HUP0400239A2 - Method for protecting a software using a so-called elementary functions principle against its unauthorised use - Google Patents
Method for protecting a software using a so-called elementary functions principle against its unauthorised useInfo
- Publication number
- HUP0400239A2 HUP0400239A2 HU0400239A HUP0400239A HUP0400239A2 HU P0400239 A2 HUP0400239 A2 HU P0400239A2 HU 0400239 A HU0400239 A HU 0400239A HU P0400239 A HUP0400239 A HU P0400239A HU P0400239 A2 HUP0400239 A2 HU P0400239A2
- Authority
- HU
- Hungary
- Prior art keywords
- software
- elementary functions
- protecting
- source code
- unauthorised use
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
Abstract
A találmány célja egy adatfeldolgozó rendszerben működő védtelenszoftver jogosulatlan használat elleni védelme egy önálló biztonságiegység alkalmazásával. Az eljárás során meghatároznak egy elemifüggvény készletet, amelynek függvényeit egy egységben kellvégrehajtani, továbbá egy elemi parancs készletet, majd létrehoznak avédett szoftvert azáltal, hogy kiválasztanak legalább egy algoritmikusműveletet, a védtelen szoftver forráskódú változatából előállítanakegy védett szoftver forráskódú változatot a védtelen szoftverforráskódú változatának olyan módosításával, hogy a kiválasztottalgoritmikus műveletet a védett szoftver végrehajtása során az elemifüggvényekkel kell végrehajtani. ÓThe purpose of the invention is to protect unprotected software operating in a data processing system against unauthorized use by using an independent security unit. During the procedure, a set of elementary functions, the functions of which must be executed in a unit, and a set of elementary commands are defined, then the protected software is created by selecting at least one algorithmic operation, a source code version of the protected software is produced from the source code version of the unprotected software by modifying the source code version of the unprotected software in such a way that the selected algorithmic operation must be performed with the elementary functions during the execution of the protected software. HE
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0110241A FR2828300B1 (en) | 2001-07-31 | 2001-07-31 | METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "ELEMENTARY FUNCTIONS" AGAINST ITS UNAUTHORIZED USE |
PCT/FR2002/002344 WO2003012605A2 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called elementary functions principle against its unauthorised use |
Publications (1)
Publication Number | Publication Date |
---|---|
HUP0400239A2 true HUP0400239A2 (en) | 2004-09-28 |
Family
ID=8866116
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
HU0400239A HUP0400239A2 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called elementary functions principle against its unauthorised use |
Country Status (19)
Country | Link |
---|---|
EP (1) | EP1412839A2 (en) |
JP (1) | JP3949106B2 (en) |
KR (1) | KR20040032860A (en) |
CN (1) | CN1275115C (en) |
BR (1) | BR0211372A (en) |
CA (1) | CA2454096A1 (en) |
FR (1) | FR2828300B1 (en) |
HK (1) | HK1070958A1 (en) |
HR (1) | HRP20040044A2 (en) |
HU (1) | HUP0400239A2 (en) |
IL (1) | IL159956A0 (en) |
MA (1) | MA26123A1 (en) |
MX (1) | MXPA04000595A (en) |
NO (1) | NO20040230L (en) |
PL (1) | PL367486A1 (en) |
TN (1) | TNSN04009A1 (en) |
WO (1) | WO2003012605A2 (en) |
YU (1) | YU5804A (en) |
ZA (1) | ZA200400353B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109102436B (en) * | 2018-06-22 | 2020-10-27 | 芯启源(上海)半导体科技有限公司 | IP soft core property protection and infringement identification method based on USB3.0 protocol TS1 training sequence |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2634917A1 (en) * | 1988-08-01 | 1990-02-02 | Pionchon Philippe | METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
WO1999066387A1 (en) * | 1998-06-12 | 1999-12-23 | Gemplus | Method for verifying the execution of a software product |
CN1260055A (en) * | 1997-06-09 | 2000-07-12 | 联信公司 | Obfuscation techniques for enhancing software security |
-
2001
- 2001-07-31 FR FR0110241A patent/FR2828300B1/en not_active Expired - Lifetime
-
2002
- 2002-07-04 YU YU5804A patent/YU5804A/en unknown
- 2002-07-04 JP JP2003517723A patent/JP3949106B2/en not_active Expired - Fee Related
- 2002-07-04 MX MXPA04000595A patent/MXPA04000595A/en unknown
- 2002-07-04 IL IL15995602A patent/IL159956A0/en unknown
- 2002-07-04 PL PL02367486A patent/PL367486A1/en not_active Application Discontinuation
- 2002-07-04 KR KR10-2004-7000810A patent/KR20040032860A/en not_active Application Discontinuation
- 2002-07-04 CN CNB028146743A patent/CN1275115C/en not_active Expired - Fee Related
- 2002-07-04 EP EP02762529A patent/EP1412839A2/en not_active Withdrawn
- 2002-07-04 BR BR0211372-4A patent/BR0211372A/en not_active Application Discontinuation
- 2002-07-04 WO PCT/FR2002/002344 patent/WO2003012605A2/en active Application Filing
- 2002-07-04 HU HU0400239A patent/HUP0400239A2/en unknown
- 2002-07-04 CA CA002454096A patent/CA2454096A1/en not_active Abandoned
-
2004
- 2004-01-16 ZA ZA2004/00353A patent/ZA200400353B/en unknown
- 2004-01-19 MA MA27489A patent/MA26123A1/en unknown
- 2004-01-19 HR HR20040044A patent/HRP20040044A2/en not_active Application Discontinuation
- 2004-01-19 NO NO20040230A patent/NO20040230L/en not_active Application Discontinuation
- 2004-01-19 TN TNP2004000009A patent/TNSN04009A1/en unknown
-
2005
- 2005-03-30 HK HK05102680A patent/HK1070958A1/en not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
FR2828300A1 (en) | 2003-02-07 |
HRP20040044A2 (en) | 2005-02-28 |
NO20040230L (en) | 2004-03-30 |
WO2003012605A2 (en) | 2003-02-13 |
KR20040032860A (en) | 2004-04-17 |
PL367486A1 (en) | 2005-02-21 |
FR2828300B1 (en) | 2010-09-03 |
YU5804A (en) | 2006-05-25 |
CN1535409A (en) | 2004-10-06 |
JP2004537801A (en) | 2004-12-16 |
ZA200400353B (en) | 2005-03-30 |
IL159956A0 (en) | 2004-06-20 |
WO2003012605A3 (en) | 2003-12-24 |
MA26123A1 (en) | 2004-04-01 |
CA2454096A1 (en) | 2003-02-13 |
EP1412839A2 (en) | 2004-04-28 |
JP3949106B2 (en) | 2007-07-25 |
TNSN04009A1 (en) | 2006-06-01 |
CN1275115C (en) | 2006-09-13 |
HK1070958A1 (en) | 2005-06-30 |
MXPA04000595A (en) | 2005-02-17 |
BR0211372A (en) | 2004-09-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2003034188A3 (en) | Method and system for detecting unauthorised executable programs _______________________________________________________________ | |
CA3023939C (en) | Method and apparatus for dynamic executable verification | |
WO2001086372A3 (en) | Information security method and system | |
KR101687439B1 (en) | A processor-implemented method for ensuring software integrity | |
EP2388730A1 (en) | Method for generating software code | |
WO2006065956A3 (en) | Protecting computing systems from unauthorized programs | |
WO2006036320A3 (en) | System and method for creating a security application for programmable cryptography module | |
TW200731109A (en) | Secure execution environment by preventing execution of unauthorized boot loaders | |
WO2006101549A3 (en) | Secure system for allowing the execution of authorized computer program code | |
IL157542A0 (en) | System and method for restoring computer systems damaged by a malicious computer program | |
WO2007011816A3 (en) | An improved means for protecting computers from malicious software | |
WO2003090021A3 (en) | Security framework for protecting rights in computer software | |
WO2006035227A3 (en) | Source code protection | |
ATE507536T1 (en) | METHOD AND APPARATUS FOR IMPROVING THE PROTECTION OF INFORMATION PRESENTED BY COMPUTERS | |
US20070143630A1 (en) | Method and device for protecting a program comprising a functional block | |
CN1742247A (en) | Architecture for encrypted application progam installation | |
ATE450844T1 (en) | DEVICE AND METHOD FOR DETECTING AT LEAST ONE PERSON, ACCESS CONTROL DEVICE AND SYSTEM AND CORRESPONDING APPLICATIONS | |
HUP0400239A2 (en) | Method for protecting a software using a so-called elementary functions principle against its unauthorised use | |
HUP0400223A2 (en) | Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use | |
EE200300261A (en) | A security tool and method for a security assurance system | |
HUP0400228A2 (en) | Method for protecting a software using a so-called variable principle against its unauthorised use | |
HUP0400232A2 (en) | Method for protecting a software using a so-called renaming principle against its unauthorised use | |
HUP0400221A2 (en) | Method for protecting a software using a so-called conditional jump principle against its unauthorised use | |
EP2947590B1 (en) | Program code obfuscation based upon recently executed program code | |
CN108667594B (en) | Software program module integrity detection method based on PKI public key algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FD9A | Lapse of provisional protection due to non-payment of fees |