WO2006134304A3 - Method for protecting a source code in semi-interpreted language - Google Patents
Method for protecting a source code in semi-interpreted language Download PDFInfo
- Publication number
- WO2006134304A3 WO2006134304A3 PCT/FR2006/050558 FR2006050558W WO2006134304A3 WO 2006134304 A3 WO2006134304 A3 WO 2006134304A3 FR 2006050558 W FR2006050558 W FR 2006050558W WO 2006134304 A3 WO2006134304 A3 WO 2006134304A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- code
- octet
- protecting
- source code
- semi
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
- Facsimiles In General (AREA)
- Facsimile Transmission Control (AREA)
- Accessory Devices And Overall Control Thereof (AREA)
Abstract
The invention concerns a method for protecting a source code in semi-interpreted language. The invention is characterized in that said source code (11) being compiled in an octet-code (12), said method includes the following steps: encrypting said octet-code (12) with an encrypting algorithm, providing a machine (20) using said source code (11), the encrypted octet code (13) and the octet code of a decrypting classloader (14) adapted to decrypt said encrypted octet code (13) using a decryption key (K8) available on said user machine (20). The invention is useful for protecting source codes against pirated copying.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0505988 | 2005-06-14 | ||
FR0505988A FR2887097A1 (en) | 2005-06-14 | 2005-06-14 | METHOD FOR PROTECTING A SOURCE CODE IN SEMI-INTERPRETED LANGUAGE |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2006134304A2 WO2006134304A2 (en) | 2006-12-21 |
WO2006134304A3 true WO2006134304A3 (en) | 2007-03-22 |
Family
ID=36001093
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR2006/050558 WO2006134304A2 (en) | 2005-06-14 | 2006-06-14 | Method for protecting a source code in semi-interpreted language |
Country Status (2)
Country | Link |
---|---|
FR (1) | FR2887097A1 (en) |
WO (1) | WO2006134304A2 (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102007045743A1 (en) * | 2007-09-25 | 2009-04-02 | Siemens Ag | Method and system for protection against access to a machine code of a device |
CN102043932B (en) * | 2010-12-31 | 2012-07-18 | 中国航空工业集团公司第六三一研究所 | Method for preventing Java program from being decompiled |
US8667600B2 (en) * | 2011-06-30 | 2014-03-04 | International Business Machines Corporation | Trusted computing source code escrow and optimization |
CN102360412B (en) * | 2011-09-26 | 2014-07-02 | 飞天诚信科技股份有限公司 | Method and system for protecting Java source code |
US10102384B2 (en) | 2013-05-30 | 2018-10-16 | Jscrambler S.A. | Digital content execution control mechanism |
US10095846B2 (en) | 2013-05-30 | 2018-10-09 | Jscrambler S.A. | Web application protection |
SG10201602449PA (en) | 2016-03-29 | 2017-10-30 | Huawei Int Pte Ltd | System and method for verifying integrity of an electronic device |
CN109995526A (en) * | 2019-04-10 | 2019-07-09 | 睿驰达新能源汽车科技(北京)有限公司 | A kind of storage method of key and the call method and device of device, key |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1998042098A1 (en) * | 1997-03-14 | 1998-09-24 | Cryptoworks, Inc. | Digital product rights management technique |
US6334189B1 (en) * | 1997-12-05 | 2001-12-25 | Jamama, Llc | Use of pseudocode to protect software from unauthorized use |
EP1278112A1 (en) * | 2001-07-12 | 2003-01-22 | Castify Networks SA | A process for providing access of a client to a content provider server under control of a resource locator server |
US20030059051A1 (en) * | 2001-09-27 | 2003-03-27 | Kabushiki Kaisha Toshiba | Electronic apparatus, wireless communication device, and encryption key setting method |
EP1338971A1 (en) * | 2000-11-24 | 2003-08-27 | NTT DoCoMo, Inc. | Data acquiring method and terminal |
US20040039926A1 (en) * | 2000-10-11 | 2004-02-26 | Lambert Martin Richard | Methods of providing java tamperproofing |
-
2005
- 2005-06-14 FR FR0505988A patent/FR2887097A1/en active Pending
-
2006
- 2006-06-14 WO PCT/FR2006/050558 patent/WO2006134304A2/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1998042098A1 (en) * | 1997-03-14 | 1998-09-24 | Cryptoworks, Inc. | Digital product rights management technique |
US6334189B1 (en) * | 1997-12-05 | 2001-12-25 | Jamama, Llc | Use of pseudocode to protect software from unauthorized use |
US20040039926A1 (en) * | 2000-10-11 | 2004-02-26 | Lambert Martin Richard | Methods of providing java tamperproofing |
EP1338971A1 (en) * | 2000-11-24 | 2003-08-27 | NTT DoCoMo, Inc. | Data acquiring method and terminal |
EP1278112A1 (en) * | 2001-07-12 | 2003-01-22 | Castify Networks SA | A process for providing access of a client to a content provider server under control of a resource locator server |
US20030059051A1 (en) * | 2001-09-27 | 2003-03-27 | Kabushiki Kaisha Toshiba | Electronic apparatus, wireless communication device, and encryption key setting method |
Non-Patent Citations (3)
Title |
---|
"THE CRYPTOLOPE LIVEÜ PRODUCT", IBM CRYPTOLOPE LIVE. GENERAL INFORMATION GUIDE, XX, XX, 1997, pages 1 - 36, XP002908144 * |
CACHEFLOW: "SSL Primer", CACHEFLOW TECHNICAL NOTE, 31 October 2000 (2000-10-31), pages 1 - 16, XP002278809 * |
MARC A KAPLAN: "IBM Cryptolopes, SuperDistribution and Digital Rights Management", IBM RESEARCH CENTER, 30 December 1996 (1996-12-30), XP002132994 * |
Also Published As
Publication number | Publication date |
---|---|
WO2006134304A2 (en) | 2006-12-21 |
FR2887097A1 (en) | 2006-12-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2006134304A3 (en) | Method for protecting a source code in semi-interpreted language | |
WO2006091304A3 (en) | System and method for drm regional and timezone key management | |
GB2390786B (en) | Method and system for validating software code | |
JP2009545229A5 (en) | ||
WO2004012378A3 (en) | Digital content security system and method | |
WO2003030447A3 (en) | An encryption device, a decrypting device, a secret key generation device,a copyright protection system and a cipher communication device | |
WO2003042799A3 (en) | Device and method with reduced information leakage | |
WO2009134937A3 (en) | Format-preserving cryptographic systems | |
WO2005043361A3 (en) | Secure document access method and apparatus | |
WO2005089088A3 (en) | Method, apparatus and system for use in distributed and parallel decryption | |
WO2003065639A3 (en) | System and method of hiding cryptographic private keys | |
WO2006126191A3 (en) | Method, device, and system of encrypting/decrypting data | |
BR0303651A (en) | Appliance, method and program of execution of content and appliance and key management system | |
GB2442691A (en) | Multimedia data protection | |
EP1191737A3 (en) | Data encryption apparatus | |
WO2010138865A3 (en) | Trust establishment from forward link only to non-forward link only devices | |
AUPS217002A0 (en) | Clarence tan | |
GB2407238B (en) | A system and method for performing blind encryption and decryption | |
WO2008001327A3 (en) | Method and apparatus for encrypting/decrypting data | |
WO2008031109A3 (en) | System and method for encrypting data | |
GB0121793D0 (en) | An apparatus for generating encryption/decryption keys | |
WO2010010336A3 (en) | Mulitipad encryption | |
WO2007001462A3 (en) | Method and apparatus for providing a secure move of a decryption content key | |
TW200629855A (en) | Confidential information processing method, confidential information processing device, and contents data reproducing device | |
WO2007120548A3 (en) | Authoring tool to create content for a secure content service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 06778936 Country of ref document: EP Kind code of ref document: A2 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06778936 Country of ref document: EP Kind code of ref document: A2 |