GEP20053647B - Method and System for Protecting Software Using So-Called Variable Principle Against Its Unauthorised Use - Google Patents

Method and System for Protecting Software Using So-Called Variable Principle Against Its Unauthorised Use

Info

Publication number
GEP20053647B
GEP20053647B GE5431A GEAP2002005431A GEP20053647B GE P20053647 B GEP20053647 B GE P20053647B GE 5431 A GE5431 A GE 5431A GE AP2002005431 A GEAP2002005431 A GE AP2002005431A GE P20053647 B GEP20053647 B GE P20053647B
Authority
GE
Georgia
Prior art keywords
software
unauthorised use
source
called variable
vulnerable
Prior art date
Application number
GE5431A
Inventor
Jean-Christophe Cuenod
Gilles Sgro
Original Assignee
Validy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Validy filed Critical Validy
Publication of GEP20053647B publication Critical patent/GEP20053647B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Storage Device Security (AREA)

Abstract

1. Technical Result Increase in efficiency of software protection. 2. Essence The invention concerns a method for protecting, from at least a unit, vulnerable software against its unauthorised use, said vulnerable software operating on a data processing system. The method consists in creating protected software: by selecting in the source of the vulnerable software at least a variable; by producing the source of the protected software by modifying the source of the vulnerable software, so that the selected variable becomes resident in a unit. 3. Field of Application Measurement equipment.
GE5431A 2001-07-31 2002-07-04 Method and System for Protecting Software Using So-Called Variable Principle Against Its Unauthorised Use GEP20053647B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR0110250A FR2828305B1 (en) 2001-07-31 2001-07-31 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE SAID "VARIABLE" AGAINST ITS UNAUTHORIZED USE

Publications (1)

Publication Number Publication Date
GEP20053647B true GEP20053647B (en) 2005-10-25

Family

ID=8866125

Family Applications (1)

Application Number Title Priority Date Filing Date
GE5431A GEP20053647B (en) 2001-07-31 2002-07-04 Method and System for Protecting Software Using So-Called Variable Principle Against Its Unauthorised Use

Country Status (29)

Country Link
EP (1) EP1412861A2 (en)
JP (1) JP3949107B2 (en)
KR (1) KR100940347B1 (en)
CN (1) CN1288525C (en)
AP (1) AP2004002958A0 (en)
AU (1) AU2002325998B2 (en)
BR (1) BR0211374A (en)
CA (1) CA2454090A1 (en)
CO (1) CO5550508A2 (en)
CR (1) CR7231A (en)
EA (1) EA005465B1 (en)
EC (1) ECSP044951A (en)
FR (1) FR2828305B1 (en)
GE (1) GEP20053647B (en)
HK (1) HK1070155A1 (en)
HR (1) HRP20040049A2 (en)
HU (1) HUP0400228A2 (en)
IL (1) IL159953A0 (en)
IS (1) IS7121A (en)
MA (1) MA26126A1 (en)
MX (1) MXPA04000488A (en)
NO (1) NO20040232L (en)
OA (1) OA12699A (en)
PL (1) PL367366A1 (en)
TN (1) TNSN04012A1 (en)
UA (1) UA77186C2 (en)
WO (1) WO2003012649A2 (en)
YU (1) YU5404A (en)
ZA (1) ZA200400348B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2852415B1 (en) * 2003-03-11 2005-06-24 Actikey KEY TYPE MEDIUM, CONTROL OF ACCESS TO DATA AND / OR SOFTWARE, AND CORRESPONDING METHOD
CN107194212B (en) * 2017-06-21 2020-04-17 株洲中车时代电气股份有限公司 Method for protecting protocol content in source code of display

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (en) * 1988-08-01 1990-02-02 Pionchon Philippe METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
AU7957998A (en) * 1997-06-09 1999-01-25 Intertrust, Incorporated Obfuscation techniques for enhancing software security
JP2002518727A (en) * 1998-06-12 2002-06-25 ジェムプリュス How to control the execution of software products

Also Published As

Publication number Publication date
HRP20040049A2 (en) 2004-06-30
CA2454090A1 (en) 2003-02-13
IS7121A (en) 2004-01-20
MA26126A1 (en) 2004-04-01
OA12699A (en) 2006-06-23
EA005465B1 (en) 2005-02-24
TNSN04012A1 (en) 2006-06-01
FR2828305A1 (en) 2003-02-07
BR0211374A (en) 2004-07-20
HK1070155A1 (en) 2005-06-10
FR2828305B1 (en) 2010-09-03
ECSP044951A (en) 2004-04-28
UA77186C2 (en) 2006-11-15
AU2002325998B2 (en) 2008-10-30
ZA200400348B (en) 2005-03-30
CN1535410A (en) 2004-10-06
HUP0400228A2 (en) 2004-09-28
IL159953A0 (en) 2004-06-20
WO2003012649A3 (en) 2003-12-24
JP2004537806A (en) 2004-12-16
MXPA04000488A (en) 2005-03-07
PL367366A1 (en) 2005-02-21
CN1288525C (en) 2006-12-06
AP2004002958A0 (en) 2004-03-31
WO2003012649A2 (en) 2003-02-13
NO20040232L (en) 2004-03-30
CO5550508A2 (en) 2005-08-31
EP1412861A2 (en) 2004-04-28
KR100940347B1 (en) 2010-02-04
KR20040027881A (en) 2004-04-01
JP3949107B2 (en) 2007-07-25
EA200400057A1 (en) 2004-06-24
CR7231A (en) 2005-07-21
YU5404A (en) 2006-08-17

Similar Documents

Publication Publication Date Title
WO2001092981A3 (en) System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
WO2003093961A3 (en) Method and apparatus for protecting information and privacy
WO2003063499A3 (en) Methods and systems for start code emulation prevention and data stuffing
WO2002056156A3 (en) Computer system protection
WO2004111760A3 (en) Application layer security method and system
PL324525A1 (en) Method of protecting computer software against unauthorised use
WO2006065956A3 (en) Protecting computing systems from unauthorized programs
WO2003034188A3 (en) Method and system for detecting unauthorised executable programs _______________________________________________________________
MY121978A (en) Process for protecting an information item transmitted from a security element to a decoder and protection system using such a process
AU2003231237A1 (en) System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container
AU2003243290A1 (en) Network security system protecting against unauthorized agents
TW215482B (en) Trusted personal computer system with identification
WO2006035227A3 (en) Source code protection
EP1469404A4 (en) Rights information providing system, method and computer program for realizing the same
GEP20053647B (en) Method and System for Protecting Software Using So-Called Variable Principle Against Its Unauthorised Use
WO2002071231A8 (en) Method and arrangement for protecting information
IL157947A0 (en) Cryptographic method of protecting an electronic chip against fraud
YU5504A (en) Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
YU5904A (en) Method for protecting a software using a so-called conditional jump principle against its unauthorised use
YU5804A (en) Method for protecting a software using a so-called elementary functions principle against its unauthorised use
IL149697A0 (en) A system and method protecting the identity of target telephone numbers from unauthorized access
GB2411748B (en) System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
GEP20053648B (en) Method and System For Protecting Software Using So-Called Detection and Coercion Principle Against Its Unauthorised Use
AU2002325998A1 (en) Method for protecting a software using a so-called variable principle against its unauthorised use
FR2710247B1 (en) Personal protective equipment, including protective gloves.