EA200400057A1 - A METHOD FOR PROTECTING A PROGRAM FROM ITS UNAUTHORIZED USE BY MEANS OF A SO-CALLED VARIABLE PRINCIPLE - Google Patents

A METHOD FOR PROTECTING A PROGRAM FROM ITS UNAUTHORIZED USE BY MEANS OF A SO-CALLED VARIABLE PRINCIPLE

Info

Publication number
EA200400057A1
EA200400057A1 EA200400057A EA200400057A EA200400057A1 EA 200400057 A1 EA200400057 A1 EA 200400057A1 EA 200400057 A EA200400057 A EA 200400057A EA 200400057 A EA200400057 A EA 200400057A EA 200400057 A1 EA200400057 A1 EA 200400057A1
Authority
EA
Eurasian Patent Office
Prior art keywords
program
unauthorized use
protecting
called variable
code
Prior art date
Application number
EA200400057A
Other languages
Russian (ru)
Other versions
EA005465B1 (en
Inventor
Жан-Кристоф Кьюно
Жилль Згро
Original Assignee
Валиди
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Валиди filed Critical Валиди
Publication of EA200400057A1 publication Critical patent/EA200400057A1/en
Publication of EA005465B1 publication Critical patent/EA005465B1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Remote Sensing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Storage Device Security (AREA)

Abstract

Предметом настоящего изобретения является способ защиты от неавторизованного использования уязвимой программы (которая функционирует в системе обработки данных) с использованием по меньшей мере одного устройства защиты. Способ по изобретению состоит в формировании защищенной программы, которая создается посредством выбора в исходном коде уязвимой программы по меньшей мере одной переменной и создания кода защищенной программы путем модифицирования кода уязвимой программы таким образом, чтобы выбранная переменная находилась в устройстве защиты.Отчет о международном поиске был опубликован 2003.12.24.The subject of the present invention is a method of protecting against unauthorized use of a vulnerable program (which operates in a data processing system) using at least one protection device. The method of the invention consists in generating a protected program that is created by selecting at least one variable in the source code of the vulnerable program and generating the protected program code by modifying the code of the vulnerable program so that the selected variable is in the protection device. The international search report was published 2003.12.24.

EA200400057A 2001-07-31 2002-07-04 Method for protecting a software using a so-called variable principle against its unauthorised use EA005465B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0110250A FR2828305B1 (en) 2001-07-31 2001-07-31 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE SAID "VARIABLE" AGAINST ITS UNAUTHORIZED USE
PCT/FR2002/002338 WO2003012649A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called variable principle against its unauthorised use

Publications (2)

Publication Number Publication Date
EA200400057A1 true EA200400057A1 (en) 2004-06-24
EA005465B1 EA005465B1 (en) 2005-02-24

Family

ID=8866125

Family Applications (1)

Application Number Title Priority Date Filing Date
EA200400057A EA005465B1 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called variable principle against its unauthorised use

Country Status (29)

Country Link
EP (1) EP1412861A2 (en)
JP (1) JP3949107B2 (en)
KR (1) KR100940347B1 (en)
CN (1) CN1288525C (en)
AP (1) AP2004002958A0 (en)
AU (1) AU2002325998B2 (en)
BR (1) BR0211374A (en)
CA (1) CA2454090A1 (en)
CO (1) CO5550508A2 (en)
CR (1) CR7231A (en)
EA (1) EA005465B1 (en)
EC (1) ECSP044951A (en)
FR (1) FR2828305B1 (en)
GE (1) GEP20053647B (en)
HK (1) HK1070155A1 (en)
HR (1) HRP20040049A2 (en)
HU (1) HUP0400228A2 (en)
IL (1) IL159953A0 (en)
IS (1) IS7121A (en)
MA (1) MA26126A1 (en)
MX (1) MXPA04000488A (en)
NO (1) NO20040232L (en)
OA (1) OA12699A (en)
PL (1) PL367366A1 (en)
TN (1) TNSN04012A1 (en)
UA (1) UA77186C2 (en)
WO (1) WO2003012649A2 (en)
YU (1) YU5404A (en)
ZA (1) ZA200400348B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2852415B1 (en) * 2003-03-11 2005-06-24 Actikey KEY TYPE MEDIUM, CONTROL OF ACCESS TO DATA AND / OR SOFTWARE, AND CORRESPONDING METHOD
CN107194212B (en) * 2017-06-21 2020-04-17 株洲中车时代电气股份有限公司 Method for protecting protocol content in source code of display

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (en) * 1988-08-01 1990-02-02 Pionchon Philippe METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
WO1999066387A1 (en) * 1998-06-12 1999-12-23 Gemplus Method for verifying the execution of a software product
JP4739465B2 (en) * 1997-06-09 2011-08-03 インタートラスト テクノロジーズ コーポレイション Confusing technology to enhance software security

Also Published As

Publication number Publication date
HK1070155A1 (en) 2005-06-10
CN1535410A (en) 2004-10-06
WO2003012649A3 (en) 2003-12-24
CA2454090A1 (en) 2003-02-13
NO20040232L (en) 2004-03-30
FR2828305B1 (en) 2010-09-03
UA77186C2 (en) 2006-11-15
HUP0400228A2 (en) 2004-09-28
EP1412861A2 (en) 2004-04-28
CN1288525C (en) 2006-12-06
IS7121A (en) 2004-01-20
TNSN04012A1 (en) 2006-06-01
YU5404A (en) 2006-08-17
HRP20040049A2 (en) 2004-06-30
EA005465B1 (en) 2005-02-24
AP2004002958A0 (en) 2004-03-31
MXPA04000488A (en) 2005-03-07
IL159953A0 (en) 2004-06-20
OA12699A (en) 2006-06-23
CO5550508A2 (en) 2005-08-31
AU2002325998B2 (en) 2008-10-30
ZA200400348B (en) 2005-03-30
JP2004537806A (en) 2004-12-16
PL367366A1 (en) 2005-02-21
KR100940347B1 (en) 2010-02-04
KR20040027881A (en) 2004-04-01
GEP20053647B (en) 2005-10-25
JP3949107B2 (en) 2007-07-25
MA26126A1 (en) 2004-04-01
CR7231A (en) 2005-07-21
FR2828305A1 (en) 2003-02-07
BR0211374A (en) 2004-07-20
WO2003012649A2 (en) 2003-02-13
ECSP044951A (en) 2004-04-28

Similar Documents

Publication Publication Date Title
EA200501559A1 (en) METHOD (OPTIONS) AND SYSTEM (OPTIONS) DATA PROTECTION IN THE NETWORK
ATE548841T1 (en) NETWORK BASED SECURITY SYSTEM
WO2003034188A3 (en) Method and system for detecting unauthorised executable programs _______________________________________________________________
BR0318148A (en) system and method for protecting data on a communication device
ATE352171T1 (en) METHOD FOR ALLOWING DIRECT ACCESS AND SPLICING IN AN ENCRYPTED VIDEO STREAM
BR0207678A (en) System and method for restoring computer systems damaged by a malicious computer program
ATE507536T1 (en) METHOD AND APPARATUS FOR IMPROVING THE PROTECTION OF INFORMATION PRESENTED BY COMPUTERS
EA200400057A1 (en) A METHOD FOR PROTECTING A PROGRAM FROM ITS UNAUTHORIZED USE BY MEANS OF A SO-CALLED VARIABLE PRINCIPLE
ATE329308T1 (en) LOADING SOFTWARE
DE60203909D1 (en) CRYPTOGRAPHIC PROCEDURE FOR THE PROTECTION OF AN ELECTRONIC CHIP AGAINST FRAUD
SE0002928L (en) Procedure for interfering with possible damage to a laser device, as well as a protection system
DE602004005857D1 (en) METHOD FOR PROTECTING ELECTRONIC EQUIPMENT
HUP0400223A2 (en) Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
HUP0400221A2 (en) Method for protecting a software using a so-called conditional jump principle against its unauthorised use
YU5804A (en) Method for protecting a software using a so-called elementary functions principle against its unauthorised use
WO2007034373A3 (en) Time-controlled operation
EA200400058A1 (en) METHOD FOR PROTECTING A PROGRAM FROM ITS UNAUTHORIZED USE BY MEANS OF A SO-CALLED DETECTING AND FORCING PRINCIPLE
DE69809292T2 (en) METHOD AND DEVICE FOR TREATING CONFIDENTIAL CODE WORDS
TW429359B (en) Anti-copy method of memory device
BR0309079A (en) Method and device for protecting numeric data stored in a memory
FR2828965B1 (en) DEVICE FOR SIGNING BY ENCRYPTION / DECRYPTION OF MESSAGES, SUCH AS ELECTRONIC OR TELEPHONE MESSAGES
WO2003094483A3 (en) Method for protecting secret key cryptographic schemes
TW200519909A (en) Data protection method for compact disc

Legal Events

Date Code Title Description
MM4A Lapse of a eurasian patent due to non-payment of renewal fees within the time limit in the following designated state(s)

Designated state(s): AM AZ BY KZ KG MD TJ TM