EA200400057A1 - A METHOD FOR PROTECTING A PROGRAM FROM ITS UNAUTHORIZED USE BY MEANS OF A SO-CALLED VARIABLE PRINCIPLE - Google Patents
A METHOD FOR PROTECTING A PROGRAM FROM ITS UNAUTHORIZED USE BY MEANS OF A SO-CALLED VARIABLE PRINCIPLEInfo
- Publication number
- EA200400057A1 EA200400057A1 EA200400057A EA200400057A EA200400057A1 EA 200400057 A1 EA200400057 A1 EA 200400057A1 EA 200400057 A EA200400057 A EA 200400057A EA 200400057 A EA200400057 A EA 200400057A EA 200400057 A1 EA200400057 A1 EA 200400057A1
- Authority
- EA
- Eurasian Patent Office
- Prior art keywords
- program
- unauthorized use
- protecting
- called variable
- code
- Prior art date
Links
- PWPJGUXAGUPAHP-UHFFFAOYSA-N lufenuron Chemical compound C1=C(Cl)C(OC(F)(F)C(C(F)(F)F)F)=CC(Cl)=C1NC(=O)NC(=O)C1=C(F)C=CC=C1F PWPJGUXAGUPAHP-UHFFFAOYSA-N 0.000 title 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Remote Sensing (AREA)
- Radar, Positioning & Navigation (AREA)
- Storage Device Security (AREA)
Abstract
Предметом настоящего изобретения является способ защиты от неавторизованного использования уязвимой программы (которая функционирует в системе обработки данных) с использованием по меньшей мере одного устройства защиты. Способ по изобретению состоит в формировании защищенной программы, которая создается посредством выбора в исходном коде уязвимой программы по меньшей мере одной переменной и создания кода защищенной программы путем модифицирования кода уязвимой программы таким образом, чтобы выбранная переменная находилась в устройстве защиты.Отчет о международном поиске был опубликован 2003.12.24.The subject of the present invention is a method of protecting against unauthorized use of a vulnerable program (which operates in a data processing system) using at least one protection device. The method of the invention consists in generating a protected program that is created by selecting at least one variable in the source code of the vulnerable program and generating the protected program code by modifying the code of the vulnerable program so that the selected variable is in the protection device. The international search report was published 2003.12.24.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0110250A FR2828305B1 (en) | 2001-07-31 | 2001-07-31 | METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE SAID "VARIABLE" AGAINST ITS UNAUTHORIZED USE |
PCT/FR2002/002338 WO2003012649A2 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called variable principle against its unauthorised use |
Publications (2)
Publication Number | Publication Date |
---|---|
EA200400057A1 true EA200400057A1 (en) | 2004-06-24 |
EA005465B1 EA005465B1 (en) | 2005-02-24 |
Family
ID=8866125
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EA200400057A EA005465B1 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called variable principle against its unauthorised use |
Country Status (29)
Country | Link |
---|---|
EP (1) | EP1412861A2 (en) |
JP (1) | JP3949107B2 (en) |
KR (1) | KR100940347B1 (en) |
CN (1) | CN1288525C (en) |
AP (1) | AP2004002958A0 (en) |
AU (1) | AU2002325998B2 (en) |
BR (1) | BR0211374A (en) |
CA (1) | CA2454090A1 (en) |
CO (1) | CO5550508A2 (en) |
CR (1) | CR7231A (en) |
EA (1) | EA005465B1 (en) |
EC (1) | ECSP044951A (en) |
FR (1) | FR2828305B1 (en) |
GE (1) | GEP20053647B (en) |
HK (1) | HK1070155A1 (en) |
HR (1) | HRP20040049A2 (en) |
HU (1) | HUP0400228A2 (en) |
IL (1) | IL159953A0 (en) |
IS (1) | IS7121A (en) |
MA (1) | MA26126A1 (en) |
MX (1) | MXPA04000488A (en) |
NO (1) | NO20040232L (en) |
OA (1) | OA12699A (en) |
PL (1) | PL367366A1 (en) |
TN (1) | TNSN04012A1 (en) |
UA (1) | UA77186C2 (en) |
WO (1) | WO2003012649A2 (en) |
YU (1) | YU5404A (en) |
ZA (1) | ZA200400348B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2852415B1 (en) * | 2003-03-11 | 2005-06-24 | Actikey | KEY TYPE MEDIUM, CONTROL OF ACCESS TO DATA AND / OR SOFTWARE, AND CORRESPONDING METHOD |
CN107194212B (en) * | 2017-06-21 | 2020-04-17 | 株洲中车时代电气股份有限公司 | Method for protecting protocol content in source code of display |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2634917A1 (en) * | 1988-08-01 | 1990-02-02 | Pionchon Philippe | METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
WO1999066387A1 (en) * | 1998-06-12 | 1999-12-23 | Gemplus | Method for verifying the execution of a software product |
JP4739465B2 (en) * | 1997-06-09 | 2011-08-03 | インタートラスト テクノロジーズ コーポレイション | Confusing technology to enhance software security |
-
2001
- 2001-07-31 FR FR0110250A patent/FR2828305B1/en not_active Expired - Lifetime
-
2002
- 2002-04-07 UA UA2004010469A patent/UA77186C2/en unknown
- 2002-07-04 WO PCT/FR2002/002338 patent/WO2003012649A2/en active Application Filing
- 2002-07-04 PL PL02367366A patent/PL367366A1/en not_active Application Discontinuation
- 2002-07-04 BR BR0211374-0A patent/BR0211374A/en not_active IP Right Cessation
- 2002-07-04 CA CA002454090A patent/CA2454090A1/en not_active Abandoned
- 2002-07-04 CN CNB028146840A patent/CN1288525C/en not_active Expired - Fee Related
- 2002-07-04 KR KR1020047000804A patent/KR100940347B1/en not_active IP Right Cessation
- 2002-07-04 AU AU2002325998A patent/AU2002325998B2/en not_active Ceased
- 2002-07-04 IL IL15995302A patent/IL159953A0/en unknown
- 2002-07-04 EP EP02760378A patent/EP1412861A2/en not_active Withdrawn
- 2002-07-04 EA EA200400057A patent/EA005465B1/en not_active IP Right Cessation
- 2002-07-04 HU HU0400228A patent/HUP0400228A2/en unknown
- 2002-07-04 YU YU5404A patent/YU5404A/en unknown
- 2002-07-04 MX MXPA04000488A patent/MXPA04000488A/en unknown
- 2002-07-04 GE GE5431A patent/GEP20053647B/en unknown
- 2002-07-04 JP JP2003517758A patent/JP3949107B2/en not_active Expired - Fee Related
- 2002-07-04 OA OA1200400013A patent/OA12699A/en unknown
- 2002-07-04 AP APAP/P/2004/002958A patent/AP2004002958A0/en unknown
-
2004
- 2004-01-16 ZA ZA2004/00348A patent/ZA200400348B/en unknown
- 2004-01-19 CR CR7231A patent/CR7231A/en unknown
- 2004-01-19 NO NO20040232A patent/NO20040232L/en not_active Application Discontinuation
- 2004-01-19 MA MA27492A patent/MA26126A1/en unknown
- 2004-01-19 HR HR20040049A patent/HRP20040049A2/en not_active Application Discontinuation
- 2004-01-19 TN TNP2004000012A patent/TNSN04012A1/en unknown
- 2004-01-20 CO CO04003765A patent/CO5550508A2/en not_active Application Discontinuation
- 2004-01-20 IS IS7121A patent/IS7121A/en unknown
- 2004-01-20 EC EC2004004951A patent/ECSP044951A/en unknown
-
2005
- 2005-03-30 HK HK05102678A patent/HK1070155A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
HK1070155A1 (en) | 2005-06-10 |
CN1535410A (en) | 2004-10-06 |
WO2003012649A3 (en) | 2003-12-24 |
CA2454090A1 (en) | 2003-02-13 |
NO20040232L (en) | 2004-03-30 |
FR2828305B1 (en) | 2010-09-03 |
UA77186C2 (en) | 2006-11-15 |
HUP0400228A2 (en) | 2004-09-28 |
EP1412861A2 (en) | 2004-04-28 |
CN1288525C (en) | 2006-12-06 |
IS7121A (en) | 2004-01-20 |
TNSN04012A1 (en) | 2006-06-01 |
YU5404A (en) | 2006-08-17 |
HRP20040049A2 (en) | 2004-06-30 |
EA005465B1 (en) | 2005-02-24 |
AP2004002958A0 (en) | 2004-03-31 |
MXPA04000488A (en) | 2005-03-07 |
IL159953A0 (en) | 2004-06-20 |
OA12699A (en) | 2006-06-23 |
CO5550508A2 (en) | 2005-08-31 |
AU2002325998B2 (en) | 2008-10-30 |
ZA200400348B (en) | 2005-03-30 |
JP2004537806A (en) | 2004-12-16 |
PL367366A1 (en) | 2005-02-21 |
KR100940347B1 (en) | 2010-02-04 |
KR20040027881A (en) | 2004-04-01 |
GEP20053647B (en) | 2005-10-25 |
JP3949107B2 (en) | 2007-07-25 |
MA26126A1 (en) | 2004-04-01 |
CR7231A (en) | 2005-07-21 |
FR2828305A1 (en) | 2003-02-07 |
BR0211374A (en) | 2004-07-20 |
WO2003012649A2 (en) | 2003-02-13 |
ECSP044951A (en) | 2004-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EA200501559A1 (en) | METHOD (OPTIONS) AND SYSTEM (OPTIONS) DATA PROTECTION IN THE NETWORK | |
ATE548841T1 (en) | NETWORK BASED SECURITY SYSTEM | |
WO2003034188A3 (en) | Method and system for detecting unauthorised executable programs _______________________________________________________________ | |
BR0318148A (en) | system and method for protecting data on a communication device | |
ATE352171T1 (en) | METHOD FOR ALLOWING DIRECT ACCESS AND SPLICING IN AN ENCRYPTED VIDEO STREAM | |
BR0207678A (en) | System and method for restoring computer systems damaged by a malicious computer program | |
ATE507536T1 (en) | METHOD AND APPARATUS FOR IMPROVING THE PROTECTION OF INFORMATION PRESENTED BY COMPUTERS | |
EA200400057A1 (en) | A METHOD FOR PROTECTING A PROGRAM FROM ITS UNAUTHORIZED USE BY MEANS OF A SO-CALLED VARIABLE PRINCIPLE | |
ATE329308T1 (en) | LOADING SOFTWARE | |
DE60203909D1 (en) | CRYPTOGRAPHIC PROCEDURE FOR THE PROTECTION OF AN ELECTRONIC CHIP AGAINST FRAUD | |
SE0002928L (en) | Procedure for interfering with possible damage to a laser device, as well as a protection system | |
DE602004005857D1 (en) | METHOD FOR PROTECTING ELECTRONIC EQUIPMENT | |
HUP0400223A2 (en) | Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use | |
HUP0400221A2 (en) | Method for protecting a software using a so-called conditional jump principle against its unauthorised use | |
YU5804A (en) | Method for protecting a software using a so-called elementary functions principle against its unauthorised use | |
WO2007034373A3 (en) | Time-controlled operation | |
EA200400058A1 (en) | METHOD FOR PROTECTING A PROGRAM FROM ITS UNAUTHORIZED USE BY MEANS OF A SO-CALLED DETECTING AND FORCING PRINCIPLE | |
DE69809292T2 (en) | METHOD AND DEVICE FOR TREATING CONFIDENTIAL CODE WORDS | |
TW429359B (en) | Anti-copy method of memory device | |
BR0309079A (en) | Method and device for protecting numeric data stored in a memory | |
FR2828965B1 (en) | DEVICE FOR SIGNING BY ENCRYPTION / DECRYPTION OF MESSAGES, SUCH AS ELECTRONIC OR TELEPHONE MESSAGES | |
WO2003094483A3 (en) | Method for protecting secret key cryptographic schemes | |
TW200519909A (en) | Data protection method for compact disc |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Lapse of a eurasian patent due to non-payment of renewal fees within the time limit in the following designated state(s) |
Designated state(s): AM AZ BY KZ KG MD TJ TM |