EA005465B1 - Способ защиты программы от её неавторизованного использования при помощи так называемого принципа переменной - Google Patents
Способ защиты программы от её неавторизованного использования при помощи так называемого принципа переменной Download PDFInfo
- Publication number
- EA005465B1 EA005465B1 EA200400057A EA200400057A EA005465B1 EA 005465 B1 EA005465 B1 EA 005465B1 EA 200400057 A EA200400057 A EA 200400057A EA 200400057 A EA200400057 A EA 200400057A EA 005465 B1 EA005465 B1 EA 005465B1
- Authority
- EA
- Eurasian Patent Office
- Prior art keywords
- program
- protected program
- execution
- protected
- processing
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 121
- 238000012545 processing Methods 0.000 claims abstract description 283
- 230000006870 function Effects 0.000 claims description 219
- 239000012634 fragment Substances 0.000 claims description 146
- 238000003860 storage Methods 0.000 claims description 119
- 230000001419 dependent effect Effects 0.000 claims description 91
- 238000001514 detection method Methods 0.000 claims description 64
- 230000004048 modification Effects 0.000 claims description 56
- 238000012986 modification Methods 0.000 claims description 56
- 230000007704 transition Effects 0.000 claims description 47
- 238000013461 design Methods 0.000 claims description 21
- 238000009826 distribution Methods 0.000 claims description 19
- 238000011084 recovery Methods 0.000 claims description 16
- 230000008878 coupling Effects 0.000 claims description 15
- 238000010168 coupling process Methods 0.000 claims description 15
- 238000005859 coupling reaction Methods 0.000 claims description 15
- 238000009434 installation Methods 0.000 claims description 10
- 238000004519 manufacturing process Methods 0.000 claims description 8
- 230000008569 process Effects 0.000 claims description 2
- 230000000712 assembly Effects 0.000 claims 1
- 238000000429 assembly Methods 0.000 claims 1
- 238000012546 transfer Methods 0.000 description 35
- 230000005540 biological transmission Effects 0.000 description 21
- 238000004891 communication Methods 0.000 description 10
- 230000006872 improvement Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 9
- 238000010276 construction Methods 0.000 description 5
- 230000014509 gene expression Effects 0.000 description 5
- 238000000926 separation method Methods 0.000 description 5
- 238000011161 development Methods 0.000 description 3
- 230000008520 organization Effects 0.000 description 3
- 230000002093 peripheral effect Effects 0.000 description 3
- 101100293693 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) STO1 gene Proteins 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 101150050497 cbc1 gene Proteins 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 2
- 239000013256 coordination polymer Substances 0.000 description 2
- 238000004683 secondary electrospray ionisation mass spectroscopy Methods 0.000 description 2
- 241000282326 Felis catus Species 0.000 description 1
- 101001116774 Homo sapiens Methionine-R-sulfoxide reductase B2, mitochondrial Proteins 0.000 description 1
- 101000630117 Homo sapiens Synaptonemal complex central element protein 2 Proteins 0.000 description 1
- 102100024862 Methionine-R-sulfoxide reductase B2, mitochondrial Human genes 0.000 description 1
- 102100026178 Synaptonemal complex central element protein 2 Human genes 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 210000000056 organ Anatomy 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
- 230000001131 transforming effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Remote Sensing (AREA)
- Radar, Positioning & Navigation (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0110250A FR2828305B1 (fr) | 2001-07-31 | 2001-07-31 | Procede pour proteger un logiciel a l'aide d'un principe dit de "variable" contre son utilisation non autorisee |
PCT/FR2002/002338 WO2003012649A2 (fr) | 2001-07-31 | 2002-07-04 | Procede pour proteger un logiciel a l'aide de 'variables' contre son utilisation non autorisee |
Publications (2)
Publication Number | Publication Date |
---|---|
EA200400057A1 EA200400057A1 (ru) | 2004-06-24 |
EA005465B1 true EA005465B1 (ru) | 2005-02-24 |
Family
ID=8866125
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EA200400057A EA005465B1 (ru) | 2001-07-31 | 2002-07-04 | Способ защиты программы от её неавторизованного использования при помощи так называемого принципа переменной |
Country Status (29)
Country | Link |
---|---|
EP (1) | EP1412861A2 (es) |
JP (1) | JP3949107B2 (es) |
KR (1) | KR100940347B1 (es) |
CN (1) | CN1288525C (es) |
AP (1) | AP2004002958A0 (es) |
AU (1) | AU2002325998B2 (es) |
BR (1) | BR0211374A (es) |
CA (1) | CA2454090A1 (es) |
CO (1) | CO5550508A2 (es) |
CR (1) | CR7231A (es) |
EA (1) | EA005465B1 (es) |
EC (1) | ECSP044951A (es) |
FR (1) | FR2828305B1 (es) |
GE (1) | GEP20053647B (es) |
HK (1) | HK1070155A1 (es) |
HR (1) | HRP20040049A2 (es) |
HU (1) | HUP0400228A2 (es) |
IL (1) | IL159953A0 (es) |
IS (1) | IS7121A (es) |
MA (1) | MA26126A1 (es) |
MX (1) | MXPA04000488A (es) |
NO (1) | NO20040232L (es) |
OA (1) | OA12699A (es) |
PL (1) | PL367366A1 (es) |
TN (1) | TNSN04012A1 (es) |
UA (1) | UA77186C2 (es) |
WO (1) | WO2003012649A2 (es) |
YU (1) | YU5404A (es) |
ZA (1) | ZA200400348B (es) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2852415B1 (fr) * | 2003-03-11 | 2005-06-24 | Actikey | Support de type cle, de controle de l'acces a des donnees et/ou a un logiciel et procede correspondant |
CN107194212B (zh) * | 2017-06-21 | 2020-04-17 | 株洲中车时代电气股份有限公司 | 一种显示器源代码中协议内容的保护方法 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2634917A1 (fr) * | 1988-08-01 | 1990-02-02 | Pionchon Philippe | Procede et dispositif de protection d'un logiciel, en particulier contre les copies non autorisees |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
WO1999001815A1 (en) * | 1997-06-09 | 1999-01-14 | Intertrust, Incorporated | Obfuscation techniques for enhancing software security |
WO1999066387A1 (fr) * | 1998-06-12 | 1999-12-23 | Gemplus | Procede de controle de l'execution d'un produit logiciel |
-
2001
- 2001-07-31 FR FR0110250A patent/FR2828305B1/fr not_active Expired - Lifetime
-
2002
- 2002-04-07 UA UA2004010469A patent/UA77186C2/uk unknown
- 2002-07-04 OA OA1200400013A patent/OA12699A/en unknown
- 2002-07-04 AU AU2002325998A patent/AU2002325998B2/en not_active Ceased
- 2002-07-04 CN CNB028146840A patent/CN1288525C/zh not_active Expired - Fee Related
- 2002-07-04 HU HU0400228A patent/HUP0400228A2/hu unknown
- 2002-07-04 AP APAP/P/2004/002958A patent/AP2004002958A0/en unknown
- 2002-07-04 BR BR0211374-0A patent/BR0211374A/pt not_active IP Right Cessation
- 2002-07-04 MX MXPA04000488A patent/MXPA04000488A/es unknown
- 2002-07-04 GE GE5431A patent/GEP20053647B/en unknown
- 2002-07-04 EA EA200400057A patent/EA005465B1/ru not_active IP Right Cessation
- 2002-07-04 IL IL15995302A patent/IL159953A0/xx unknown
- 2002-07-04 CA CA002454090A patent/CA2454090A1/fr not_active Abandoned
- 2002-07-04 WO PCT/FR2002/002338 patent/WO2003012649A2/fr active Application Filing
- 2002-07-04 YU YU5404A patent/YU5404A/sh unknown
- 2002-07-04 KR KR1020047000804A patent/KR100940347B1/ko not_active IP Right Cessation
- 2002-07-04 JP JP2003517758A patent/JP3949107B2/ja not_active Expired - Fee Related
- 2002-07-04 EP EP02760378A patent/EP1412861A2/fr not_active Withdrawn
- 2002-07-04 PL PL02367366A patent/PL367366A1/xx not_active Application Discontinuation
-
2004
- 2004-01-16 ZA ZA2004/00348A patent/ZA200400348B/en unknown
- 2004-01-19 HR HR20040049A patent/HRP20040049A2/hr not_active Application Discontinuation
- 2004-01-19 NO NO20040232A patent/NO20040232L/no not_active Application Discontinuation
- 2004-01-19 CR CR7231A patent/CR7231A/es unknown
- 2004-01-19 MA MA27492A patent/MA26126A1/fr unknown
- 2004-01-19 TN TNP2004000012A patent/TNSN04012A1/fr unknown
- 2004-01-20 EC EC2004004951A patent/ECSP044951A/es unknown
- 2004-01-20 IS IS7121A patent/IS7121A/is unknown
- 2004-01-20 CO CO04003765A patent/CO5550508A2/es not_active Application Discontinuation
-
2005
- 2005-03-30 HK HK05102678A patent/HK1070155A1/xx unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2634917A1 (fr) * | 1988-08-01 | 1990-02-02 | Pionchon Philippe | Procede et dispositif de protection d'un logiciel, en particulier contre les copies non autorisees |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
WO1999001815A1 (en) * | 1997-06-09 | 1999-01-14 | Intertrust, Incorporated | Obfuscation techniques for enhancing software security |
WO1999066387A1 (fr) * | 1998-06-12 | 1999-12-23 | Gemplus | Procede de controle de l'execution d'un produit logiciel |
Also Published As
Publication number | Publication date |
---|---|
OA12699A (en) | 2006-06-23 |
CR7231A (es) | 2005-07-21 |
ZA200400348B (en) | 2005-03-30 |
YU5404A (sh) | 2006-08-17 |
IS7121A (is) | 2004-01-20 |
MA26126A1 (fr) | 2004-04-01 |
NO20040232L (no) | 2004-03-30 |
MXPA04000488A (es) | 2005-03-07 |
TNSN04012A1 (fr) | 2006-06-01 |
UA77186C2 (en) | 2006-11-15 |
FR2828305A1 (fr) | 2003-02-07 |
FR2828305B1 (fr) | 2010-09-03 |
BR0211374A (pt) | 2004-07-20 |
CN1288525C (zh) | 2006-12-06 |
AP2004002958A0 (en) | 2004-03-31 |
EA200400057A1 (ru) | 2004-06-24 |
WO2003012649A2 (fr) | 2003-02-13 |
AU2002325998B2 (en) | 2008-10-30 |
JP2004537806A (ja) | 2004-12-16 |
PL367366A1 (en) | 2005-02-21 |
CN1535410A (zh) | 2004-10-06 |
EP1412861A2 (fr) | 2004-04-28 |
HK1070155A1 (en) | 2005-06-10 |
WO2003012649A3 (fr) | 2003-12-24 |
HRP20040049A2 (en) | 2004-06-30 |
JP3949107B2 (ja) | 2007-07-25 |
IL159953A0 (en) | 2004-06-20 |
GEP20053647B (en) | 2005-10-25 |
CO5550508A2 (es) | 2005-08-31 |
KR20040027881A (ko) | 2004-04-01 |
ECSP044951A (es) | 2004-04-28 |
CA2454090A1 (fr) | 2003-02-13 |
KR100940347B1 (ko) | 2010-02-04 |
HUP0400228A2 (en) | 2004-09-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110869905B (zh) | 用于将高级脚本语言编译为区块链固有脚本语言的方法 | |
US6694435B2 (en) | Method of obfuscating computer instruction streams | |
US7757296B2 (en) | Method of managing software components that are integrated into an embedded system | |
US7757224B2 (en) | Software support for dynamically extensible processors | |
US20060130128A1 (en) | Process for compiling and executing software applications in a multi-processor environment | |
CN101167052A (zh) | 应用程序框架分阶段模型 | |
CN102105861A (zh) | 应用程序改变的状态分离 | |
US20240095344A1 (en) | Computer implemented method | |
US20070294770A1 (en) | Method to Protect Software Against Unwanted Use with a Variable Principle | |
EA005465B1 (ru) | Способ защиты программы от её неавторизованного использования при помощи так называемого принципа переменной | |
US20070283437A1 (en) | Method to Protect Software Against Unwanted Use with a "Temporal Dissociation" Principle | |
EA005466B1 (ru) | Способ защиты программы от её неавторизованного использования при помощи так называемого принципа детектирования и принуждения | |
US7954086B2 (en) | Self-describing kernel modules | |
JP2006338311A (ja) | 複数のアプリケーションを搭載したデバイスを処理するコンピュータシステム、デバイスおよびコンピュータプログラム | |
CN112182516A (zh) | 基于relro安全保护的检测方法、终端及存储介质 | |
Navas et al. | A component-based run-time evolution infrastructure for resource-constrained embedded systems | |
JP2017073036A (ja) | 情報処理装置およびその制御方法 | |
GB2579072A (en) | Computer implemented method | |
AU2016100581A4 (en) | Compilation method for linking region-specific computer logic | |
MXPA04000596A (es) | Metodo para proteger un software con la ayuda de un principio llamado de "renombramiento" contra su uso no autorizado. | |
CN117633734A (zh) | 代码编译的方法、装置及电子设备 | |
CN117492761A (zh) | 应用于多项目的软件开发编译方法、装置、设备及介质 | |
KR20040031778A (ko) | 소위 임시 분할 원리를 사용하여 소프트웨어를 불법사용으로부터 보호하는 방법 | |
CN112181751A (zh) | 一种基于pie安全保护的检测方法、终端及存储介质 | |
CN118468263A (zh) | 镜像验证方法、装置、片上系统、存储介质和程序产品 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Lapse of a eurasian patent due to non-payment of renewal fees within the time limit in the following designated state(s) |
Designated state(s): AM AZ BY KZ KG MD TJ TM |