CO5550508A2 - METHOD TO PROTECT A SOFTWARE USING A CALLED VARIABLE PRINCIPLE AGAINST UNAUTHORIZED USE - Google Patents

METHOD TO PROTECT A SOFTWARE USING A CALLED VARIABLE PRINCIPLE AGAINST UNAUTHORIZED USE

Info

Publication number
CO5550508A2
CO5550508A2 CO04003765A CO04003765A CO5550508A2 CO 5550508 A2 CO5550508 A2 CO 5550508A2 CO 04003765 A CO04003765 A CO 04003765A CO 04003765 A CO04003765 A CO 04003765A CO 5550508 A2 CO5550508 A2 CO 5550508A2
Authority
CO
Colombia
Prior art keywords
software
variable
unit
protected software
execution
Prior art date
Application number
CO04003765A
Other languages
Spanish (es)
Inventor
Jean Christophe Cuenod
Sgro Gilles
Original Assignee
Vaidity
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vaidity filed Critical Vaidity
Publication of CO5550508A2 publication Critical patent/CO5550508A2/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Abstract

1.- Método para proteger, a partir de por lo menos una unidad virgen (60) que comprende por lo menos medios de memoria (15), un software vulnerable (2v) contra su uso no autorizado, dicho software vulnerable (2v) funciona sobre un sistema de procesamiento de datos (3), caracterizado porque consiste: en una fase de protección (P): en crear un software protegido (2p): seleccionando en la fuente del software vulnerable (2vs): por lo menos una variable que, durante la ejecución del software vulnerable (2v), defina parcialmente el estado de éste, y por lo menos una porción que contiene al menos una variable seleccionada, produciendo la fuente del software protegido (2ps) a partir de la fuente del software vulnerable (2vs), modificando por lo menos una porción seleccionada de la fuente del software vulnerable (2vs), esta modificación siendo tal que durante la ejecución del software protegido (2p), por lo menos una variable seleccionada o por lo menos una copia de variable seleccionada reside en la unidad virgen (60) que se transforma así en una unidad (6), y produciendo una primera parte objeto (2pos) del software protegido (2p) a partir de la fuente del software protegido (2ps), esta primera parte objeto (2pos) siendo tal que durante la ejecución del software protegido (2p), aparece una primera parte de ejecución que es ejecutada en el sistema de procesamiento de datos (3) y en la cual por lo menos una porción toma en cuenta que por lo menos una variable o por lo menos una copia de variable reside en la unidad (6), en una fase de uso (U) durante la cual se ejecuta el software protegido (2p): en presencia de la unidad (6), cada vez que una porción de la primera parte de ejecución (2pes) lo impone, utilizar una variable o una copia de variable que reside en la unidad (6), de tal modo que esta porción se ejecuta correctamente y en consecuencia, el software protegido (2p) es completamente funcional, y en ausencia de la unidad (6), a pesar de la petición de una porción de la primera parte de ejecución (2pes) para utilizar una variable o una copia de variable que reside en la unidad (6), de no poder responder correctamente a esta petición, de modo que por lo menos esta porción no se ejecuta correctamente y en consecuencia, el software protegido (2p) no es completamente funcional.1.- Method to protect, from at least one virgin unit (60) comprising at least memory means (15), vulnerable software (2v) against unauthorized use, said vulnerable software (2v) works on a data processing system (3), characterized in that it consists: in a protection phase (P): in creating a protected software (2p): selecting in the vulnerable software source (2vs): at least one variable that , during the execution of the vulnerable software (2v), partially define its status, and at least a portion that contains at least one selected variable, producing the source of the protected software (2ps) from the source of the vulnerable software ( 2vs), modifying at least a selected portion of the vulnerable software source (2vs), this modification being such that during the execution of the protected software (2p), at least one selected variable or at least one copy of selected variable a resides in the virgin unit (60) which is thus transformed into a unit (6), and producing a first object part (2pos) of the protected software (2p) from the source of the protected software (2ps), this first part object (2pos) being such that during the execution of the protected software (2p), a first part of execution appears that is executed in the data processing system (3) and in which at least a portion takes into account that by at least one variable or at least one copy of the variable resides in the unit (6), in a phase of use (U) during which the protected software (2p) is executed: in the presence of the unit (6), each Once a portion of the first execution part (2pes) imposes it, use a variable or a copy of a variable that resides in the unit (6), so that this portion is executed correctly and consequently, the protected software ( 2p) is fully functional, and in the absence of the unit (6), despite the request of a a portion of the first execution part (2pes) to use a variable or a copy of a variable that resides in the unit (6), if this request cannot be answered correctly, so that at least this portion does not execute correctly and consequently, the protected software (2p) is not fully functional.

CO04003765A 2001-07-31 2004-01-20 METHOD TO PROTECT A SOFTWARE USING A CALLED VARIABLE PRINCIPLE AGAINST UNAUTHORIZED USE CO5550508A2 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR0110250A FR2828305B1 (en) 2001-07-31 2001-07-31 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE SAID "VARIABLE" AGAINST ITS UNAUTHORIZED USE

Publications (1)

Publication Number Publication Date
CO5550508A2 true CO5550508A2 (en) 2005-08-31

Family

ID=8866125

Family Applications (1)

Application Number Title Priority Date Filing Date
CO04003765A CO5550508A2 (en) 2001-07-31 2004-01-20 METHOD TO PROTECT A SOFTWARE USING A CALLED VARIABLE PRINCIPLE AGAINST UNAUTHORIZED USE

Country Status (29)

Country Link
EP (1) EP1412861A2 (en)
JP (1) JP3949107B2 (en)
KR (1) KR100940347B1 (en)
CN (1) CN1288525C (en)
AP (1) AP2004002958A0 (en)
AU (1) AU2002325998B2 (en)
BR (1) BR0211374A (en)
CA (1) CA2454090A1 (en)
CO (1) CO5550508A2 (en)
CR (1) CR7231A (en)
EA (1) EA005465B1 (en)
EC (1) ECSP044951A (en)
FR (1) FR2828305B1 (en)
GE (1) GEP20053647B (en)
HK (1) HK1070155A1 (en)
HR (1) HRP20040049A2 (en)
HU (1) HUP0400228A2 (en)
IL (1) IL159953A0 (en)
IS (1) IS7121A (en)
MA (1) MA26126A1 (en)
MX (1) MXPA04000488A (en)
NO (1) NO20040232L (en)
OA (1) OA12699A (en)
PL (1) PL367366A1 (en)
TN (1) TNSN04012A1 (en)
UA (1) UA77186C2 (en)
WO (1) WO2003012649A2 (en)
YU (1) YU5404A (en)
ZA (1) ZA200400348B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2852415B1 (en) * 2003-03-11 2005-06-24 Actikey KEY TYPE MEDIUM, CONTROL OF ACCESS TO DATA AND / OR SOFTWARE, AND CORRESPONDING METHOD
CN107194212B (en) * 2017-06-21 2020-04-17 株洲中车时代电气股份有限公司 Method for protecting protocol content in source code of display

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (en) * 1988-08-01 1990-02-02 Pionchon Philippe METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
WO1999066387A1 (en) * 1998-06-12 1999-12-23 Gemplus Method for verifying the execution of a software product
JP4739465B2 (en) * 1997-06-09 2011-08-03 インタートラスト テクノロジーズ コーポレイション Confusing technology to enhance software security

Also Published As

Publication number Publication date
HK1070155A1 (en) 2005-06-10
CN1535410A (en) 2004-10-06
WO2003012649A3 (en) 2003-12-24
CA2454090A1 (en) 2003-02-13
NO20040232L (en) 2004-03-30
FR2828305B1 (en) 2010-09-03
UA77186C2 (en) 2006-11-15
HUP0400228A2 (en) 2004-09-28
EP1412861A2 (en) 2004-04-28
CN1288525C (en) 2006-12-06
IS7121A (en) 2004-01-20
TNSN04012A1 (en) 2006-06-01
YU5404A (en) 2006-08-17
HRP20040049A2 (en) 2004-06-30
EA005465B1 (en) 2005-02-24
AP2004002958A0 (en) 2004-03-31
MXPA04000488A (en) 2005-03-07
IL159953A0 (en) 2004-06-20
OA12699A (en) 2006-06-23
AU2002325998B2 (en) 2008-10-30
ZA200400348B (en) 2005-03-30
JP2004537806A (en) 2004-12-16
PL367366A1 (en) 2005-02-21
KR100940347B1 (en) 2010-02-04
KR20040027881A (en) 2004-04-01
GEP20053647B (en) 2005-10-25
JP3949107B2 (en) 2007-07-25
MA26126A1 (en) 2004-04-01
CR7231A (en) 2005-07-21
FR2828305A1 (en) 2003-02-07
BR0211374A (en) 2004-07-20
WO2003012649A2 (en) 2003-02-13
EA200400057A1 (en) 2004-06-24
ECSP044951A (en) 2004-04-28

Similar Documents

Publication Publication Date Title
AU2001277025A1 (en) Universal transaction manager agent, systems and methods
ATE324072T1 (en) THREAD SECURING DEVICE
WO2000004727A3 (en) Use of a watermark for the purpose of copy protection
WO2004077723A3 (en) System and method for enterprise authentication
WO2007004219A3 (en) System, device and method of verifying that a code is executed by a processor
DE59300631D1 (en) Biodegradable, aqueous dispersions.
CO5550508A2 (en) METHOD TO PROTECT A SOFTWARE USING A CALLED VARIABLE PRINCIPLE AGAINST UNAUTHORIZED USE
ES2136031B1 (en) CONNECTOR PROVIDED WITH AN INTERLOCKING LEVER.
AU2001254879A1 (en) Countermeasure method in a microcircuit and smart card comprising said microcircuit
WO2002040817A3 (en) Flood protection system
WO2002025427A3 (en) Method for remote incremental program verification and installation on resource-constrained devices
EP1293858A3 (en) Method for protecting a microcomputer system against software manipulation
JP3071925U (en) Tamper protection equipment for slot machines
ES2138999T3 (en) PROCEDURE TO ENSURE EXECUTABLE PROGRAMS AGAINST USE BY AN UNAUTHORIZED PERSON AND A SECURITY SYSTEM FOR ITS APPLICATION.
WO2003012650A3 (en) Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
WO2004111970A3 (en) Method and device for preventing theft of a radiocommunication device
BR0211375A (en) Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit
ECSP044952A (en) PROCEDURE TO PROTECT A SOFTWARE WITH THE HELP OF A "DETECTION AND COERTION" PRINCIPLE AGAINST YOUR UNAUTHORIZED USE
杨广红 A childish thief
Tripathi Bedakhala
Culver et al. Pro-active management of introduced marine pests: Lessons from the apparently successful eradication of the sabellid worm in California
YU5804A (en) Method for protecting a software using a so-called elementary functions principle against its unauthorised use
못할까 et al. SST TT TTS TST ST
BR8001316U (en) Motorcycle locking arrangement
Sutter Example 1: GotW# 47

Legal Events

Date Code Title Description
FA Application withdrawn