HUP0400228A2 - Method for protecting a software using a so-called variable principle against its unauthorised use - Google Patents

Method for protecting a software using a so-called variable principle against its unauthorised use

Info

Publication number
HUP0400228A2
HUP0400228A2 HU0400228A HUP0400228A HUP0400228A2 HU P0400228 A2 HUP0400228 A2 HU P0400228A2 HU 0400228 A HU0400228 A HU 0400228A HU P0400228 A HUP0400228 A HU P0400228A HU P0400228 A2 HUP0400228 A2 HU P0400228A2
Authority
HU
Hungary
Prior art keywords
software
protecting
called variable
source code
unauthorised use
Prior art date
Application number
HU0400228A
Other languages
English (en)
Inventor
Jean-Christophe Cuenod
Gilles Sgro
Original Assignee
Validy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Validy filed Critical Validy
Publication of HUP0400228A2 publication Critical patent/HUP0400228A2/hu

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Storage Device Security (AREA)

Abstract

A találmány célja egy adatfeldolgozó rendszerben működő védtelenszoftver jogosulatlan használat elleni védelme legalább egy önállóbiztonsági egység alkalmazásával. Az eljárás egy védett szoftverlétrehozására szolgál, úgy, hogy a védtelen szoftver forráskódúváltozatában kiválasztanak egy változót, és a védett szoftverforráskódú változatát a védtelen szoftver forráskódú változatánakolyan módosításával állítják elő, hogy a kiválasztott változót aönálló biztonsági egységbe helyezik ki. Ó
HU0400228A 2001-07-31 2002-07-04 Method for protecting a software using a so-called variable principle against its unauthorised use HUP0400228A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0110250A FR2828305B1 (fr) 2001-07-31 2001-07-31 Procede pour proteger un logiciel a l'aide d'un principe dit de "variable" contre son utilisation non autorisee
PCT/FR2002/002338 WO2003012649A2 (fr) 2001-07-31 2002-07-04 Procede pour proteger un logiciel a l'aide de 'variables' contre son utilisation non autorisee

Publications (1)

Publication Number Publication Date
HUP0400228A2 true HUP0400228A2 (en) 2004-09-28

Family

ID=8866125

Family Applications (1)

Application Number Title Priority Date Filing Date
HU0400228A HUP0400228A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called variable principle against its unauthorised use

Country Status (29)

Country Link
EP (1) EP1412861A2 (hu)
JP (1) JP3949107B2 (hu)
KR (1) KR100940347B1 (hu)
CN (1) CN1288525C (hu)
AP (1) AP2004002958A0 (hu)
AU (1) AU2002325998B2 (hu)
BR (1) BR0211374A (hu)
CA (1) CA2454090A1 (hu)
CO (1) CO5550508A2 (hu)
CR (1) CR7231A (hu)
EA (1) EA005465B1 (hu)
EC (1) ECSP044951A (hu)
FR (1) FR2828305B1 (hu)
GE (1) GEP20053647B (hu)
HK (1) HK1070155A1 (hu)
HR (1) HRP20040049A2 (hu)
HU (1) HUP0400228A2 (hu)
IL (1) IL159953A0 (hu)
IS (1) IS7121A (hu)
MA (1) MA26126A1 (hu)
MX (1) MXPA04000488A (hu)
NO (1) NO20040232L (hu)
OA (1) OA12699A (hu)
PL (1) PL367366A1 (hu)
TN (1) TNSN04012A1 (hu)
UA (1) UA77186C2 (hu)
WO (1) WO2003012649A2 (hu)
YU (1) YU5404A (hu)
ZA (1) ZA200400348B (hu)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2852415B1 (fr) * 2003-03-11 2005-06-24 Actikey Support de type cle, de controle de l'acces a des donnees et/ou a un logiciel et procede correspondant
CN107194212B (zh) * 2017-06-21 2020-04-17 株洲中车时代电气股份有限公司 一种显示器源代码中协议内容的保护方法

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (fr) * 1988-08-01 1990-02-02 Pionchon Philippe Procede et dispositif de protection d'un logiciel, en particulier contre les copies non autorisees
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
AU7957998A (en) * 1997-06-09 1999-01-25 Intertrust, Incorporated Obfuscation techniques for enhancing software security
JP2002518727A (ja) * 1998-06-12 2002-06-25 ジェムプリュス ソフトウェア製品の実行の制御方法

Also Published As

Publication number Publication date
HRP20040049A2 (en) 2004-06-30
CA2454090A1 (fr) 2003-02-13
IS7121A (is) 2004-01-20
MA26126A1 (fr) 2004-04-01
OA12699A (en) 2006-06-23
EA005465B1 (ru) 2005-02-24
TNSN04012A1 (fr) 2006-06-01
FR2828305A1 (fr) 2003-02-07
BR0211374A (pt) 2004-07-20
HK1070155A1 (en) 2005-06-10
FR2828305B1 (fr) 2010-09-03
ECSP044951A (es) 2004-04-28
UA77186C2 (en) 2006-11-15
AU2002325998B2 (en) 2008-10-30
ZA200400348B (en) 2005-03-30
CN1535410A (zh) 2004-10-06
IL159953A0 (en) 2004-06-20
WO2003012649A3 (fr) 2003-12-24
JP2004537806A (ja) 2004-12-16
GEP20053647B (en) 2005-10-25
MXPA04000488A (es) 2005-03-07
PL367366A1 (en) 2005-02-21
CN1288525C (zh) 2006-12-06
AP2004002958A0 (en) 2004-03-31
WO2003012649A2 (fr) 2003-02-13
NO20040232L (no) 2004-03-30
CO5550508A2 (es) 2005-08-31
EP1412861A2 (fr) 2004-04-28
KR100940347B1 (ko) 2010-02-04
KR20040027881A (ko) 2004-04-01
JP3949107B2 (ja) 2007-07-25
EA200400057A1 (ru) 2004-06-24
CR7231A (es) 2005-07-21
YU5404A (sh) 2006-08-17

Similar Documents

Publication Publication Date Title
WO2003034188A3 (en) Method and system for detecting unauthorised executable programs _______________________________________________________________
PL324525A1 (en) Method of protecting computer software against unauthorised use
WO2004111760A3 (en) Application layer security method and system
WO2001086372A3 (en) Information security method and system
ATE386304T1 (de) Computersystemschutz
GB2421613B (en) System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
EP1376302A3 (en) Secure media path methods, systems, and architectures
ATE507536T1 (de) Verfahren und vorrichtung zum verbessern des schutzes der mit rechnern präsentierten informationen
WO2003021403A8 (en) Method to protect software against unauthorized use
DE60236498D1 (de) Verfahren und vorrichtung zum tarnen von daten, informationen und funktionstransformationen
DE60332175D1 (de) Verfahren und System zur Verhinderung von Startkode-Emulation und Stopfdaten
BR0005192A (pt) Aparelho de processamento de dados, unidade terminal possuindo um meio de gravação não volátil fixável/destacável, e, processos de processamento de dados, e de transmissão de um aparelho de processamento de dados
NO20041765L (no) Krypteringssystem for datasikkerhet
WO2006035227A3 (en) Source code protection
ATE450844T1 (de) Vorrichtung und verfahren zum erkennen wenigstens einer person, zugriffskontrollvorrichtung und - system und entsprechende anwendungen
HUP0400228A2 (en) Method for protecting a software using a so-called variable principle against its unauthorised use
WO2006053183A3 (en) Methods and systems for securing data processing devices
HUP0400223A2 (en) Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
HUP0400221A2 (en) Method for protecting a software using a so-called conditional jump principle against its unauthorised use
HUP0400239A2 (en) Method for protecting a software using a so-called elementary functions principle against its unauthorised use
HUP0400232A2 (en) Method for protecting a software using a so-called renaming principle against its unauthorised use
HUP0400234A2 (en) Method for protecting a software using a so-called detection and coercion principle against its unauthorised use
Curran et al. Dependency in software watermarking
TW200518544A (en) Partition and recovery of a verifiable digital secret
ES2179775A1 (es) Sistema para la proteccion contra el uso ilegitimo y gestion de licencias de software basado en dispositivos procesadores autonomos y criptografia.

Legal Events

Date Code Title Description
FD9A Lapse of provisional protection due to non-payment of fees