YU5404A - Postupak za zaštitu softvera protiv neovlašćenog korišćenja koristeći takozvani princip promenljive - Google Patents

Postupak za zaštitu softvera protiv neovlašćenog korišćenja koristeći takozvani princip promenljive

Info

Publication number
YU5404A
YU5404A YU5404A YUP5404A YU5404A YU 5404 A YU5404 A YU 5404A YU 5404 A YU5404 A YU 5404A YU P5404 A YUP5404 A YU P5404A YU 5404 A YU5404 A YU 5404A
Authority
YU
Yugoslavia
Prior art keywords
software
protecting
unauthorised use
called variable
source
Prior art date
Application number
YU5404A
Other languages
English (en)
Inventor
Jean-Christophe Cuenod
Gilles Sgro
Original Assignee
Validy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Validy filed Critical Validy
Publication of YU5404A publication Critical patent/YU5404A/sh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Remote Sensing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Storage Device Security (AREA)

Abstract

Pronalazak se odnosi na postupak zaštite, najmanje jedne jedinice, osetljivog softvera protiv neovlašćenog korišćenja, a navedeni osetljivi softver radi u sistemu za obradu podataka. Ovaj postupak se sastoji u stvaranju zaštićenog softvera: izborom u izvoru osetljivog softvera najmanje jedne promenljive; proizvodjenjem izvora zaštićenog softvera modifikovanjem izvora osetljivog softvera, tako da odabrana promenljiva postaje rezidentna u jedinici.[The invention concerns a method for protecting, from at least a unit, a vulnerable software against its unauthorised use, said vulnerable software operating on a data processing system. The method consists in creating a protected software: by selecting in the source of the vulnerable software at least a variable; by producing the source of the protected software by modifying the source of the vulnerable software, so that the selected variable becomes resident in a unit.
YU5404A 2001-07-31 2002-07-04 Postupak za zaštitu softvera protiv neovlašćenog korišćenja koristeći takozvani princip promenljive YU5404A (sh)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR0110250A FR2828305B1 (fr) 2001-07-31 2001-07-31 Procede pour proteger un logiciel a l'aide d'un principe dit de "variable" contre son utilisation non autorisee

Publications (1)

Publication Number Publication Date
YU5404A true YU5404A (sh) 2006-08-17

Family

ID=8866125

Family Applications (1)

Application Number Title Priority Date Filing Date
YU5404A YU5404A (sh) 2001-07-31 2002-07-04 Postupak za zaštitu softvera protiv neovlašćenog korišćenja koristeći takozvani princip promenljive

Country Status (29)

Country Link
EP (1) EP1412861A2 (sh)
JP (1) JP3949107B2 (sh)
KR (1) KR100940347B1 (sh)
CN (1) CN1288525C (sh)
AP (1) AP2004002958A0 (sh)
AU (1) AU2002325998B2 (sh)
BR (1) BR0211374A (sh)
CA (1) CA2454090A1 (sh)
CO (1) CO5550508A2 (sh)
CR (1) CR7231A (sh)
EA (1) EA005465B1 (sh)
EC (1) ECSP044951A (sh)
FR (1) FR2828305B1 (sh)
GE (1) GEP20053647B (sh)
HK (1) HK1070155A1 (sh)
HR (1) HRP20040049A2 (sh)
HU (1) HUP0400228A2 (sh)
IL (1) IL159953A0 (sh)
IS (1) IS7121A (sh)
MA (1) MA26126A1 (sh)
MX (1) MXPA04000488A (sh)
NO (1) NO20040232L (sh)
OA (1) OA12699A (sh)
PL (1) PL367366A1 (sh)
TN (1) TNSN04012A1 (sh)
UA (1) UA77186C2 (sh)
WO (1) WO2003012649A2 (sh)
YU (1) YU5404A (sh)
ZA (1) ZA200400348B (sh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2852415B1 (fr) * 2003-03-11 2005-06-24 Actikey Support de type cle, de controle de l'acces a des donnees et/ou a un logiciel et procede correspondant
CN107194212B (zh) * 2017-06-21 2020-04-17 株洲中车时代电气股份有限公司 一种显示器源代码中协议内容的保护方法

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (fr) * 1988-08-01 1990-02-02 Pionchon Philippe Procede et dispositif de protection d'un logiciel, en particulier contre les copies non autorisees
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
WO1999001815A1 (en) * 1997-06-09 1999-01-14 Intertrust, Incorporated Obfuscation techniques for enhancing software security
DE69819790D1 (de) * 1998-06-12 2003-12-18 Gemplus Gemenos Verfahren zur kontrolle der ausführung eines programmproduktes

Also Published As

Publication number Publication date
OA12699A (en) 2006-06-23
CR7231A (es) 2005-07-21
ZA200400348B (en) 2005-03-30
IS7121A (is) 2004-01-20
MA26126A1 (fr) 2004-04-01
NO20040232L (no) 2004-03-30
MXPA04000488A (es) 2005-03-07
TNSN04012A1 (fr) 2006-06-01
UA77186C2 (en) 2006-11-15
FR2828305A1 (fr) 2003-02-07
FR2828305B1 (fr) 2010-09-03
BR0211374A (pt) 2004-07-20
CN1288525C (zh) 2006-12-06
AP2004002958A0 (en) 2004-03-31
EA200400057A1 (ru) 2004-06-24
WO2003012649A2 (fr) 2003-02-13
AU2002325998B2 (en) 2008-10-30
JP2004537806A (ja) 2004-12-16
PL367366A1 (en) 2005-02-21
CN1535410A (zh) 2004-10-06
EP1412861A2 (fr) 2004-04-28
HK1070155A1 (en) 2005-06-10
WO2003012649A3 (fr) 2003-12-24
HRP20040049A2 (en) 2004-06-30
JP3949107B2 (ja) 2007-07-25
IL159953A0 (en) 2004-06-20
EA005465B1 (ru) 2005-02-24
GEP20053647B (en) 2005-10-25
CO5550508A2 (es) 2005-08-31
KR20040027881A (ko) 2004-04-01
ECSP044951A (es) 2004-04-28
CA2454090A1 (fr) 2003-02-13
KR100940347B1 (ko) 2010-02-04
HUP0400228A2 (en) 2004-09-28

Similar Documents

Publication Publication Date Title
AU2003227411A1 (en) Processor system, task control method on computer system, computer program
HK1099031A1 (en) Method for purifying fsh fsh
WO2002067090A3 (en) System and method for selectively enabling and disabling access to software applications over a network
EP1469404A4 (en) METHOD, RIGHTS INFORMATION DISTRIBUTION SYSTEM, AND COMPUTER PROGRAM
YU5404A (sh) Postupak za zaštitu softvera protiv neovlašćenog korišćenja koristeći takozvani princip promenljive
HK1057667A1 (en) Method for storing encrypted data.
YU5504A (sh) Postupak za zaštitu softvera protiv neovlašćenog korišćenja principom "privremene disocijacije"
GB2375841B (en) Control for a machine such as an I.S. machine
GB0205539D0 (en) Control for a machine such as an I.S. machine
YU5804A (sh) Postupak za zaštitu softvera protiv neovlašćenog korišćenja, koristeći princip elementarnih funkcija
GB2375843B (en) Control for a machine such as an I.S machine
GB2375835B (en) Control for a machine such as an I.S. machine
GB2375836B (en) Control for a machine such as an I.S. machine
GB2375839B (en) Control for a machine such as an I.S. machine
WO2003012374A3 (fr) Procede pour proteger un logiciel a l'aide de 'branchement conditionnel' contre son utilisation non autorisee
AU2002325998A1 (en) Method for protecting a software using a so-called variable principle against its unauthorised use
UA38733A (uk) Пристрій обробки інформації
ZA200203632B (en) Data processing system.
TWI263896B (en) Data protection system
AU2003269063A1 (en) Data encryption method, cryptographic system and associated component
WO2004092989A8 (fr) Systeme d'encaissement permettant l'attribution d'avantages commerciaux selon des criteres choisis par les clients
ZA200403366B (en) A process and systems for the epoxidation of an olefin.
ZA200208659B (en) Air-cooling system for an underground mine.
AU2002953217A0 (en) T.P.T. (Thought process technology) M.O.S./O.M.O. (Mind operated systems / open mind operations)
AU2002318608A1 (en) Data processing method, data processing system, and program