HUP0400239A2 - Method for protecting a software using a so-called elementary functions principle against its unauthorised use - Google Patents

Method for protecting a software using a so-called elementary functions principle against its unauthorised use

Info

Publication number
HUP0400239A2
HUP0400239A2 HU0400239A HUP0400239A HUP0400239A2 HU P0400239 A2 HUP0400239 A2 HU P0400239A2 HU 0400239 A HU0400239 A HU 0400239A HU P0400239 A HUP0400239 A HU P0400239A HU P0400239 A2 HUP0400239 A2 HU P0400239A2
Authority
HU
Hungary
Prior art keywords
software
elementary functions
protecting
source code
unauthorised use
Prior art date
Application number
HU0400239A
Other languages
Hungarian (hu)
Inventor
Jean-Christophe Cuenod
Gilles Sgro
Original Assignee
Validy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Validy filed Critical Validy
Publication of HUP0400239A2 publication Critical patent/HUP0400239A2/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices

Abstract

A találmány célja egy adatfeldolgozó rendszerben működő védtelenszoftver jogosulatlan használat elleni védelme egy önálló biztonságiegység alkalmazásával. Az eljárás során meghatároznak egy elemifüggvény készletet, amelynek függvényeit egy egységben kellvégrehajtani, továbbá egy elemi parancs készletet, majd létrehoznak avédett szoftvert azáltal, hogy kiválasztanak legalább egy algoritmikusműveletet, a védtelen szoftver forráskódú változatából előállítanakegy védett szoftver forráskódú változatot a védtelen szoftverforráskódú változatának olyan módosításával, hogy a kiválasztottalgoritmikus műveletet a védett szoftver végrehajtása során az elemifüggvényekkel kell végrehajtani. ÓThe purpose of the invention is to protect unprotected software operating in a data processing system against unauthorized use by using an independent security unit. During the procedure, a set of elementary functions, the functions of which must be executed in a unit, and a set of elementary commands are defined, then the protected software is created by selecting at least one algorithmic operation, a source code version of the protected software is produced from the source code version of the unprotected software by modifying the source code version of the unprotected software in such a way that the selected algorithmic operation must be performed with the elementary functions during the execution of the protected software. HE

HU0400239A 2001-07-31 2002-07-04 Method for protecting a software using a so-called elementary functions principle against its unauthorised use HUP0400239A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0110241A FR2828300B1 (en) 2001-07-31 2001-07-31 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "ELEMENTARY FUNCTIONS" AGAINST ITS UNAUTHORIZED USE
PCT/FR2002/002344 WO2003012605A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called elementary functions principle against its unauthorised use

Publications (1)

Publication Number Publication Date
HUP0400239A2 true HUP0400239A2 (en) 2004-09-28

Family

ID=8866116

Family Applications (1)

Application Number Title Priority Date Filing Date
HU0400239A HUP0400239A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called elementary functions principle against its unauthorised use

Country Status (19)

Country Link
EP (1) EP1412839A2 (en)
JP (1) JP3949106B2 (en)
KR (1) KR20040032860A (en)
CN (1) CN1275115C (en)
BR (1) BR0211372A (en)
CA (1) CA2454096A1 (en)
FR (1) FR2828300B1 (en)
HK (1) HK1070958A1 (en)
HR (1) HRP20040044A2 (en)
HU (1) HUP0400239A2 (en)
IL (1) IL159956A0 (en)
MA (1) MA26123A1 (en)
MX (1) MXPA04000595A (en)
NO (1) NO20040230L (en)
PL (1) PL367486A1 (en)
TN (1) TNSN04009A1 (en)
WO (1) WO2003012605A2 (en)
YU (1) YU5804A (en)
ZA (1) ZA200400353B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109102436B (en) * 2018-06-22 2020-10-27 芯启源(上海)半导体科技有限公司 IP soft core property protection and infringement identification method based on USB3.0 protocol TS1 training sequence

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (en) * 1988-08-01 1990-02-02 Pionchon Philippe METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
WO1999066387A1 (en) * 1998-06-12 1999-12-23 Gemplus Method for verifying the execution of a software product
CN1260055A (en) * 1997-06-09 2000-07-12 联信公司 Obfuscation techniques for enhancing software security

Also Published As

Publication number Publication date
FR2828300A1 (en) 2003-02-07
HRP20040044A2 (en) 2005-02-28
NO20040230L (en) 2004-03-30
WO2003012605A2 (en) 2003-02-13
KR20040032860A (en) 2004-04-17
PL367486A1 (en) 2005-02-21
FR2828300B1 (en) 2010-09-03
YU5804A (en) 2006-05-25
CN1535409A (en) 2004-10-06
JP2004537801A (en) 2004-12-16
ZA200400353B (en) 2005-03-30
IL159956A0 (en) 2004-06-20
WO2003012605A3 (en) 2003-12-24
MA26123A1 (en) 2004-04-01
CA2454096A1 (en) 2003-02-13
EP1412839A2 (en) 2004-04-28
JP3949106B2 (en) 2007-07-25
TNSN04009A1 (en) 2006-06-01
CN1275115C (en) 2006-09-13
HK1070958A1 (en) 2005-06-30
MXPA04000595A (en) 2005-02-17
BR0211372A (en) 2004-09-14

Similar Documents

Publication Publication Date Title
WO2003034188A3 (en) Method and system for detecting unauthorised executable programs _______________________________________________________________
CA3023939C (en) Method and apparatus for dynamic executable verification
WO2001086372A3 (en) Information security method and system
KR101687439B1 (en) A processor-implemented method for ensuring software integrity
EP2388730A1 (en) Method for generating software code
WO2006065956A3 (en) Protecting computing systems from unauthorized programs
WO2006036320A3 (en) System and method for creating a security application for programmable cryptography module
TW200731109A (en) Secure execution environment by preventing execution of unauthorized boot loaders
WO2006101549A3 (en) Secure system for allowing the execution of authorized computer program code
IL157542A0 (en) System and method for restoring computer systems damaged by a malicious computer program
WO2007011816A3 (en) An improved means for protecting computers from malicious software
WO2003090021A3 (en) Security framework for protecting rights in computer software
WO2006035227A3 (en) Source code protection
ATE507536T1 (en) METHOD AND APPARATUS FOR IMPROVING THE PROTECTION OF INFORMATION PRESENTED BY COMPUTERS
US20070143630A1 (en) Method and device for protecting a program comprising a functional block
CN1742247A (en) Architecture for encrypted application progam installation
ATE450844T1 (en) DEVICE AND METHOD FOR DETECTING AT LEAST ONE PERSON, ACCESS CONTROL DEVICE AND SYSTEM AND CORRESPONDING APPLICATIONS
HUP0400239A2 (en) Method for protecting a software using a so-called elementary functions principle against its unauthorised use
HUP0400223A2 (en) Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
EE200300261A (en) A security tool and method for a security assurance system
HUP0400228A2 (en) Method for protecting a software using a so-called variable principle against its unauthorised use
HUP0400232A2 (en) Method for protecting a software using a so-called renaming principle against its unauthorised use
HUP0400221A2 (en) Method for protecting a software using a so-called conditional jump principle against its unauthorised use
EP2947590B1 (en) Program code obfuscation based upon recently executed program code
CN108667594B (en) Software program module integrity detection method based on PKI public key algorithm

Legal Events

Date Code Title Description
FD9A Lapse of provisional protection due to non-payment of fees