HUP0400223A2 - Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use - Google Patents

Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use

Info

Publication number
HUP0400223A2
HUP0400223A2 HU0400223A HUP0400223A HUP0400223A2 HU P0400223 A2 HUP0400223 A2 HU P0400223A2 HU 0400223 A HU0400223 A HU 0400223A HU P0400223 A HUP0400223 A HU P0400223A HU P0400223 A2 HUP0400223 A2 HU P0400223A2
Authority
HU
Hungary
Prior art keywords
software
protecting
source code
code version
unit
Prior art date
Application number
HU0400223A
Other languages
Hungarian (hu)
Inventor
Jean-Christophe Cuenod
Gilles Sgro
Original Assignee
Validy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Validy filed Critical Validy
Publication of HUP0400223A2 publication Critical patent/HUP0400223A2/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Storage Device Security (AREA)

Abstract

A találmány célja egy adatfeldolgozó rendszerben működő védtelenszoftver jogosulatlan használat elleni védelme legalább egy önállóbiztonsági egység alkalmazásával. Az eljárás egy védett szoftverlétrehozására szolgál, úgy, hogy a védtelen szoftver forráskódúváltozatában kiválasztanak legalább egy algoritmikus műveletet, avédett szoftver forráskódú változatát előállítják, hogy a védtelenszoftver forráskódú változatát módosítják, úgy, hogy a legalább egyalgoritmikus műveletet szétbontják, így a védett szoftver végrehajtásasorán több különálló lépés történik, mégpedig az egység rendelkezésérebocsátunk legalább egy operaadust, amellyel végrehajtjuk azalgoritmikus művelet funkcióját, és az egység segítségével a legalábbegy eredményt az adatfeldolgozó rendszer rendelkezésére bocsátják. ÓThe purpose of the invention is to protect unprotected software operating in a data processing system against unauthorized use by using at least one independent security unit. The method is used to create a protected software, by selecting at least one algorithmic operation in the source code version of the unprotected software, creating a source code version of the protected software, modifying the source code version of the unprotected software, in such a way that at least one algorithmic operation is broken down, so that during the execution of the protected software, there are several separate steps takes place, namely, we provide the unit with at least one operand, with which we perform the function of the algorithmic operation, and with the help of the unit, at least one result is provided to the data processing system. HE

HU0400223A 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use HUP0400223A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0110247A FR2828304B1 (en) 2001-07-31 2001-07-31 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "TIME DISSOCIATION" AGAINST ITS UNAUTHORIZED USE
PCT/FR2002/002339 WO2003012650A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use

Publications (1)

Publication Number Publication Date
HUP0400223A2 true HUP0400223A2 (en) 2004-08-30

Family

ID=8866122

Family Applications (1)

Application Number Title Priority Date Filing Date
HU0400223A HUP0400223A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use

Country Status (18)

Country Link
EP (1) EP1412862A2 (en)
JP (1) JP3949108B2 (en)
KR (1) KR20040031778A (en)
CN (1) CN100451910C (en)
BR (1) BR0211371A (en)
CA (1) CA2454092A1 (en)
FR (1) FR2828304B1 (en)
HR (1) HRP20040047A2 (en)
HU (1) HUP0400223A2 (en)
IL (1) IL159954A0 (en)
MA (1) MA26125A1 (en)
MX (1) MXPA04000594A (en)
NO (1) NO20040227L (en)
PL (1) PL367424A1 (en)
TN (1) TNSN04014A1 (en)
WO (1) WO2003012650A2 (en)
YU (1) YU5504A (en)
ZA (1) ZA200400349B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102011006000B4 (en) 2011-03-23 2015-01-15 Infineon Technologies Ag Signature update by code transformation
KR101217668B1 (en) * 2011-05-12 2013-01-02 주식회사 안랩 Malicious program hooking prevention apparatus and method
US11595201B2 (en) * 2020-02-21 2023-02-28 Cyber Armor Ltd. System and method for generation of a disposable software module for cryptographic material protection

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (en) * 1988-08-01 1990-02-02 Pionchon Philippe METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
WO1999066387A1 (en) * 1998-06-12 1999-12-23 Gemplus Method for verifying the execution of a software product
WO1999001815A1 (en) * 1997-06-09 1999-01-14 Intertrust, Incorporated Obfuscation techniques for enhancing software security

Also Published As

Publication number Publication date
EP1412862A2 (en) 2004-04-28
PL367424A1 (en) 2005-02-21
IL159954A0 (en) 2004-06-20
WO2003012650A3 (en) 2003-12-24
WO2003012650A2 (en) 2003-02-13
ZA200400349B (en) 2005-03-30
FR2828304A1 (en) 2003-02-07
FR2828304B1 (en) 2010-09-03
JP3949108B2 (en) 2007-07-25
MXPA04000594A (en) 2005-02-17
CN100451910C (en) 2009-01-14
TNSN04014A1 (en) 2006-06-01
CA2454092A1 (en) 2003-02-13
KR20040031778A (en) 2004-04-13
YU5504A (en) 2006-05-25
JP2004537807A (en) 2004-12-16
BR0211371A (en) 2004-09-28
NO20040227L (en) 2004-03-30
HRP20040047A2 (en) 2004-06-30
MA26125A1 (en) 2004-04-01
CN1552010A (en) 2004-12-01

Similar Documents

Publication Publication Date Title
JP4770425B2 (en) Program, method and apparatus for creating protected execution program
EP1466233B1 (en) Apparatusses and methods for decrypting encrypted blocks of data and locating the decrypted blocks of data in memory space used for execution
RU2439669C2 (en) Method to prevent reverse engineering of software, unauthorised modification and data capture during performance
PL324525A1 (en) Method of protecting computer software against unauthorised use
WO2003034188A3 (en) Method and system for detecting unauthorised executable programs _______________________________________________________________
WO2003054662A3 (en) A system and method for preventing unauthorized use of protected software utilizing a portable security device
WO2006035227A3 (en) Source code protection
US20100070953A1 (en) Compiler system and a method of compiling a source code into an encrypted machine language code
JP4568489B2 (en) Program protection method, program protection program, and program protection apparatus
AU2002211253A1 (en) Method and apparatus to improve the protection of information presented by a computer
US20070143630A1 (en) Method and device for protecting a program comprising a functional block
HUP0400223A2 (en) Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
JP2002132364A (en) Method for protecting program from internal analysis, computer readable recording medium and program distribution method
HUP0400228A2 (en) Method for protecting a software using a so-called variable principle against its unauthorised use
HUP0400221A2 (en) Method for protecting a software using a so-called conditional jump principle against its unauthorised use
EE200300261A (en) A security tool and method for a security assurance system
HUP0400239A2 (en) Method for protecting a software using a so-called elementary functions principle against its unauthorised use
HUP0400232A2 (en) Method for protecting a software using a so-called renaming principle against its unauthorised use
EP2947590B1 (en) Program code obfuscation based upon recently executed program code
Curran et al. Dependency in software watermarking
Kumar Novel Method for Watermarking Java Program
JP2005216114A (en) Activation method for software bearing effective period
EA200700350A1 (en) THE METHOD OF PROTECTING COMPUTER SYSTEMS FROM ENCRYPTED AND POLYMORPHIC VIRUSES
IS7120A (en) Method of protecting software against unauthorized use by using so-called detection and coercion laws
CN107944233A (en) A kind of guard method of executable file and device

Legal Events

Date Code Title Description
FD9A Lapse of provisional protection due to non-payment of fees