WO2002001358A1 - System for preventing illegal change of program with operation system and compiler cooperated, and method thereof - Google Patents

System for preventing illegal change of program with operation system and compiler cooperated, and method thereof Download PDF

Info

Publication number
WO2002001358A1
WO2002001358A1 PCT/KR2001/001093 KR0101093W WO0201358A1 WO 2002001358 A1 WO2002001358 A1 WO 2002001358A1 KR 0101093 W KR0101093 W KR 0101093W WO 0201358 A1 WO0201358 A1 WO 0201358A1
Authority
WO
WIPO (PCT)
Prior art keywords
program
operating system
code
permission
file
Prior art date
Application number
PCT/KR2001/001093
Other languages
French (fr)
Inventor
Jongryeol Ryu
Original Assignee
Jongryeol Ryu
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jongryeol Ryu filed Critical Jongryeol Ryu
Priority to AU2001266397A priority Critical patent/AU2001266397A1/en
Publication of WO2002001358A1 publication Critical patent/WO2002001358A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • G06F21/126Interacting with the operating system

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Quality & Reliability (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

The present invention relates to a system of preventing an illegal change of a program with a compiler and an operating system cooperated.An object of the present invention is to provide a system for preventing an illegal changes of a program with an operating system and compiler cooperated, and a method thereof, that is capable of deciding whether an illegal change of the program exists by surveying the program on the operating system with a corresponding encoding module, when executing the program after having sold the program, the program with an operating system produced by a compiler which is a developing tool, having the same encoding module as that of the compiler, and encoded using encoding module provided in the compiler, when the developer compiles the program.Another object of the present invention is to provide a system and a method, capable of preventing an ill-intentioned program by making an operating system's permission necessary when the program is compiled.

Description

SYSTEM FOR PREVENTING ILLEGAL CHANGE OF PROGRAM WITH OPERATION SYSTEM AND COMPILER COOPERATED, AND METHOD THEREOF
TECHNICAL FIELD The present invention relates to a system of preventing an illegal change of a program, and a method thereof, and particularly to a system of preventing an illegal change of a program with an operating system and compiler cooperated, and a method thereof.
BACKGROUND ART In general, the method of allotting product numbers used for confirming whether a program is true or forged one is very weak in preventing illegal copies of a product. It is because, only with a product number, illegal copies of an original product can be set up using a CD recorder or hard disk. To make up for such a weakness, a method for preventing illegal setting up fundamentally by inputting a code for preventing illegal copies into a specific track of a CD and changing the concerned code when copies are conducted, a method for preventing illegal copies by locking a software and allowing copies only to those who have the corresponding locks, a method for preventing illegal copies by allowing copies only to those who received a product number after having been confirmed by a selling agent of the software, and the likes, are employed. However, all of these methods are easy to survey that with what routine an illegal copies are determined, by analyzing a programming code using analyzing tool such as reverse assembly, and normal executions are openly conducted by skipping over the concerned routine, that is, by not making execution of determining illegal copies. Such an illegal change of a program is used not only in the true product of a software, but in a program having an effective date such as a program of an estimated edition, and a continual use can be obtained even after the effective date is over by making the date check of the program of the estimated edition impossible.
Among the methods of prior arts, there is one that prevents normal execution by changing the password when an illegal change of a program is conducted, but this is only an expedient to make the finding of the encoded routine difficult but not a fundamental solution for preventing the illegal change. Also for a program developer, this is a problem that makes the developer under the double duty of developing a program and developing a new encoded routine.
DISCLOSURE OF INVENTION
The present invention has been made to solve the problems above mentioned, and an object of the present invention is to provide a system for preventing an illegal changes of a program with an operating system and compiler cooperated, and a method thereof, that is capable of deciding whether an illegal change of the program exists by surveying the program on the operating system with a corresponding encoding module, when executing the program after having sold the program, the program with an operating system produced by a compiler which is a developing tool, having the same encoding module as that of the compiler, and encoded using encoding module provided in the compiler, when the developer compiles the program. Another object of the present invention is to provide a system and a method, capable of preventing an ill-intentioned program by making an operating system's permission necessary when the program is compiled.
A feature of the present invention for attaining the objects above mentioned is that a system for preventing an illegal change of a program is comprised of: a compiler, wherein an operating system's permission is necessary when the code made by a program developer is compiled, and an information on the compiled file is encoded so that a confirming code of illegal change is formed and stored in the compiled file; an operating system, wherein the operating system is an executing base, and confirms whether an illegal change is conducted and an operating system's permission is made, by the confirming code of an illegal change and the permission code of the operating system, before the program is executed.
A feature of the present invention for attaining the objects above mentioned is that a method for preventing an illegal change of a program is comprised of: a first stage, wherein after a program developer completed the framing of a program code through a compiler program, an encoded information is inserted to the program with the standardized encoding module between the operating system and the compiler when the program is compiled; a second stage, wherein after the program framed at the first stage is set up on a computer, and when the program is executed, the operating system determine, if the program is illegally changed using the encoded information; and a third stage, wherein as a result of the determination, if the program is changed, the execution is stopped, and if the program is not changed, the execution is made normally.
BRIEF DESCRIPTION OF DRAWINGS Fig. 1 is a diagram showing a system for realizing the present invention. Fig. 2 is a flow chart showing an encoding step of a program on a compiler according to the present invention.
Fig. 3 is a flow chart showing a confirming step of an illegal change of a program according to the present invention.
Fig. 4 is a flow chart showing a diagnosing step of allowing permission and an ill- intentioned program according to the present invention.
BEST MODE FOR CARRYING OUT THE INVENTION The present invention will be described in more detail with reference to the preferred embodiment shown in the attached drawings. Fig. 1 is a diagram showing a system for realizing the present invention.
To realize the present invention, first, use of a standardized encoding module must be arranged between the operating system developer 100 and the compiler developer 120. If the operating system developer 100 provides the compiler developer 120 with a number of standardized encoding modules to be included in the operating system, the compiler developer 120 includes the encoding modules in the compiler and sells the encoding modules to a program developer 140, and the program developer 140 completes the framing of a program code, encodes the program code with a encoding module selected from a number of the encoding modules when compiles the program, and includes the encoded code in the program. The operating system means UNIX, OS/2, and the likes, and the compiler means visual basic, C++, and the likes.
The compiler developed by the compiler developer 120 includes a code-creating unit
155 for encoding a file compiled with the standardized encoding module, an operating system's permitting unit 145 for obtaining the operating system's permission, and a local code-creating unit 150 for omitting an unnecessary permitting step in the development stage.
The operating system developer 100 includes a code module 105 for being permitted by the operating system to prevent the production of an ill-intentioned program, a database 115 for storing the information on the developer, and a database 110 for storing the lists of ill-intentioned programs. Also, the operating system that the operating system developer sells to a user is comprised of a code creating unit 155 having a number of modules that encode a loaded program to confirm whether the program has changed, an operating system's permission code creating unit 105 for drawing out the permission code to confirm whether an operating system's permission is granted, a local code-creating unit 150 for confirming whether the program is the one drawn out from the developer computer, an ill- intentioned program list 110 for confirming whether the program is the one registered in the ill-intentioned program list, and a control unit 165 for controlling each of the code- creating units and confirming whether the created code is identical with the code stored in the loaded file and whether the created code is the registered one in the ill-intentioned program list.
The program developer 140 obtains the operating system's permission from the operating system developer through an internet network, when compiles the program, after completed the development of the program, and the user 160 receives the ill-intentioned program list 110 from the operating system developer. Next, each step will be explained in more detail.
Fig. 2 is a flow chart showing an encoding step of a program on a compiler according to the present invention.
As shown in Fig.2, after the completion of framing a program code, an execution file or DLL (Dynamic Link Library) file is compiled (S202), to create the execution file or DLL file (S203). At this time, a selection between a compilation for localizing and a compilation for distributing is made (S200). The reason for this is that since a program development is not completed at a stroke, but should be accompanied with many tests and steps of modifying bugs, if the permitting step for an operating system (to be described below) is needed every time a program is compiled, a program developer cannot avoid a complication.
When the selection of the type of the compilation is completed (S200), a selection of an encoding module for encoding the program (S201) is made. This step is unnecessary when a single encoding module is used between the operating system and the compiler, but to prevent an illegal change of a program more intensively, it is preferable to use a number of modules.
If the compilation for localizing is selected at the above step (S200), a setup code (i.e. the sole code to distinguish the system) is drawn out using the hardware information of the program developer, and the permitting information of the operating system is initialized (S210). Next, an encoding module code is drawn out with the program information (e.g. the name of the program developer, the name the program, etc.) and the selected encoding module information (S211). This is the step unnecessary, as mentioned above, when a single encoding module is used. The reason why the encoding module code is so drawn out is that when a program is set up on the operating system, if there is no information on the encoding module used, tests must be conducted with all the modules the operating system has, thus lowering the operating performance. Also, if the information on the used encoding module is recorded in a file as it is, a problem may occur that illegal changes become easy. Accordingly, the information on the encoding module is also encoded as a kind of security measures.
The local code, the operating system's permission code, and the program information thus framed are stored in a compiled file (S212). Next, the size and the data of the compiled file are encoded with the selected encoding module. Subsequently, a file size code and a checksum code are drawn out (S213), and stored in the compiled file (S214). The file size code is to determine whether the size of the file is changed, and the checksum code is to prevent changes of data without accompanying changes of the file sizes. The encoding may have various forms, but this is not the pursuing subject of the present invention, rather to be left in charge of an operating developer and a compiler developer to decide.
Next, the compiling step of a distributing program, i.e. not the developing stage, will be described. When a program is compiled after completed developing, a compilation for distributing is selected (S200), and also an encoding module to be used is selected (S201). After the compilation of the program code (S202, S203) is made, an operating system's permission is requested through an internet network. With above request, a compiled execution file or DLL file and the program information (e.g. the name of the developer, the name of the program, etc.) are provided to the operating system (S205). Accordingly, the operating system developer encodes the compiled execution file or DLL file with an exclusive encoding module of the operating system, draws out a permission code (S206), and provides the program developer with the permission code (S207). Also, the operating developer stores the received information and the permitted date in the database and manages thereof (S208). The reason for this is that since an ill-intentioned person will not try to obtain the operating system's permission in spite of exposing his identification, a framing of such a program can intercepted beforehand, and a list for cutting off execution of an ill-intentioned program expecting in the future can be prepared. The ill-intentioned program means the one that brings about undesirable results to a user such as a virus program. On receiving the operating system's permission code from the operating system developer, the compiler initializes the local code (S209), and frames an encoded program via the steps S211— S214.
Fig. 3 is a flow chart showing a confirming step of an illegal change of a program according to the present invention, and Fig. 4 is a flow chart showing a diagnosing step of allowing permission and an ill-intentioned program according to the present invention.
A user may set up the program developed through the steps of Fig. 2 in his own computer. When an executing command of the concerned program is issued (S300), the program loader of the operating system calls out the execution file or the DLL file (301), and draws out the loaded file size and the checksum (S302). Also, the program loader of the operating system reads out the program information in the file and the encoding module (S303). Then, an encoding module code is drawn out with the read-out program and the encoding module information (S304). Next, a determination is made whether the drawn-out encoding module code and the read-out encoding module code are identical (S305). If the result shows as not identical, confirmation is made whether tests of all the encoding modules on the operating system have been performed (S306). If affirmative, the execution is stopped, whereas if negative, the steps S304-— -S305 are repeated with other encoding modules. If the result in the step 305 shows as identical, the concerned module is selected (S307) as the encoding was made with that module. With this module, the drawn- out file size information and the checksum information are encoded, and drawn out as a file size code and a checksum code (S308). When the drawn-out is completed, the file size code and the checksum code stored in the concerned file are read out (S309). Then, a determination is made whether the drawn-out file size code and the read-out file size code are identical (S310). If the result shows as not identical, the execution is stopped, whereas if identical, a determination is made again whether the drawn-out checksum and the read- out checksum are identical (S311). If the result shows as not identical, the execution is stopped, whereas if identical, the execution proceeds to the next step (A). Through these steps, a determination can be made whether a change of the file was conducted.
When having passed the above steps, the execution proceeds to the steps for determining whether the program is permitted by the operating system and is listed in the ill-intentioned program list.
Next, the local code is read out from the loaded file (S400). A determination is made whether the read-out local code is vacant, and if vacant, as it means the program has been permitted by the operating system, the information on the loaded file is encoded with the permitted encoding module of operating system (the same one used for drawing out permitted code in the steps of Fig. 2) included in the operating system, and the permitted code stored in the loaded file is read out (S402). Then, the drawn-out permission code and the read-out code of the operating system are compared (S403), and if not identical, the execution is stopped, whereas if identical, the execution proceeds to the next steps.
If the read-out local code is not vacant in the step S401, as it means the program is still being developed, a determination is made whether the program has been set up in the developer's computer, and is being intended distributing without the operating system's permission. First, the setup code of the set computer is drawn out, and then the local code is drawn out from the drawn-out setup code (S404). A determination is made whether the drawn-out local code and the read-out local code are identical (S405), and if not identical, as it means the program is the one flown out of the developer's program, the program is stopped. If the result in the step S405 shows as identical, as it means the program is still being developed, the execution proceeds to the next steps.
From now on, the steps are for the purpose of diagnosing the ill-intentioned programs that have passed all the steps above mentioned without a hitch, and preventing the execution thereof.
A determination is made whether the program information that was read out from the loaded file exists in ill-intentioned program list that was downloaded from the operating system developer (S406). This ill-intentioned program list is provided to the user of the operating system, whenever the operating system developer newly updates the program information on an ill-intentioned program that acquired. The result in the step S406 shows as not exists, the normal execution is made (S407), whereas if exists, the execution is stopped to prevent the execution of the ill-intentioned program.
However, here is a problem that if the controlling module of the operating system that tests and controls all the steps becomes an object of illegal changes, the steps above mentioned may become meaningless. Accordingly, to prevent such a risk, a double security measure, that makes other modules on the operating system determine whether the controlling module is changed in like manner as the steps of Fig. 3, must be considered. As a more secure measure, a method of testing whether the controlling module is changed at the initial stage of booting of ROM BIOS can be used. Preferably, to the ROM BIOS, a routine that tests the controlling module of the operating system is inserted so as not to limited to an only operating system.
Also, in a method for preventing an illegal change of a program according to the present invention, as described above, an agreement must be arrived at to use the standardized and same code and routine between the operating system developer and the compiler developer, and the former programs must be passed through changing procedures so as to be executed in the new operating system. To realize the present invention, a series of transient stages must be accompanied, i.e. the former program and the new program created with an encoding module are executed simultaneously. However, as an insertion of an additional change preventing code or true or forged product confirming code is an optional matter of the program developer, the description thereof will be omitted here.
INDUSTRIAL APPLICABILITY As described above, according to the present invention, a software developer needs not to concentrate on trying to add an encoding code for preventing illegal changes, because an operating system prevents the illegal changes fundamentally, as the operating system determines whether an illegal change conducted. Also, the spread of a virus program can be prevented, as the program infected with a virus program cannot be executed. In addition, since only the program that obtained permission after passing through the prior registering steps for an operating system can be executed, there is an advantage of preventing development t of a virus program. Also, there is an advantage of preventing the spread of a virus program, since, even for the virus programs created evading the security measures, a list of illegal programs is drawn up and distributed by the operating system.
While the preferred embodiments of the present invention have been described herein referring to the drawings, it should be understood that other modifications, substitutions and alternatives are apparent to one of ordinary skill in the art. Such modifications, substitutions and alternatives can be made without departing from the spirit and scope of the present invention. Accordingly, the above described does not limit the scope of the present invention, which should be determined from the appended claims.

Claims

WHAT IS CLAIMED IS:
1. A system for preventing illegal change of program with operating system and compiler cooperated comprising: a compiler, wherein an operating system's permission is necessary when the code made by a program developer is compiled, and an information on the compiled file is encoded so that a confirming code of illegal change is formed and stored in said compiled file; an operating system, wherein the operating system is an executing base, and confirms whether an illegal change is conducted and the operating system's permission is made, by the confirming code of an illegal change and the operating system's permission code, before said program is executed.
2. The system for preventing illegal change of program with operating system and compiler cooperated according to claim 1, wherein said operating system's permission provides an operating system developer with program information and a compiled file through an internet network, and obtains an operating system's permission code of the compile file from said operating system developer and stores thereof.
3. The system for preventing illegal change of program with operating system and compiler cooperated according to claim 1, wherein said compiler includes: an operating system's permitting unit for obtaining the operating system's permission; and a code-creating unit for creating confirming code of an illegal change using the compiled file information.
4. The system for preventing illegal change of program with operating system and compiler according to claim 1, wherein said operating system includes: a code-creating unit for encoding a loaded program information to confirm whether the program has changed; an operating system's permission code creating unit for drawing out the permission code to confirm whether the operating system's permission is granted; an ill-intentioned program list having the stored information on ill-intentioned program; and a control unit for controlling each of said code-creating units and confirming whether the created code is identical with the code stored in the loaded file and whether the created code is the registered one in the ill-intentioned program list.
5. The system for preventing illegal change of program with operating system and compiler according to claim 3 or 4, wherein said operating system further includes a local code creating unit for simplifying the compilation and for making a program execute only in the system of the program developer, when said program is not yet completed.
6. The system for preventing illegal change of program with operating system and compiler according to claim 3 or 4, wherein said code-creating unit includes a number of encoding modules.
7. A method for preventing illegal change of program with operating system and compiler comprising: a first stage, wherein after a program developer completed the framing of a program code through a compiler program, encoded information is inserted to the program with the standardized encoding module between the operating system and the compiler when the program is compiled; a second stage, wherein after the program framed at the first stage is set up on a computer, and when the program is executed, the operating system determine if the program is illegally changed using said encoded information; and a third stage, wherein as a result of said determination, if the program is changed, the execution is stopped, and if the program is not changed, the execution is made normally.
8. The method for preventing illegal change of program with operating system and compiler according to claim 7, wherein to prevent the execution of an illegal program, the method further includes a stage of a determining whether a program information read out from the concerned program exists in the ill-intentioned list, whereas if not exists, the normal execution is made.
9. The method for preventing illegal change of program with operating system and compiler according to claim 7, wherein the first stage includes: a first step, wherein the program developer frames and compiles a program code; a second step, wherein a determination is made whether a compiling option is for localizing or for distributing; a third step, wherein if the determined result of said second step shows as for localizing, a setup code of the program developer's computer is drawn out, a local code is drawn out from said drawn-out setup code, and an operating system's permission information is initialized; a fourth step, wherein if the determined result of said second step shows as for distributing, the compiled file and the program information are transmitted to an operating system's developer through an internet network; a fifth step, wherein after completing said transmission, the operating system's developer draws out a permission code using a permission code creating module with the compiled file information, and transmits thereof to the program developer; a sixth step, wherein the program information on the operating system's permission and the permitted date are stored in the database of the operating system developer; a seventh step, wherein the local code is initialized on obtaining the permission code from the operating system developer; an eighth step, wherein said local code and said encoded program information on the operating system's permission are stored in the compiled file; and a ninth step, wherein after the size of the compiled file and the data are encoded with an encoding module, a file size code and a checksum code are drawn out and stored in the concerned file.
10. The method for preventing illegal change of program with operating system and compiler according to claim 9, wherein the first stage further includes a step, wherein to improve a confirming execution of an illegal change when there are a number of the encoding modules, an encoding module code is drawn out using the program information and the used encoding module, and stored in the compiled file.
11. The method for preventing illegal change of program with operating system and compiler according to claim 7, wherein the second stage includes: a first step, wherein a user completes to set up a program and issue an executing command; a second step, wherein on issuing said executing command, the concerned file is loaded for memory with a program loader of an operating system; a third step, wherein the size of the loaded file and the checksum are drawn out, the drawn-out file size information and data information are encoded with an encoding module included in the operating system, and a file size code and a checksum code are drawn out; a fourth step, wherein the file size code and the checksum code stored in the concerned file are read out; a fifth step, wherein a determination is made whether the drawn-out file size code and the read-out file size code are identical; a sixth step, wherein if the determined result of said fifth step shows as identical, a determination is made whether the drawn-out checksum code and the read-out checksum code; a seventh step, wherein if the determined result of said sixth step shows as identical, a local code is read out from the loaded file; an eighth step, wherein if said read-out local code is vacant, an operating system's permission code is drawn out using an operating system's permission code creating module with the loaded file information; a ninth step, wherein on completing said drawing of the permission code, the operating system's permission code stored in the loaded file is read out, and a determination is made whether it is identical with said drawn-out operating system's permission code; and a tenth step, wherein if the local code read out in said seventh step is not vacant, a setup code of the set computer is drawn out, a local code is drawn out from the drawn-out setup code, and a determination is made whether the drawn-out local code and the read-out local code is identical.
12. The method for preventing illegal change of program with operating system and compiler according to claim 11, wherein to seek the used encoding module when there are a number of the encoding modules, an encoding module code is drawn out using the program information read out when executing the program, a determination is made whether it is identical with the encoding module code read out from said program, and the used encoding module is sought.
13. The method for preventing illegal change of program with operating system and compiler according to claim 11, wherein the second stage further includes a step, wherein a determination whether the controlling module of the operating system is changed by the ROM BIOS when booting the operating system.
14. The method for preventing illegal change of program with operating system and compiler according to claim 11, wherein the second stage further includes a step, wherein a determination is made whether the controlling module is changed by other modules of the operating system.
PCT/KR2001/001093 2000-06-28 2001-06-27 System for preventing illegal change of program with operation system and compiler cooperated, and method thereof WO2002001358A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2001266397A AU2001266397A1 (en) 2000-06-28 2001-06-27 System for preventing illegal change of program with operation system and compiler cooperated, and method thereof

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR2000/35930 2000-06-28
KR1020000035930A KR100348027B1 (en) 2000-06-28 2000-06-28 Modification prevention system of program cooperated with operating system and compiler and method thereof

Publications (1)

Publication Number Publication Date
WO2002001358A1 true WO2002001358A1 (en) 2002-01-03

Family

ID=19674398

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2001/001093 WO2002001358A1 (en) 2000-06-28 2001-06-27 System for preventing illegal change of program with operation system and compiler cooperated, and method thereof

Country Status (3)

Country Link
KR (1) KR100348027B1 (en)
AU (1) AU2001266397A1 (en)
WO (1) WO2002001358A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008007047A1 (en) 2006-07-13 2008-01-17 British Telecommunications Public Limited Company Electronic programme guide for a mobile communications device

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100929870B1 (en) * 2002-12-04 2009-12-04 삼성전자주식회사 How to keep BIOS security of computer system
JP4335707B2 (en) * 2004-02-06 2009-09-30 Necエレクトロニクス株式会社 Program falsification detection device, program falsification detection program, and program falsification detection method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10289125A (en) * 1997-04-11 1998-10-27 Matsushita Electric Ind Co Ltd Program debugging device for microprocessor
JPH11243565A (en) * 1998-02-26 1999-09-07 Nec Telecom Syst Ltd System and method for changing service class in key telephone set
KR20000055753A (en) * 1999-02-10 2000-09-15 구자홍 Copy protection apparatus for digital data player
KR20010038207A (en) * 1999-10-22 2001-05-15 정선종 Online distribution method of computer programs

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2143874C (en) * 1994-04-25 2000-06-20 Thomas Edward Cooper Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption stub
KR970002625A (en) * 1995-06-15 1997-01-28 김광호 How to lock a program to prevent illegal copying of applications
JPH1031587A (en) * 1996-07-15 1998-02-03 Hitachi Ltd Data terminal equipment and computer program

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10289125A (en) * 1997-04-11 1998-10-27 Matsushita Electric Ind Co Ltd Program debugging device for microprocessor
JPH11243565A (en) * 1998-02-26 1999-09-07 Nec Telecom Syst Ltd System and method for changing service class in key telephone set
KR20000055753A (en) * 1999-02-10 2000-09-15 구자홍 Copy protection apparatus for digital data player
KR20010038207A (en) * 1999-10-22 2001-05-15 정선종 Online distribution method of computer programs

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008007047A1 (en) 2006-07-13 2008-01-17 British Telecommunications Public Limited Company Electronic programme guide for a mobile communications device

Also Published As

Publication number Publication date
KR100348027B1 (en) 2002-08-07
AU2001266397A1 (en) 2002-01-08
KR20000054834A (en) 2000-09-05

Similar Documents

Publication Publication Date Title
US6834799B2 (en) IC card with capability of having plurality of card managers installed
US7886288B2 (en) Method and apparatus for gaming device software configuration
US5925127A (en) Method and system for monitoring the use of rented software
US8781971B2 (en) Method and apparatus for enforcing software licenses
US6499035B1 (en) Licensing java objects
EP1084549B1 (en) Method of controlling usage of software components
CN107506221B (en) Application program upgrading method, device and equipment
JP3786722B2 (en) Method and apparatus for effective use of progressive object-oriented program using digital signature
CN101689193B (en) In-page installer
US7647639B2 (en) Methods for detecting executable code which has been altered
US7757296B2 (en) Method of managing software components that are integrated into an embedded system
CN101297280B (en) Configuration of isolated extensions and device drivers
US20020010863A1 (en) Method for protecting software
US20040093198A1 (en) Hardware simulation with access restrictions
WO2004003861A1 (en) Process for compiling and executing software applications in a multi-processor environment
CN100530027C (en) System and method for integrated security roles
US20030149669A1 (en) Method and system for licensing intellectual property circuits
US7310520B2 (en) File construction for mobile communication device including machine-language-code execution segment and file execution method using the same
JPH1031587A (en) Data terminal equipment and computer program
US20070083760A1 (en) Secure booting method and mobile terminal for the same
CN112364306B (en) Method and system for authorizing software use license of embedded operating system
CN112559980B (en) Applet runtime capable of embedding a plurality of random APP
US9477819B2 (en) Authorising use of a computer program
US20090271875A1 (en) Upgrade Module, Application Program, Server, and Upgrade Module Distribution System
WO2002001358A1 (en) System for preventing illegal change of program with operation system and compiler cooperated, and method thereof

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: COMMUNICATION UNDER RULE 69 EPC ( EPO FORM 1205A DATED 22/04/03 )

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP