comprises also the protected software (2p) that utilizes module of realizing recovering module (20); described second object part (2pou) is for after being loaded into unit (6); and during carrying out protected software (2p); by second operating part (2peu); recovery is triggered the identity of the related function of its execution by first operating part (2pes); carry out related function by second operating part (2peu)
→ and during operational phase (U):
● when having unit (6); and when being included in trigger command in the part of first operating part (2pes) at every turn and utilizing it with rename order; in unit (6), recover the characteristic of corresponding related function and carry out it; so that correctly carry out described part; therefore; protected software (2p) works fully
● and when lacking unit (6); in unit (6), carry out related function although the part request of first operating part (2pes) triggers, still can not correctly fulfil described request, so that carry out described at least part improperly; therefore, protected software (2p) not exclusively works.
12. method as claimed in claim 11 comprises:
→ during the protection stage (P),
● be equivalence at least one related function definition algorithm, but the gang's related function that triggers by the different trigger command of its rename order,
● and revise protected software (2p):
-by in the source of protected software (2ps), selecting to have at least one trigger command of rename order,
-and, revise at least one selected part in the source of protected software (2ps) by replace the rename order of a selected trigger command at least with another rename order with rename order, trigger related function mutually of the same clan.
13. method as claimed in claim 12 comprises:
→ during the protection stage (P), be the related function of equivalence at least one related function definition gang algorithm:
-by on the information of funtion part that the noise field is connected to the definition related function so that execution in unit (6),
-or by the identification field of use instruction (CII) and the expection identification field (CIP of operand
k).
14., comprising as claim 11,12 or 13 described methods:
→ during the protection stage (P):
● definition:
-the encryption method that will encrypt order is defined as the rename method of order,
-and will realize deciphering rename order, thus the identity of related function recovered so that the module definition of the decryption method of carrying out is for recovering module (20) in unit (6).
15. a described method as claim 1 to 14 comprises:
→ during the protection stage (P):
● revise protected software (2p)
-by in the source of protected software (2ps), being chosen at least one conditional branching of carrying out at least one selected algorithm process,
-passing through at least one selected part in the source of the protected software of modification (2ps), this is revised as during carrying out protected software (2p), by second operating part (2peu), carries out the functional of at least one selected conditional branching in unit (6),
-and by producing:
First object part (2pos) of protected software (2p), described first object part (2pos) are during carrying out protected software (2p), carry out the functional of at least one selected conditional branching in unit (6),
And second object part (2pou) of protected software (2p); described second object part (2pou) is for after being loaded into unit (6); and during carrying out protected software (2p); second operating part (2peu) appears; by second operating part (2peu); carry out the functional of at least one selected conditional branching
→ and during operational phase (U):
● when having unit (6), and the part of each first operating part (2pes) carries out the functional of at least one conditional branching when utilizing it in unit (6), so that correctly carry out described part, therefore, protected software (2p) works fully,
● and when lacking unit (6), although the part request of first operating part (2pes) executive condition branch functional in unit (6) still can not
Correctly fulfil described request, so that carry out described at least part improperly,
Therefore, protected software (2p) not exclusively works.
16. method as claimed in claim 15 comprises, during the protection stage (P), revises protected software (2p):
-by in the source of protected software (2ps), being chosen in the selected conditional branching of at least one series,
-at least one selected part in source by revising protected software (2ps); this is revised as during carrying out protected software (2p); in unit (6),, carry out all functionality of the conditional branching of at least one selected series by second operating part (2peu)
-and by producing:
First object part (2pos) of protected software (2p), described first object part (2pos) are during carrying out protected software (2p), and the conditional branching of at least one selected series of execution is functional in unit (6),
And second object part (2pou) of protected software (2p); described second object part (2pou) is for after being loaded into unit (6); and during carrying out protected software (2p); second operating part (2peu) appears; by second operating part (2peu), carry out all functionality of the conditional branching of at least one selected series.
17. as a described method of claim 1 to 16, comprise with the protection stage (P) be divided into the software of protection irrelevant at preceding protection sub (P
1) next protection sub (P relevant with the software of protection
2).
18. method as claimed in claim 17 comprises, at preceding protection sub (P
1) during, be inserted in the definition level (S that carries out all definition during it
11).
19. method as claimed in claim 18 comprises, after definition level (S11), is inserted in the structure level (S12) that structure during it utilizes module.
20. method as claimed in claim 19 comprises, after structure level (S12), inserts customization level in advance (S13), is included as and obtains customization units (66) in advance, utilizes module loading to arrive blank cell (60) at least a portion.
21. as claim 18 or 19 described methods, comprise,, be inserted in and generate the instrument that allows to help to generate the instrument of protected software or automated software protection during it and generate level (S14) during preceding protection sub (P1).
22. as claim 17 and 20 described methods, comprise, next protection sub (P2) be divided into:
● during it, create the establishment level (S21) of protected software (2p) from leaky software (2v),
● perhaps, during it, revise the modification level (S22) of protected software (2p),
● and possibly, customization level (S23), during it:
-for obtaining at least one unit (6), second object part (2pou) that may comprise the protected software (2p) that utilizes module is loaded at least one blank cell (60),
-or, for the part of second object part (2pou) of the protected software (2p) that obtains at least one unit (6), may comprise to utilize module is loaded at least one unit that customizes in advance (66).
23. as claim 21 and 22 described methods, comprise, during creating level (S21), and may during revising level (S22), use at least one instrument that helps to generate protected software or automated software protection.
24. be used to realize system according to the method for claim 19, it is characterized in that, comprise the program development unit, consider the definition of during definition level (S11), inserting, during structure level (S12), use this program development unit to be configured to the module of utilizing of unit (6) with execution.
25. be used to realize system according to the method for claim 20, it is characterized in that, comprise customization units (30) in advance, for obtaining at least one unit that customizes in advance (66), permission will utilize at least a portion of module to be loaded at least one blank cell (60).
26. be used to realize system according to the method for claim 21, it is characterized in that, comprise the program development unit, be used for during instrument generates level (S14), carrying out the instrument ground generation that helps to generate protected software or automated software protection.
27. be used to realize system according to the method for claim 22 or 23, it is characterized in that, comprise the program development system that is used for creating or revising protected software (2p).
28. be used to realize system according to the method for claim 22, it is characterized in that, comprise customization units (45), allow:
● for obtaining at least one unit (6), second object part (2pou) is loaded at least one blank cell (60),
● perhaps for obtaining at least one unit (6), the part of second object part (2pou) is loaded at least one unit that customizes in advance (66).
29. customization units (66) is characterized in that in advance, it obtains by the system according to claim 25.
30. unit (6) allow to carry out protected software (2p) and prevent that its unauthorized from using, and it is characterized in that, comprise second object part (2pou) of use according to the protected software (2p) of customization units (45) loading of claim 28.
31. one group of unit (6); it is characterized in that second object part (2pos) that divide to use the protected software (2p) that the customization units (45) according to claim 28 loads between several processing and storage unit is so that their common use allows to carry out protected software (2p).
32. the distribution collection (2pd) of protected software (2p) is characterized in that, comprising:
● the first distribution part (2pds) that comprises first object part (2pos) and be designed in data handling system (3), move,
● and the second distribution part (2pdu) with following form:
-blank cell (60),
-according to the customization units in advance (66) of claim 29, can after loading customized information, be transformed into unit (6),
-according to the unit (6) of claim 30.
33. the distribution collection (2pd) as the protected software (2p) of claim 32 is characterized in that, first part (2pds) that distributes has the form of physical distribution medium, CDROM for example, or have the form of the file that distributes by network.
34. the distribution collection (2pd) as the protected software (2p) of claim 32 is characterized in that, second part (2pdu) that distributes of form with blank cell (60) of customization units (66) in advance or unit (6) comprises at least one chip card (7).
35. handle and storage unit, it is characterized in that, comprise the part that the customization units in advance (66) according to claim 29 is transformed into required second object part (2pou) in the unit (6) of claim 30.
36. handle and storage unit for one group, it is characterized in that common processing of using and storage unit comprise the part that customization units in advance (66) with claim 29 is transformed into required second object part (2pou) in the unit (6) of claim 30.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0110247A FR2828304B1 (en) | 2001-07-31 | 2001-07-31 | METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "TIME DISSOCIATION" AGAINST ITS UNAUTHORIZED USE |
FR01/10247 | 2001-07-31 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1552010A true CN1552010A (en) | 2004-12-01 |
CN100451910C CN100451910C (en) | 2009-01-14 |
Family
ID=8866122
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB028146859A Expired - Fee Related CN100451910C (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use |
Country Status (18)
Country | Link |
---|---|
EP (1) | EP1412862A2 (en) |
JP (1) | JP3949108B2 (en) |
KR (1) | KR20040031778A (en) |
CN (1) | CN100451910C (en) |
BR (1) | BR0211371A (en) |
CA (1) | CA2454092A1 (en) |
FR (1) | FR2828304B1 (en) |
HR (1) | HRP20040047A2 (en) |
HU (1) | HUP0400223A2 (en) |
IL (1) | IL159954A0 (en) |
MA (1) | MA26125A1 (en) |
MX (1) | MXPA04000594A (en) |
NO (1) | NO20040227L (en) |
PL (1) | PL367424A1 (en) |
TN (1) | TNSN04014A1 (en) |
WO (1) | WO2003012650A2 (en) |
YU (1) | YU5504A (en) |
ZA (1) | ZA200400349B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102722422A (en) * | 2011-03-23 | 2012-10-10 | 英飞凌科技股份有限公司 | Signature update by code transformation |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101217668B1 (en) * | 2011-05-12 | 2013-01-02 | 주식회사 안랩 | Malicious program hooking prevention apparatus and method |
US11595201B2 (en) | 2020-02-21 | 2023-02-28 | Cyber Armor Ltd. | System and method for generation of a disposable software module for cryptographic material protection |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2634917A1 (en) * | 1988-08-01 | 1990-02-02 | Pionchon Philippe | METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
WO1999001815A1 (en) * | 1997-06-09 | 1999-01-14 | Intertrust, Incorporated | Obfuscation techniques for enhancing software security |
DE69819790D1 (en) * | 1998-06-12 | 2003-12-18 | Gemplus Gemenos | METHOD FOR CONTROLLING THE EXECUTION OF A PROGRAM PRODUCT |
-
2001
- 2001-07-31 FR FR0110247A patent/FR2828304B1/en not_active Expired - Lifetime
-
2002
- 2002-07-04 HU HU0400223A patent/HUP0400223A2/en unknown
- 2002-07-04 CA CA002454092A patent/CA2454092A1/en not_active Abandoned
- 2002-07-04 BR BR0211371-6A patent/BR0211371A/en not_active IP Right Cessation
- 2002-07-04 KR KR10-2004-7000805A patent/KR20040031778A/en not_active Application Discontinuation
- 2002-07-04 JP JP2003517759A patent/JP3949108B2/en not_active Expired - Fee Related
- 2002-07-04 CN CNB028146859A patent/CN100451910C/en not_active Expired - Fee Related
- 2002-07-04 MX MXPA04000594A patent/MXPA04000594A/en unknown
- 2002-07-04 IL IL15995402A patent/IL159954A0/en unknown
- 2002-07-04 PL PL02367424A patent/PL367424A1/en not_active Application Discontinuation
- 2002-07-04 WO PCT/FR2002/002339 patent/WO2003012650A2/en active Application Filing
- 2002-07-04 YU YU5504A patent/YU5504A/en unknown
- 2002-07-04 EP EP02760379A patent/EP1412862A2/en not_active Withdrawn
-
2004
- 2004-01-16 ZA ZA2004/00349A patent/ZA200400349B/en unknown
- 2004-01-19 TN TNP2004000014A patent/TNSN04014A1/en unknown
- 2004-01-19 MA MA27491A patent/MA26125A1/en unknown
- 2004-01-19 NO NO20040227A patent/NO20040227L/en not_active Application Discontinuation
- 2004-01-19 HR HR20040047A patent/HRP20040047A2/en not_active Application Discontinuation
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102722422A (en) * | 2011-03-23 | 2012-10-10 | 英飞凌科技股份有限公司 | Signature update by code transformation |
CN102722422B (en) * | 2011-03-23 | 2015-08-26 | 英飞凌科技股份有限公司 | Signature is upgraded by code conversion |
Also Published As
Publication number | Publication date |
---|---|
NO20040227L (en) | 2004-03-30 |
EP1412862A2 (en) | 2004-04-28 |
TNSN04014A1 (en) | 2006-06-01 |
HRP20040047A2 (en) | 2004-06-30 |
KR20040031778A (en) | 2004-04-13 |
WO2003012650A2 (en) | 2003-02-13 |
CN100451910C (en) | 2009-01-14 |
FR2828304B1 (en) | 2010-09-03 |
PL367424A1 (en) | 2005-02-21 |
YU5504A (en) | 2006-05-25 |
CA2454092A1 (en) | 2003-02-13 |
JP3949108B2 (en) | 2007-07-25 |
FR2828304A1 (en) | 2003-02-07 |
MXPA04000594A (en) | 2005-02-17 |
WO2003012650A3 (en) | 2003-12-24 |
HUP0400223A2 (en) | 2004-08-30 |
IL159954A0 (en) | 2004-06-20 |
ZA200400349B (en) | 2005-03-30 |
JP2004537807A (en) | 2004-12-16 |
BR0211371A (en) | 2004-09-28 |
MA26125A1 (en) | 2004-04-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1236581C (en) | Data processing method, device and system for transmission of encrypted data | |
CN1302408C (en) | Authentication system, authentication device, terminal device, and authentication method | |
CN1157020C (en) | Cipher processing units capable of rasing safety | |
CN1482568A (en) | System for preventing unauthorized use of recording media | |
CN1875345A (en) | Extensible type system for representing and checking consistency of program components during the process of compilation | |
CN1754173A (en) | Software-management system, recording medium, and information-processing device | |
CN1647139A (en) | Data conversion device and data conversion method | |
CN1608361A (en) | Digital work protection system, key management apparatus, and user apparatus | |
CN1950798A (en) | Installation of software on removable media | |
CN1273902C (en) | Debugging system, microprocessor and debugger | |
CN1822012A (en) | Digital work protection system, record/playback device, recording medium device, and model change device | |
CN1577324A (en) | Document management method, document management program, recording medium, and document management apparatus | |
CN101047495A (en) | Method and system for transferring data | |
CN1476580A (en) | Content usage authority management system and management method | |
CN1282071C (en) | Data processor, data processing method and program thereof | |
CN1834889A (en) | Software authentication system, software authentication program, and software authentication method | |
CN101030138A (en) | Application framework | |
CN1692321A (en) | Password recovery system | |
CN1822016A (en) | Storage and retrieval of data based on public key coding | |
CN1707502A (en) | Image processing apparatus and control method therefor, | |
CN1918844A (en) | Secret information management scheme based on secret sharing scheme | |
CN1469229A (en) | Auxiliary inputting device | |
CN1288524C (en) | Method for protecting software using renaming principle against its unauthorised use | |
CN1826615A (en) | Electronic service manual display device, recording medium of recording program, electronic service manual display control method and device, program sending method and device, program receiving metho | |
CN1288525C (en) | Method for protecting software using variable principle against its unauthorised use |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1071458 Country of ref document: HK |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20090114 Termination date: 20090804 |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: WD Ref document number: 1071458 Country of ref document: HK |