HUP0400232A2 - Method for protecting a software using a so-called renaming principle against its unauthorised use - Google Patents
Method for protecting a software using a so-called renaming principle against its unauthorised useInfo
- Publication number
- HUP0400232A2 HUP0400232A2 HU0400232A HUP0400232A HUP0400232A2 HU P0400232 A2 HUP0400232 A2 HU P0400232A2 HU 0400232 A HU0400232 A HU 0400232A HU P0400232 A HUP0400232 A HU P0400232A HU P0400232 A2 HUP0400232 A2 HU P0400232A2
- Authority
- HU
- Hungary
- Prior art keywords
- renaming
- security unit
- independent security
- executed
- protecting
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 3
- 230000001419 dependent effect Effects 0.000 abstract 4
- 238000011084 recovery Methods 0.000 abstract 1
- 230000001960 triggered effect Effects 0.000 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Storage Device Security (AREA)
- Executing Machine-Instructions (AREA)
- Logic Circuits (AREA)
Abstract
A találmány célja egy adatfeldolgozó rendszerben működő védtelenszoftver jogosulatlan használat elleni védelme legalább egy önállóbiztonsági egység alkalmazásával. Az eljárás során meghatároznak egyolyan függő függvénykészletet, melynek függő függvényeit a önállóbiztonsági egységben kell végrehajtani, a készlet számára egy kiváltóparancs készletet, amelynek kiváltó parancsait az adatfeldolgozórendszerben kell végrehajtani, és amelyekkel a önálló biztonságiegységben a függő függvények végrehajtását kell kiváltani, mindenegyes kiváltó parancshoz egy sorrendet, egy eljárást a sorrendekátnevezésére, és egy használati fázisban a önálló biztonsági egységbentörténő végrehajtásra kialakított visszaállító eszközzel lehetővéteszik a végrehajtandó függő függvénynek az átnevezett sorrendbőltörténő visszaállítását. ÓThe purpose of the invention is to protect unprotected software operating in a data processing system against unauthorized use by using at least one independent security unit. During the procedure, a set of dependent functions is defined, whose dependent functions must be executed in the independent security unit, a set of trigger commands for the set, the trigger commands of which must be executed in the data processing system, and with which the execution of the dependent functions must be triggered in the independent security unit, a sequence for each trigger command, a procedure for renaming the sequences, and with a reset tool designed for execution in the independent security unit in a use phase, they enable the recovery of the dependent function to be executed from the renamed sequence. HE
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0110246A FR2828303B1 (en) | 2001-07-31 | 2001-07-31 | METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "RENAMING" AGAINST ITS UNAUTHORIZED USE |
PCT/FR2002/002340 WO2003012604A2 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called renaming principle against its unauthorised use |
Publications (1)
Publication Number | Publication Date |
---|---|
HUP0400232A2 true HUP0400232A2 (en) | 2004-09-28 |
Family
ID=8866121
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
HU0400232A HUP0400232A2 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called renaming principle against its unauthorised use |
Country Status (19)
Country | Link |
---|---|
EP (1) | EP1412837A2 (en) |
JP (1) | JP3949105B2 (en) |
KR (1) | KR20040032858A (en) |
CN (1) | CN1288524C (en) |
BR (1) | BR0211375A (en) |
CA (1) | CA2454094A1 (en) |
FR (1) | FR2828303B1 (en) |
HK (1) | HK1070154A1 (en) |
HR (1) | HRP20040048A2 (en) |
HU (1) | HUP0400232A2 (en) |
IL (1) | IL159951A0 (en) |
MA (1) | MA26127A1 (en) |
MX (1) | MXPA04000596A (en) |
NO (1) | NO20040231L (en) |
PL (1) | PL367440A1 (en) |
TN (1) | TNSN04013A1 (en) |
WO (1) | WO2003012604A2 (en) |
YU (1) | YU5604A (en) |
ZA (1) | ZA200400350B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100346252C (en) * | 2005-09-28 | 2007-10-31 | 珠海金山软件股份有限公司 | Computer software security loophole repairing apparatus and method |
JP4770425B2 (en) * | 2005-11-24 | 2011-09-14 | 富士ゼロックス株式会社 | Program, method and apparatus for creating protected execution program |
CN100437615C (en) * | 2006-10-16 | 2008-11-26 | 珠海金山软件股份有限公司 | Method for protecting dynamic chanining bank interface under windows platform |
CN103198244B (en) * | 2013-03-26 | 2016-06-29 | 北京深思数盾科技股份有限公司 | The method of protection dynamic link library |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2634917A1 (en) * | 1988-08-01 | 1990-02-02 | Pionchon Philippe | METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
AU7957998A (en) * | 1997-06-09 | 1999-01-25 | Intertrust, Incorporated | Obfuscation techniques for enhancing software security |
JP2002518727A (en) * | 1998-06-12 | 2002-06-25 | ジェムプリュス | How to control the execution of software products |
-
2001
- 2001-07-31 FR FR0110246A patent/FR2828303B1/en not_active Expired - Lifetime
-
2002
- 2002-07-04 KR KR10-2004-7000806A patent/KR20040032858A/en not_active Application Discontinuation
- 2002-07-04 EP EP02762526A patent/EP1412837A2/en not_active Withdrawn
- 2002-07-04 HU HU0400232A patent/HUP0400232A2/en unknown
- 2002-07-04 CA CA002454094A patent/CA2454094A1/en not_active Abandoned
- 2002-07-04 JP JP2003517722A patent/JP3949105B2/en not_active Expired - Fee Related
- 2002-07-04 BR BR0211375-9A patent/BR0211375A/en not_active IP Right Cessation
- 2002-07-04 MX MXPA04000596A patent/MXPA04000596A/en unknown
- 2002-07-04 YU YU5604A patent/YU5604A/en unknown
- 2002-07-04 IL IL15995102A patent/IL159951A0/en unknown
- 2002-07-04 CN CNB028146719A patent/CN1288524C/en not_active Expired - Fee Related
- 2002-07-04 WO PCT/FR2002/002340 patent/WO2003012604A2/en active Application Filing
- 2002-07-04 PL PL02367440A patent/PL367440A1/en not_active Application Discontinuation
-
2004
- 2004-01-16 ZA ZA2004/00350A patent/ZA200400350B/en unknown
- 2004-01-19 HR HR20040048A patent/HRP20040048A2/en not_active Application Discontinuation
- 2004-01-19 MA MA27493A patent/MA26127A1/en unknown
- 2004-01-19 TN TNP2004000013A patent/TNSN04013A1/en unknown
- 2004-01-19 NO NO20040231A patent/NO20040231L/en not_active Application Discontinuation
-
2005
- 2005-03-30 HK HK05102677A patent/HK1070154A1/en not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
CN1288524C (en) | 2006-12-06 |
YU5604A (en) | 2006-08-17 |
NO20040231L (en) | 2004-03-30 |
WO2003012604A2 (en) | 2003-02-13 |
ZA200400350B (en) | 2005-03-30 |
JP3949105B2 (en) | 2007-07-25 |
KR20040032858A (en) | 2004-04-17 |
IL159951A0 (en) | 2004-06-20 |
TNSN04013A1 (en) | 2006-06-01 |
HK1070154A1 (en) | 2005-06-10 |
BR0211375A (en) | 2004-08-17 |
JP2004537800A (en) | 2004-12-16 |
EP1412837A2 (en) | 2004-04-28 |
FR2828303B1 (en) | 2010-09-03 |
FR2828303A1 (en) | 2003-02-07 |
CA2454094A1 (en) | 2003-02-13 |
MXPA04000596A (en) | 2005-02-17 |
WO2003012604A3 (en) | 2004-01-22 |
MA26127A1 (en) | 2004-04-01 |
CN1535408A (en) | 2004-10-06 |
PL367440A1 (en) | 2005-02-21 |
HRP20040048A2 (en) | 2004-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2006065956A3 (en) | Protecting computing systems from unauthorized programs | |
WO2003034188A3 (en) | Method and system for detecting unauthorised executable programs _______________________________________________________________ | |
WO2006133222A3 (en) | Constraint injection system for immunizing software programs against vulnerabilities and attacks | |
WO2004111760A3 (en) | Application layer security method and system | |
WO2003021403A8 (en) | Method to protect software against unauthorized use | |
WO2007011816A3 (en) | An improved means for protecting computers from malicious software | |
WO2007147495A3 (en) | Method and system for intrusion detection | |
DE10249427B4 (en) | A method for defining the security state of a computer system | |
WO2007041501A3 (en) | Secure execution environment by preventing execution of unauthorized boot loaders | |
WO2004062164A3 (en) | Methods and apparatus for managing secured software for a wireless device | |
WO2006036320A3 (en) | System and method for creating a security application for programmable cryptography module | |
WO2003054662A3 (en) | A system and method for preventing unauthorized use of protected software utilizing a portable security device | |
HUP0400232A2 (en) | Method for protecting a software using a so-called renaming principle against its unauthorised use | |
Butler et al. | Raide: Rootkit analysis identification elimination | |
HUP0400223A2 (en) | Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use | |
HUP0400239A2 (en) | Method for protecting a software using a so-called elementary functions principle against its unauthorised use | |
HUP0400228A2 (en) | Method for protecting a software using a so-called variable principle against its unauthorised use | |
HUP0400221A2 (en) | Method for protecting a software using a so-called conditional jump principle against its unauthorised use | |
WO2003060726A3 (en) | Method for licensing software programs | |
EA200700350A1 (en) | THE METHOD OF PROTECTING COMPUTER SYSTEMS FROM ENCRYPTED AND POLYMORPHIC VIRUSES | |
IS7120A (en) | Method of protecting software against unauthorized use by using so-called detection and coercion laws | |
WO2003096167A3 (en) | Method for detecting events, software program and detection device | |
Kim et al. | A Study on Memory Hacking Prevention System in Windows Environment | |
Magarani et al. | Signature Free Virus Blocking Method to Detect Software Code Security | |
Burnett | Code Grabbers: Testing for GUI security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FD9A | Lapse of provisional protection due to non-payment of fees |