HK1070154A1 - Method to protect software against unwanted use with a renaming principle - Google Patents

Method to protect software against unwanted use with a renaming principle

Info

Publication number
HK1070154A1
HK1070154A1 HK05102677A HK05102677A HK1070154A1 HK 1070154 A1 HK1070154 A1 HK 1070154A1 HK 05102677 A HK05102677 A HK 05102677A HK 05102677 A HK05102677 A HK 05102677A HK 1070154 A1 HK1070154 A1 HK 1070154A1
Authority
HK
Hong Kong
Prior art keywords
renaming
principle
against unwanted
protect software
software against
Prior art date
Application number
HK05102677A
Inventor
Jean-Christophe Cuenod
Gilles Sgro
Original Assignee
Validy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Validy filed Critical Validy
Publication of HK1070154A1 publication Critical patent/HK1070154A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Storage Device Security (AREA)
  • Executing Machine-Instructions (AREA)
  • Logic Circuits (AREA)
HK05102677A 2001-07-31 2005-03-30 Method to protect software against unwanted use with a renaming principle HK1070154A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0110246A FR2828303B1 (en) 2001-07-31 2001-07-31 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "RENAMING" AGAINST ITS UNAUTHORIZED USE
PCT/FR2002/002340 WO2003012604A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called renaming principle against its unauthorised use

Publications (1)

Publication Number Publication Date
HK1070154A1 true HK1070154A1 (en) 2005-06-10

Family

ID=8866121

Family Applications (1)

Application Number Title Priority Date Filing Date
HK05102677A HK1070154A1 (en) 2001-07-31 2005-03-30 Method to protect software against unwanted use with a renaming principle

Country Status (19)

Country Link
EP (1) EP1412837A2 (en)
JP (1) JP3949105B2 (en)
KR (1) KR20040032858A (en)
CN (1) CN1288524C (en)
BR (1) BR0211375A (en)
CA (1) CA2454094A1 (en)
FR (1) FR2828303B1 (en)
HK (1) HK1070154A1 (en)
HR (1) HRP20040048A2 (en)
HU (1) HUP0400232A2 (en)
IL (1) IL159951A0 (en)
MA (1) MA26127A1 (en)
MX (1) MXPA04000596A (en)
NO (1) NO20040231L (en)
PL (1) PL367440A1 (en)
TN (1) TNSN04013A1 (en)
WO (1) WO2003012604A2 (en)
YU (1) YU5604A (en)
ZA (1) ZA200400350B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100346252C (en) * 2005-09-28 2007-10-31 珠海金山软件股份有限公司 Computer software security loophole repairing apparatus and method
JP4770425B2 (en) * 2005-11-24 2011-09-14 富士ゼロックス株式会社 Program, method and apparatus for creating protected execution program
CN100437615C (en) * 2006-10-16 2008-11-26 珠海金山软件股份有限公司 Method for protecting dynamic chanining bank interface under windows platform
CN103198244B (en) * 2013-03-26 2016-06-29 北京深思数盾科技股份有限公司 The method of protection dynamic link library

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (en) * 1988-08-01 1990-02-02 Pionchon Philippe METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
WO1999066387A1 (en) * 1998-06-12 1999-12-23 Gemplus Method for verifying the execution of a software product
EP0988591A1 (en) * 1997-06-09 2000-03-29 Intertrust, Incorporated Obfuscation techniques for enhancing software security

Also Published As

Publication number Publication date
WO2003012604A3 (en) 2004-01-22
YU5604A (en) 2006-08-17
JP3949105B2 (en) 2007-07-25
CN1535408A (en) 2004-10-06
HUP0400232A2 (en) 2004-09-28
FR2828303A1 (en) 2003-02-07
MXPA04000596A (en) 2005-02-17
EP1412837A2 (en) 2004-04-28
NO20040231L (en) 2004-03-30
PL367440A1 (en) 2005-02-21
FR2828303B1 (en) 2010-09-03
TNSN04013A1 (en) 2006-06-01
IL159951A0 (en) 2004-06-20
CA2454094A1 (en) 2003-02-13
WO2003012604A2 (en) 2003-02-13
KR20040032858A (en) 2004-04-17
JP2004537800A (en) 2004-12-16
MA26127A1 (en) 2004-04-01
BR0211375A (en) 2004-08-17
HRP20040048A2 (en) 2004-06-30
CN1288524C (en) 2006-12-06
ZA200400350B (en) 2005-03-30

Similar Documents

Publication Publication Date Title
GB2371087B (en) A supercharged engine
GB0316651D0 (en) A universasl software application
GB0020188D0 (en) Protective sleeving
HK1070154A1 (en) Method to protect software against unwanted use with a renaming principle
GB2379431B (en) Motorcycle
HK1070155A1 (en) Method to protect software against unwanted use with a "variable" principle
GB0229662D0 (en) Nanostructures
GB0221984D0 (en) Software protection
GB2370923B (en) Wheel with a generator
AU150757S (en) A wheel
IL159952A0 (en) Method to protect software against unauthorised use with a conditional branch principle
HK1070958A1 (en) Method to protect software against unwanted use with a "elementary functions" principle
GB2377970B (en) Motorcycle engines
GB0208408D0 (en) Application engine
GB0229209D0 (en) Motorcycle exhaust protector
IL159954A0 (en) Method to protect software against unauthorised use with a temporal dissociation principle
AU2002325998A1 (en) Method for protecting a software using a so-called variable principle against its unauthorised use
AU146573S (en) A motorcycle
AU2001274709A1 (en) A method to set tools and a device for carrying out the method
AU2002328375A1 (en) Method for protecting a software using a so-called renaming principle against its unauthorised use
GB0114725D0 (en) A lockable file
AU2002329536A1 (en) Method to protect software against unauthorized use
IL143163A0 (en) Electronic-mechanical-optical device and a way to use it
GB0003536D0 (en) Engine wheel
IL159955A0 (en) Method to protect software against unauthorised use with a detection and coercion principle

Legal Events

Date Code Title Description
PC Patent ceased (i.e. patent has lapsed due to the failure to pay the renewal fee)

Effective date: 20100704