CO5550508A2 - METHOD TO PROTECT A SOFTWARE USING A CALLED VARIABLE PRINCIPLE AGAINST UNAUTHORIZED USE - Google Patents
METHOD TO PROTECT A SOFTWARE USING A CALLED VARIABLE PRINCIPLE AGAINST UNAUTHORIZED USEInfo
- Publication number
- CO5550508A2 CO5550508A2 CO04003765A CO04003765A CO5550508A2 CO 5550508 A2 CO5550508 A2 CO 5550508A2 CO 04003765 A CO04003765 A CO 04003765A CO 04003765 A CO04003765 A CO 04003765A CO 5550508 A2 CO5550508 A2 CO 5550508A2
- Authority
- CO
- Colombia
- Prior art keywords
- software
- variable
- unit
- protected software
- execution
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 2
- 238000012986 modification Methods 0.000 abstract 1
- 230000004048 modification Effects 0.000 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
Abstract
1.- Método para proteger, a partir de por lo menos una unidad virgen (60) que comprende por lo menos medios de memoria (15), un software vulnerable (2v) contra su uso no autorizado, dicho software vulnerable (2v) funciona sobre un sistema de procesamiento de datos (3), caracterizado porque consiste: en una fase de protección (P): en crear un software protegido (2p): seleccionando en la fuente del software vulnerable (2vs): por lo menos una variable que, durante la ejecución del software vulnerable (2v), defina parcialmente el estado de éste, y por lo menos una porción que contiene al menos una variable seleccionada, produciendo la fuente del software protegido (2ps) a partir de la fuente del software vulnerable (2vs), modificando por lo menos una porción seleccionada de la fuente del software vulnerable (2vs), esta modificación siendo tal que durante la ejecución del software protegido (2p), por lo menos una variable seleccionada o por lo menos una copia de variable seleccionada reside en la unidad virgen (60) que se transforma así en una unidad (6), y produciendo una primera parte objeto (2pos) del software protegido (2p) a partir de la fuente del software protegido (2ps), esta primera parte objeto (2pos) siendo tal que durante la ejecución del software protegido (2p), aparece una primera parte de ejecución que es ejecutada en el sistema de procesamiento de datos (3) y en la cual por lo menos una porción toma en cuenta que por lo menos una variable o por lo menos una copia de variable reside en la unidad (6), en una fase de uso (U) durante la cual se ejecuta el software protegido (2p): en presencia de la unidad (6), cada vez que una porción de la primera parte de ejecución (2pes) lo impone, utilizar una variable o una copia de variable que reside en la unidad (6), de tal modo que esta porción se ejecuta correctamente y en consecuencia, el software protegido (2p) es completamente funcional, y en ausencia de la unidad (6), a pesar de la petición de una porción de la primera parte de ejecución (2pes) para utilizar una variable o una copia de variable que reside en la unidad (6), de no poder responder correctamente a esta petición, de modo que por lo menos esta porción no se ejecuta correctamente y en consecuencia, el software protegido (2p) no es completamente funcional.1.- Method to protect, from at least one virgin unit (60) comprising at least memory means (15), vulnerable software (2v) against unauthorized use, said vulnerable software (2v) works on a data processing system (3), characterized in that it consists: in a protection phase (P): in creating a protected software (2p): selecting in the vulnerable software source (2vs): at least one variable that , during the execution of the vulnerable software (2v), partially define its status, and at least a portion that contains at least one selected variable, producing the source of the protected software (2ps) from the source of the vulnerable software ( 2vs), modifying at least a selected portion of the vulnerable software source (2vs), this modification being such that during the execution of the protected software (2p), at least one selected variable or at least one copy of selected variable a resides in the virgin unit (60) which is thus transformed into a unit (6), and producing a first object part (2pos) of the protected software (2p) from the source of the protected software (2ps), this first part object (2pos) being such that during the execution of the protected software (2p), a first part of execution appears that is executed in the data processing system (3) and in which at least a portion takes into account that by at least one variable or at least one copy of the variable resides in the unit (6), in a phase of use (U) during which the protected software (2p) is executed: in the presence of the unit (6), each Once a portion of the first execution part (2pes) imposes it, use a variable or a copy of a variable that resides in the unit (6), so that this portion is executed correctly and consequently, the protected software ( 2p) is fully functional, and in the absence of the unit (6), despite the request of a a portion of the first execution part (2pes) to use a variable or a copy of a variable that resides in the unit (6), if this request cannot be answered correctly, so that at least this portion does not execute correctly and consequently, the protected software (2p) is not fully functional.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0110250A FR2828305B1 (en) | 2001-07-31 | 2001-07-31 | METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE SAID "VARIABLE" AGAINST ITS UNAUTHORIZED USE |
Publications (1)
Publication Number | Publication Date |
---|---|
CO5550508A2 true CO5550508A2 (en) | 2005-08-31 |
Family
ID=8866125
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CO04003765A CO5550508A2 (en) | 2001-07-31 | 2004-01-20 | METHOD TO PROTECT A SOFTWARE USING A CALLED VARIABLE PRINCIPLE AGAINST UNAUTHORIZED USE |
Country Status (29)
Country | Link |
---|---|
EP (1) | EP1412861A2 (en) |
JP (1) | JP3949107B2 (en) |
KR (1) | KR100940347B1 (en) |
CN (1) | CN1288525C (en) |
AP (1) | AP2004002958A0 (en) |
AU (1) | AU2002325998B2 (en) |
BR (1) | BR0211374A (en) |
CA (1) | CA2454090A1 (en) |
CO (1) | CO5550508A2 (en) |
CR (1) | CR7231A (en) |
EA (1) | EA005465B1 (en) |
EC (1) | ECSP044951A (en) |
FR (1) | FR2828305B1 (en) |
GE (1) | GEP20053647B (en) |
HK (1) | HK1070155A1 (en) |
HR (1) | HRP20040049A2 (en) |
HU (1) | HUP0400228A2 (en) |
IL (1) | IL159953A0 (en) |
IS (1) | IS7121A (en) |
MA (1) | MA26126A1 (en) |
MX (1) | MXPA04000488A (en) |
NO (1) | NO20040232L (en) |
OA (1) | OA12699A (en) |
PL (1) | PL367366A1 (en) |
TN (1) | TNSN04012A1 (en) |
UA (1) | UA77186C2 (en) |
WO (1) | WO2003012649A2 (en) |
YU (1) | YU5404A (en) |
ZA (1) | ZA200400348B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2852415B1 (en) * | 2003-03-11 | 2005-06-24 | Actikey | KEY TYPE MEDIUM, CONTROL OF ACCESS TO DATA AND / OR SOFTWARE, AND CORRESPONDING METHOD |
CN107194212B (en) * | 2017-06-21 | 2020-04-17 | 株洲中车时代电气股份有限公司 | Method for protecting protocol content in source code of display |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2634917A1 (en) * | 1988-08-01 | 1990-02-02 | Pionchon Philippe | METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
WO1999066387A1 (en) * | 1998-06-12 | 1999-12-23 | Gemplus | Method for verifying the execution of a software product |
JP4739465B2 (en) * | 1997-06-09 | 2011-08-03 | インタートラスト テクノロジーズ コーポレイション | Confusing technology to enhance software security |
-
2001
- 2001-07-31 FR FR0110250A patent/FR2828305B1/en not_active Expired - Lifetime
-
2002
- 2002-04-07 UA UA2004010469A patent/UA77186C2/en unknown
- 2002-07-04 WO PCT/FR2002/002338 patent/WO2003012649A2/en active Application Filing
- 2002-07-04 PL PL02367366A patent/PL367366A1/en not_active Application Discontinuation
- 2002-07-04 BR BR0211374-0A patent/BR0211374A/en not_active IP Right Cessation
- 2002-07-04 CA CA002454090A patent/CA2454090A1/en not_active Abandoned
- 2002-07-04 CN CNB028146840A patent/CN1288525C/en not_active Expired - Fee Related
- 2002-07-04 KR KR1020047000804A patent/KR100940347B1/en not_active IP Right Cessation
- 2002-07-04 AU AU2002325998A patent/AU2002325998B2/en not_active Ceased
- 2002-07-04 IL IL15995302A patent/IL159953A0/en unknown
- 2002-07-04 EP EP02760378A patent/EP1412861A2/en not_active Withdrawn
- 2002-07-04 EA EA200400057A patent/EA005465B1/en not_active IP Right Cessation
- 2002-07-04 HU HU0400228A patent/HUP0400228A2/en unknown
- 2002-07-04 YU YU5404A patent/YU5404A/en unknown
- 2002-07-04 MX MXPA04000488A patent/MXPA04000488A/en unknown
- 2002-07-04 GE GE5431A patent/GEP20053647B/en unknown
- 2002-07-04 JP JP2003517758A patent/JP3949107B2/en not_active Expired - Fee Related
- 2002-07-04 OA OA1200400013A patent/OA12699A/en unknown
- 2002-07-04 AP APAP/P/2004/002958A patent/AP2004002958A0/en unknown
-
2004
- 2004-01-16 ZA ZA2004/00348A patent/ZA200400348B/en unknown
- 2004-01-19 CR CR7231A patent/CR7231A/en unknown
- 2004-01-19 NO NO20040232A patent/NO20040232L/en not_active Application Discontinuation
- 2004-01-19 MA MA27492A patent/MA26126A1/en unknown
- 2004-01-19 HR HR20040049A patent/HRP20040049A2/en not_active Application Discontinuation
- 2004-01-19 TN TNP2004000012A patent/TNSN04012A1/en unknown
- 2004-01-20 CO CO04003765A patent/CO5550508A2/en not_active Application Discontinuation
- 2004-01-20 IS IS7121A patent/IS7121A/en unknown
- 2004-01-20 EC EC2004004951A patent/ECSP044951A/en unknown
-
2005
- 2005-03-30 HK HK05102678A patent/HK1070155A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
HK1070155A1 (en) | 2005-06-10 |
CN1535410A (en) | 2004-10-06 |
WO2003012649A3 (en) | 2003-12-24 |
CA2454090A1 (en) | 2003-02-13 |
NO20040232L (en) | 2004-03-30 |
FR2828305B1 (en) | 2010-09-03 |
UA77186C2 (en) | 2006-11-15 |
HUP0400228A2 (en) | 2004-09-28 |
EP1412861A2 (en) | 2004-04-28 |
CN1288525C (en) | 2006-12-06 |
IS7121A (en) | 2004-01-20 |
TNSN04012A1 (en) | 2006-06-01 |
YU5404A (en) | 2006-08-17 |
HRP20040049A2 (en) | 2004-06-30 |
EA005465B1 (en) | 2005-02-24 |
AP2004002958A0 (en) | 2004-03-31 |
MXPA04000488A (en) | 2005-03-07 |
IL159953A0 (en) | 2004-06-20 |
OA12699A (en) | 2006-06-23 |
AU2002325998B2 (en) | 2008-10-30 |
ZA200400348B (en) | 2005-03-30 |
JP2004537806A (en) | 2004-12-16 |
PL367366A1 (en) | 2005-02-21 |
KR100940347B1 (en) | 2010-02-04 |
KR20040027881A (en) | 2004-04-01 |
GEP20053647B (en) | 2005-10-25 |
JP3949107B2 (en) | 2007-07-25 |
MA26126A1 (en) | 2004-04-01 |
CR7231A (en) | 2005-07-21 |
FR2828305A1 (en) | 2003-02-07 |
BR0211374A (en) | 2004-07-20 |
WO2003012649A2 (en) | 2003-02-13 |
EA200400057A1 (en) | 2004-06-24 |
ECSP044951A (en) | 2004-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2001277025A1 (en) | Universal transaction manager agent, systems and methods | |
ATE324072T1 (en) | THREAD SECURING DEVICE | |
WO2000004727A3 (en) | Use of a watermark for the purpose of copy protection | |
WO2004077723A3 (en) | System and method for enterprise authentication | |
WO2007004219A3 (en) | System, device and method of verifying that a code is executed by a processor | |
DE59300631D1 (en) | Biodegradable, aqueous dispersions. | |
CO5550508A2 (en) | METHOD TO PROTECT A SOFTWARE USING A CALLED VARIABLE PRINCIPLE AGAINST UNAUTHORIZED USE | |
ES2136031B1 (en) | CONNECTOR PROVIDED WITH AN INTERLOCKING LEVER. | |
AU2001254879A1 (en) | Countermeasure method in a microcircuit and smart card comprising said microcircuit | |
WO2002040817A3 (en) | Flood protection system | |
WO2002025427A3 (en) | Method for remote incremental program verification and installation on resource-constrained devices | |
EP1293858A3 (en) | Method for protecting a microcomputer system against software manipulation | |
JP3071925U (en) | Tamper protection equipment for slot machines | |
ES2138999T3 (en) | PROCEDURE TO ENSURE EXECUTABLE PROGRAMS AGAINST USE BY AN UNAUTHORIZED PERSON AND A SECURITY SYSTEM FOR ITS APPLICATION. | |
WO2003012650A3 (en) | Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use | |
WO2004111970A3 (en) | Method and device for preventing theft of a radiocommunication device | |
BR0211375A (en) | Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit | |
ECSP044952A (en) | PROCEDURE TO PROTECT A SOFTWARE WITH THE HELP OF A "DETECTION AND COERTION" PRINCIPLE AGAINST YOUR UNAUTHORIZED USE | |
杨广红 | A childish thief | |
Tripathi | Bedakhala | |
Culver et al. | Pro-active management of introduced marine pests: Lessons from the apparently successful eradication of the sabellid worm in California | |
YU5804A (en) | Method for protecting a software using a so-called elementary functions principle against its unauthorised use | |
못할까 et al. | SST TT TTS TST ST | |
BR8001316U (en) | Motorcycle locking arrangement | |
Sutter | Example 1: GotW# 47 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FA | Application withdrawn |