UA77186C2 - Method for protecting software against unauthorized use by a controlled variable - Google Patents

Method for protecting software against unauthorized use by a controlled variable Download PDF

Info

Publication number
UA77186C2
UA77186C2 UA2004010469A UA2004010469A UA77186C2 UA 77186 C2 UA77186 C2 UA 77186C2 UA 2004010469 A UA2004010469 A UA 2004010469A UA 2004010469 A UA2004010469 A UA 2004010469A UA 77186 C2 UA77186 C2 UA 77186C2
Authority
UA
Ukraine
Prior art keywords
protected program
execution
program
protected
fragment
Prior art date
Application number
UA2004010469A
Other languages
English (en)
Ukrainian (uk)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed filed Critical
Publication of UA77186C2 publication Critical patent/UA77186C2/uk

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Storage Device Security (AREA)
UA2004010469A 2001-07-31 2002-04-07 Method for protecting software against unauthorized use by a controlled variable UA77186C2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0110250A FR2828305B1 (fr) 2001-07-31 2001-07-31 Procede pour proteger un logiciel a l'aide d'un principe dit de "variable" contre son utilisation non autorisee
PCT/FR2002/002338 WO2003012649A2 (fr) 2001-07-31 2002-07-04 Procede pour proteger un logiciel a l'aide de 'variables' contre son utilisation non autorisee

Publications (1)

Publication Number Publication Date
UA77186C2 true UA77186C2 (en) 2006-11-15

Family

ID=8866125

Family Applications (1)

Application Number Title Priority Date Filing Date
UA2004010469A UA77186C2 (en) 2001-07-31 2002-04-07 Method for protecting software against unauthorized use by a controlled variable

Country Status (29)

Country Link
EP (1) EP1412861A2 (ru)
JP (1) JP3949107B2 (ru)
KR (1) KR100940347B1 (ru)
CN (1) CN1288525C (ru)
AP (1) AP2004002958A0 (ru)
AU (1) AU2002325998B2 (ru)
BR (1) BR0211374A (ru)
CA (1) CA2454090A1 (ru)
CO (1) CO5550508A2 (ru)
CR (1) CR7231A (ru)
EA (1) EA005465B1 (ru)
EC (1) ECSP044951A (ru)
FR (1) FR2828305B1 (ru)
GE (1) GEP20053647B (ru)
HK (1) HK1070155A1 (ru)
HR (1) HRP20040049A2 (ru)
HU (1) HUP0400228A2 (ru)
IL (1) IL159953A0 (ru)
IS (1) IS7121A (ru)
MA (1) MA26126A1 (ru)
MX (1) MXPA04000488A (ru)
NO (1) NO20040232L (ru)
OA (1) OA12699A (ru)
PL (1) PL367366A1 (ru)
TN (1) TNSN04012A1 (ru)
UA (1) UA77186C2 (ru)
WO (1) WO2003012649A2 (ru)
YU (1) YU5404A (ru)
ZA (1) ZA200400348B (ru)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2852415B1 (fr) * 2003-03-11 2005-06-24 Actikey Support de type cle, de controle de l'acces a des donnees et/ou a un logiciel et procede correspondant
CN107194212B (zh) * 2017-06-21 2020-04-17 株洲中车时代电气股份有限公司 一种显示器源代码中协议内容的保护方法

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (fr) * 1988-08-01 1990-02-02 Pionchon Philippe Procede et dispositif de protection d'un logiciel, en particulier contre les copies non autorisees
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
AU7957998A (en) * 1997-06-09 1999-01-25 Intertrust, Incorporated Obfuscation techniques for enhancing software security
JP2002518727A (ja) * 1998-06-12 2002-06-25 ジェムプリュス ソフトウェア製品の実行の制御方法

Also Published As

Publication number Publication date
HRP20040049A2 (en) 2004-06-30
CA2454090A1 (fr) 2003-02-13
IS7121A (is) 2004-01-20
MA26126A1 (fr) 2004-04-01
OA12699A (en) 2006-06-23
EA005465B1 (ru) 2005-02-24
TNSN04012A1 (fr) 2006-06-01
FR2828305A1 (fr) 2003-02-07
BR0211374A (pt) 2004-07-20
HK1070155A1 (en) 2005-06-10
FR2828305B1 (fr) 2010-09-03
ECSP044951A (es) 2004-04-28
AU2002325998B2 (en) 2008-10-30
ZA200400348B (en) 2005-03-30
CN1535410A (zh) 2004-10-06
HUP0400228A2 (en) 2004-09-28
IL159953A0 (en) 2004-06-20
WO2003012649A3 (fr) 2003-12-24
JP2004537806A (ja) 2004-12-16
GEP20053647B (en) 2005-10-25
MXPA04000488A (es) 2005-03-07
PL367366A1 (en) 2005-02-21
CN1288525C (zh) 2006-12-06
AP2004002958A0 (en) 2004-03-31
WO2003012649A2 (fr) 2003-02-13
NO20040232L (no) 2004-03-30
CO5550508A2 (es) 2005-08-31
EP1412861A2 (fr) 2004-04-28
KR100940347B1 (ko) 2010-02-04
KR20040027881A (ko) 2004-04-01
JP3949107B2 (ja) 2007-07-25
EA200400057A1 (ru) 2004-06-24
CR7231A (es) 2005-07-21
YU5404A (sh) 2006-08-17

Similar Documents

Publication Publication Date Title
EP1975784B1 (en) Method of obfuscating computer instruction streams
KR101187554B1 (ko) 소프트웨어 보안
US6880149B2 (en) Method for runtime code integrity validation using code block checksums
EP2486482B1 (en) A system and method for aggressive self-modification in dynamic function call systems
KR101676326B1 (ko) 화이트박스 암호화를 사용하는 연동 바이너리 보호 방법
CN107026728B (zh) 用于动态预启动存储加密密钥管理的方法及终端
CN101681410B (zh) 用于控制安全环境中的处理器执行的设备
US8179227B2 (en) Employing external storage devices as media for access control panel control information
US7162735B2 (en) Digital data protection arrangement
KR101331032B1 (ko) 가상화 환경과 결합된 어플리케이션 실행 방법
CN101315608A (zh) 存储器保护方法和设备
US8463708B2 (en) System and method for using digital strings to provide secure distribution of digital content
US7458100B2 (en) Adding copy protection to a computer program
UA77186C2 (en) Method for protecting software against unauthorized use by a controlled variable
US20220357944A1 (en) Method for executing a machine code by means of a microprocessor
JP2001256118A (ja) マイクロコンピュータシステムの保護方法,メモリ装置,マイクロコンピュータシステム
US20140366149A1 (en) System and method for using digital strings to provide secure distribution of digital content
US20070283437A1 (en) Method to Protect Software Against Unwanted Use with a "Temporal Dissociation" Principle
UA77187C2 (en) Method for protecting software against unauthorized use by controlling the correspondence with a specified criterion
CN110659079B (zh) 一种均衡式安全处理器
WO2023002635A1 (ja) 情報処理装置、情報処理方法、及び、情報処理プログラム
WO2023156571A1 (en) Protecting software
WO2016056120A1 (ja) 情報処理装置、及び情報処理方法
CN110659073A (zh) 一种仲裁式安全处理器
HRP20040046A2 (en) Method for protecting a software using a so-called conditional jump principle against its unauthorised use