HUP0400232A2 - Method for protecting a software using a so-called renaming principle against its unauthorised use - Google Patents

Method for protecting a software using a so-called renaming principle against its unauthorised use

Info

Publication number
HUP0400232A2
HUP0400232A2 HU0400232A HUP0400232A HUP0400232A2 HU P0400232 A2 HUP0400232 A2 HU P0400232A2 HU 0400232 A HU0400232 A HU 0400232A HU P0400232 A HUP0400232 A HU P0400232A HU P0400232 A2 HUP0400232 A2 HU P0400232A2
Authority
HU
Hungary
Prior art keywords
renaming
security unit
independent security
executed
protecting
Prior art date
Application number
HU0400232A
Other languages
Hungarian (hu)
Inventor
Jean-Christophe Cuenod
Gilles Sgro
Original Assignee
Validy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Validy filed Critical Validy
Publication of HUP0400232A2 publication Critical patent/HUP0400232A2/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Storage Device Security (AREA)
  • Executing Machine-Instructions (AREA)
  • Logic Circuits (AREA)

Abstract

A találmány célja egy adatfeldolgozó rendszerben működő védtelenszoftver jogosulatlan használat elleni védelme legalább egy önállóbiztonsági egység alkalmazásával. Az eljárás során meghatároznak egyolyan függő függvénykészletet, melynek függő függvényeit a önállóbiztonsági egységben kell végrehajtani, a készlet számára egy kiváltóparancs készletet, amelynek kiváltó parancsait az adatfeldolgozórendszerben kell végrehajtani, és amelyekkel a önálló biztonságiegységben a függő függvények végrehajtását kell kiváltani, mindenegyes kiváltó parancshoz egy sorrendet, egy eljárást a sorrendekátnevezésére, és egy használati fázisban a önálló biztonsági egységbentörténő végrehajtásra kialakított visszaállító eszközzel lehetővéteszik a végrehajtandó függő függvénynek az átnevezett sorrendbőltörténő visszaállítását. ÓThe purpose of the invention is to protect unprotected software operating in a data processing system against unauthorized use by using at least one independent security unit. During the procedure, a set of dependent functions is defined, whose dependent functions must be executed in the independent security unit, a set of trigger commands for the set, the trigger commands of which must be executed in the data processing system, and with which the execution of the dependent functions must be triggered in the independent security unit, a sequence for each trigger command, a procedure for renaming the sequences, and with a reset tool designed for execution in the independent security unit in a use phase, they enable the recovery of the dependent function to be executed from the renamed sequence. HE

HU0400232A 2001-07-31 2002-07-04 Method for protecting a software using a so-called renaming principle against its unauthorised use HUP0400232A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0110246A FR2828303B1 (en) 2001-07-31 2001-07-31 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "RENAMING" AGAINST ITS UNAUTHORIZED USE
PCT/FR2002/002340 WO2003012604A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called renaming principle against its unauthorised use

Publications (1)

Publication Number Publication Date
HUP0400232A2 true HUP0400232A2 (en) 2004-09-28

Family

ID=8866121

Family Applications (1)

Application Number Title Priority Date Filing Date
HU0400232A HUP0400232A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called renaming principle against its unauthorised use

Country Status (19)

Country Link
EP (1) EP1412837A2 (en)
JP (1) JP3949105B2 (en)
KR (1) KR20040032858A (en)
CN (1) CN1288524C (en)
BR (1) BR0211375A (en)
CA (1) CA2454094A1 (en)
FR (1) FR2828303B1 (en)
HK (1) HK1070154A1 (en)
HR (1) HRP20040048A2 (en)
HU (1) HUP0400232A2 (en)
IL (1) IL159951A0 (en)
MA (1) MA26127A1 (en)
MX (1) MXPA04000596A (en)
NO (1) NO20040231L (en)
PL (1) PL367440A1 (en)
TN (1) TNSN04013A1 (en)
WO (1) WO2003012604A2 (en)
YU (1) YU5604A (en)
ZA (1) ZA200400350B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100346252C (en) * 2005-09-28 2007-10-31 珠海金山软件股份有限公司 Computer software security loophole repairing apparatus and method
JP4770425B2 (en) * 2005-11-24 2011-09-14 富士ゼロックス株式会社 Program, method and apparatus for creating protected execution program
CN100437615C (en) * 2006-10-16 2008-11-26 珠海金山软件股份有限公司 Method for protecting dynamic chanining bank interface under windows platform
CN103198244B (en) * 2013-03-26 2016-06-29 北京深思数盾科技股份有限公司 The method of protection dynamic link library

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (en) * 1988-08-01 1990-02-02 Pionchon Philippe METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
AU7957998A (en) * 1997-06-09 1999-01-25 Intertrust, Incorporated Obfuscation techniques for enhancing software security
JP2002518727A (en) * 1998-06-12 2002-06-25 ジェムプリュス How to control the execution of software products

Also Published As

Publication number Publication date
CN1288524C (en) 2006-12-06
YU5604A (en) 2006-08-17
NO20040231L (en) 2004-03-30
WO2003012604A2 (en) 2003-02-13
ZA200400350B (en) 2005-03-30
JP3949105B2 (en) 2007-07-25
KR20040032858A (en) 2004-04-17
IL159951A0 (en) 2004-06-20
TNSN04013A1 (en) 2006-06-01
HK1070154A1 (en) 2005-06-10
BR0211375A (en) 2004-08-17
JP2004537800A (en) 2004-12-16
EP1412837A2 (en) 2004-04-28
FR2828303B1 (en) 2010-09-03
FR2828303A1 (en) 2003-02-07
CA2454094A1 (en) 2003-02-13
MXPA04000596A (en) 2005-02-17
WO2003012604A3 (en) 2004-01-22
MA26127A1 (en) 2004-04-01
CN1535408A (en) 2004-10-06
PL367440A1 (en) 2005-02-21
HRP20040048A2 (en) 2004-06-30

Similar Documents

Publication Publication Date Title
WO2006065956A3 (en) Protecting computing systems from unauthorized programs
WO2003034188A3 (en) Method and system for detecting unauthorised executable programs _______________________________________________________________
WO2006133222A3 (en) Constraint injection system for immunizing software programs against vulnerabilities and attacks
WO2004111760A3 (en) Application layer security method and system
WO2003021403A8 (en) Method to protect software against unauthorized use
WO2007011816A3 (en) An improved means for protecting computers from malicious software
WO2007147495A3 (en) Method and system for intrusion detection
DE10249427B4 (en) A method for defining the security state of a computer system
WO2007041501A3 (en) Secure execution environment by preventing execution of unauthorized boot loaders
WO2004062164A3 (en) Methods and apparatus for managing secured software for a wireless device
WO2006036320A3 (en) System and method for creating a security application for programmable cryptography module
WO2003054662A3 (en) A system and method for preventing unauthorized use of protected software utilizing a portable security device
HUP0400232A2 (en) Method for protecting a software using a so-called renaming principle against its unauthorised use
Butler et al. Raide: Rootkit analysis identification elimination
HUP0400223A2 (en) Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
HUP0400239A2 (en) Method for protecting a software using a so-called elementary functions principle against its unauthorised use
HUP0400228A2 (en) Method for protecting a software using a so-called variable principle against its unauthorised use
HUP0400221A2 (en) Method for protecting a software using a so-called conditional jump principle against its unauthorised use
WO2003060726A3 (en) Method for licensing software programs
EA200700350A1 (en) THE METHOD OF PROTECTING COMPUTER SYSTEMS FROM ENCRYPTED AND POLYMORPHIC VIRUSES
IS7120A (en) Method of protecting software against unauthorized use by using so-called detection and coercion laws
WO2003096167A3 (en) Method for detecting events, software program and detection device
Kim et al. A Study on Memory Hacking Prevention System in Windows Environment
Magarani et al. Signature Free Virus Blocking Method to Detect Software Code Security
Burnett Code Grabbers: Testing for GUI security

Legal Events

Date Code Title Description
FD9A Lapse of provisional protection due to non-payment of fees