YU5504A - Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use - Google Patents

Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use

Info

Publication number
YU5504A
YU5504A YU5504A YUP5504A YU5504A YU 5504 A YU5504 A YU 5504A YU 5504 A YU5504 A YU 5504A YU P5504 A YUP5504 A YU P5504A YU 5504 A YU5504 A YU 5504A
Authority
YU
Yugoslavia
Prior art keywords
software
protecting
unit
unauthorised use
source
Prior art date
Application number
YU5504A
Other languages
Serbo-Croatian (sh)
Inventor
Jean-Christophe Cuenod
Gilles Sgro
Original Assignee
Validy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Validy filed Critical Validy
Publication of YU5504A publication Critical patent/YU5504A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention concerns a method for protecting, from a unit, a vulnerable software, against unauthorised use, said vulnerable software operating on a data processing system. The inventive method consists in creating a protected software: by selecting at least an algorithmic processing; by producing the source of the protected software from the vulnerable software source, by modifying the vulnerable software source, so that at least a selected algorithmic processing is broken down such that when the protected software is executed there occur several separate steps, namely: providing at least an operand for the unit; production by the unit, of the functionality of the algorithmic processing on at least said operand; and optionally, production of at least a result, by the unit for the data processing system.
YU5504A 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use YU5504A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR0110247A FR2828304B1 (en) 2001-07-31 2001-07-31 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "TIME DISSOCIATION" AGAINST ITS UNAUTHORIZED USE

Publications (1)

Publication Number Publication Date
YU5504A true YU5504A (en) 2006-05-25

Family

ID=8866122

Family Applications (1)

Application Number Title Priority Date Filing Date
YU5504A YU5504A (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use

Country Status (18)

Country Link
EP (1) EP1412862A2 (en)
JP (1) JP3949108B2 (en)
KR (1) KR20040031778A (en)
CN (1) CN100451910C (en)
BR (1) BR0211371A (en)
CA (1) CA2454092A1 (en)
FR (1) FR2828304B1 (en)
HR (1) HRP20040047A2 (en)
HU (1) HUP0400223A2 (en)
IL (1) IL159954A0 (en)
MA (1) MA26125A1 (en)
MX (1) MXPA04000594A (en)
NO (1) NO20040227L (en)
PL (1) PL367424A1 (en)
TN (1) TNSN04014A1 (en)
WO (1) WO2003012650A2 (en)
YU (1) YU5504A (en)
ZA (1) ZA200400349B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102011006000B4 (en) 2011-03-23 2015-01-15 Infineon Technologies Ag Signature update by code transformation
KR101217668B1 (en) * 2011-05-12 2013-01-02 주식회사 안랩 Malicious program hooking prevention apparatus and method
US11595201B2 (en) 2020-02-21 2023-02-28 Cyber Armor Ltd. System and method for generation of a disposable software module for cryptographic material protection

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (en) * 1988-08-01 1990-02-02 Pionchon Philippe METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
WO1999001815A1 (en) * 1997-06-09 1999-01-14 Intertrust, Incorporated Obfuscation techniques for enhancing software security
DE69819790D1 (en) * 1998-06-12 2003-12-18 Gemplus Gemenos METHOD FOR CONTROLLING THE EXECUTION OF A PROGRAM PRODUCT

Also Published As

Publication number Publication date
NO20040227L (en) 2004-03-30
EP1412862A2 (en) 2004-04-28
TNSN04014A1 (en) 2006-06-01
CN1552010A (en) 2004-12-01
HRP20040047A2 (en) 2004-06-30
KR20040031778A (en) 2004-04-13
WO2003012650A2 (en) 2003-02-13
CN100451910C (en) 2009-01-14
FR2828304B1 (en) 2010-09-03
PL367424A1 (en) 2005-02-21
CA2454092A1 (en) 2003-02-13
JP3949108B2 (en) 2007-07-25
FR2828304A1 (en) 2003-02-07
MXPA04000594A (en) 2005-02-17
WO2003012650A3 (en) 2003-12-24
HUP0400223A2 (en) 2004-08-30
IL159954A0 (en) 2004-06-20
ZA200400349B (en) 2005-03-30
JP2004537807A (en) 2004-12-16
BR0211371A (en) 2004-09-28
MA26125A1 (en) 2004-04-01

Similar Documents

Publication Publication Date Title
AU2001294017A1 (en) A method for controlling access to protected content
WO2003063499A3 (en) Methods and systems for start code emulation prevention and data stuffing
WO2002103532A3 (en) Data processing method
AU2003227411A1 (en) Processor system, task control method on computer system, computer program
WO2004055634A3 (en) Systems and methods for detecting a security breach in a computer system
WO2004019204A8 (en) Processing application data
AU2002245463A1 (en) System and method for selectively enabling and disabling access to software applications over a network
WO2006035227A3 (en) Source code protection
SG155210A1 (en) Substrate processing apparatus, use state ascertaining method, and false use preventing method
WO2007035383A3 (en) A system and method for allowing copying or distribution of a copy protected signal
EP1566970A4 (en) Moving image predicting method, moving image encoding method and device, and moving image decoding method and device
AU2002211253A1 (en) Method and apparatus to improve the protection of information presented by a computer
DE50113101D1 (en) Software protection mechanism
YU5504A (en) Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
AU2003256174A1 (en) Irregular mesh and embedded geometric description in a computer graphics system
WO2004012029A3 (en) Restricting access to a method in a component
YU5404A (en) Method for protecting a software using a so-called variable principle against its unauthorised use
YU5804A (en) Method for protecting a software using a so-called elementary functions principle against its unauthorised use
GR1003432B (en) System for the protection of the software of an optical disk
YU5904A (en) Method for protecting a software using a so-called conditional jump principle against its unauthorised use
AU2002253122A1 (en) Coding of data in a data package
WO2003079164A3 (en) Device for protection against unauthorized use of software
TW200513088A (en) The system and method for protecting digital content
TW200723035A (en) Data processing method and system
WO2003007150A3 (en) A data-flow programming method and system