YU5504A - Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use - Google Patents
Method for protecting a software using a so-called temporal dissociation principle against its unauthorised useInfo
- Publication number
- YU5504A YU5504A YU5504A YUP5504A YU5504A YU 5504 A YU5504 A YU 5504A YU 5504 A YU5504 A YU 5504A YU P5504 A YUP5504 A YU P5504A YU 5504 A YU5504 A YU 5504A
- Authority
- YU
- Yugoslavia
- Prior art keywords
- software
- protecting
- unit
- unauthorised use
- source
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 3
- 238000010494 dissociation reaction Methods 0.000 title 1
- 230000005593 dissociations Effects 0.000 title 1
- 230000002123 temporal effect Effects 0.000 title 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Storage Device Security (AREA)
Abstract
The invention concerns a method for protecting, from a unit, a vulnerable software, against unauthorised use, said vulnerable software operating on a data processing system. The inventive method consists in creating a protected software: by selecting at least an algorithmic processing; by producing the source of the protected software from the vulnerable software source, by modifying the vulnerable software source, so that at least a selected algorithmic processing is broken down such that when the protected software is executed there occur several separate steps, namely: providing at least an operand for the unit; production by the unit, of the functionality of the algorithmic processing on at least said operand; and optionally, production of at least a result, by the unit for the data processing system.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0110247A FR2828304B1 (en) | 2001-07-31 | 2001-07-31 | METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "TIME DISSOCIATION" AGAINST ITS UNAUTHORIZED USE |
Publications (1)
Publication Number | Publication Date |
---|---|
YU5504A true YU5504A (en) | 2006-05-25 |
Family
ID=8866122
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
YU5504A YU5504A (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use |
Country Status (18)
Country | Link |
---|---|
EP (1) | EP1412862A2 (en) |
JP (1) | JP3949108B2 (en) |
KR (1) | KR20040031778A (en) |
CN (1) | CN100451910C (en) |
BR (1) | BR0211371A (en) |
CA (1) | CA2454092A1 (en) |
FR (1) | FR2828304B1 (en) |
HR (1) | HRP20040047A2 (en) |
HU (1) | HUP0400223A2 (en) |
IL (1) | IL159954A0 (en) |
MA (1) | MA26125A1 (en) |
MX (1) | MXPA04000594A (en) |
NO (1) | NO20040227L (en) |
PL (1) | PL367424A1 (en) |
TN (1) | TNSN04014A1 (en) |
WO (1) | WO2003012650A2 (en) |
YU (1) | YU5504A (en) |
ZA (1) | ZA200400349B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102011006000B4 (en) | 2011-03-23 | 2015-01-15 | Infineon Technologies Ag | Signature update by code transformation |
KR101217668B1 (en) * | 2011-05-12 | 2013-01-02 | 주식회사 안랩 | Malicious program hooking prevention apparatus and method |
US11595201B2 (en) | 2020-02-21 | 2023-02-28 | Cyber Armor Ltd. | System and method for generation of a disposable software module for cryptographic material protection |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2634917A1 (en) * | 1988-08-01 | 1990-02-02 | Pionchon Philippe | METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
WO1999001815A1 (en) * | 1997-06-09 | 1999-01-14 | Intertrust, Incorporated | Obfuscation techniques for enhancing software security |
DE69819790D1 (en) * | 1998-06-12 | 2003-12-18 | Gemplus Gemenos | METHOD FOR CONTROLLING THE EXECUTION OF A PROGRAM PRODUCT |
-
2001
- 2001-07-31 FR FR0110247A patent/FR2828304B1/en not_active Expired - Lifetime
-
2002
- 2002-07-04 HU HU0400223A patent/HUP0400223A2/en unknown
- 2002-07-04 CA CA002454092A patent/CA2454092A1/en not_active Abandoned
- 2002-07-04 BR BR0211371-6A patent/BR0211371A/en not_active IP Right Cessation
- 2002-07-04 KR KR10-2004-7000805A patent/KR20040031778A/en not_active Application Discontinuation
- 2002-07-04 JP JP2003517759A patent/JP3949108B2/en not_active Expired - Fee Related
- 2002-07-04 CN CNB028146859A patent/CN100451910C/en not_active Expired - Fee Related
- 2002-07-04 MX MXPA04000594A patent/MXPA04000594A/en unknown
- 2002-07-04 IL IL15995402A patent/IL159954A0/en unknown
- 2002-07-04 PL PL02367424A patent/PL367424A1/en not_active Application Discontinuation
- 2002-07-04 WO PCT/FR2002/002339 patent/WO2003012650A2/en active Application Filing
- 2002-07-04 YU YU5504A patent/YU5504A/en unknown
- 2002-07-04 EP EP02760379A patent/EP1412862A2/en not_active Withdrawn
-
2004
- 2004-01-16 ZA ZA2004/00349A patent/ZA200400349B/en unknown
- 2004-01-19 TN TNP2004000014A patent/TNSN04014A1/en unknown
- 2004-01-19 MA MA27491A patent/MA26125A1/en unknown
- 2004-01-19 NO NO20040227A patent/NO20040227L/en not_active Application Discontinuation
- 2004-01-19 HR HR20040047A patent/HRP20040047A2/en not_active Application Discontinuation
Also Published As
Publication number | Publication date |
---|---|
NO20040227L (en) | 2004-03-30 |
EP1412862A2 (en) | 2004-04-28 |
TNSN04014A1 (en) | 2006-06-01 |
CN1552010A (en) | 2004-12-01 |
HRP20040047A2 (en) | 2004-06-30 |
KR20040031778A (en) | 2004-04-13 |
WO2003012650A2 (en) | 2003-02-13 |
CN100451910C (en) | 2009-01-14 |
FR2828304B1 (en) | 2010-09-03 |
PL367424A1 (en) | 2005-02-21 |
CA2454092A1 (en) | 2003-02-13 |
JP3949108B2 (en) | 2007-07-25 |
FR2828304A1 (en) | 2003-02-07 |
MXPA04000594A (en) | 2005-02-17 |
WO2003012650A3 (en) | 2003-12-24 |
HUP0400223A2 (en) | 2004-08-30 |
IL159954A0 (en) | 2004-06-20 |
ZA200400349B (en) | 2005-03-30 |
JP2004537807A (en) | 2004-12-16 |
BR0211371A (en) | 2004-09-28 |
MA26125A1 (en) | 2004-04-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2001294017A1 (en) | A method for controlling access to protected content | |
WO2003063499A3 (en) | Methods and systems for start code emulation prevention and data stuffing | |
WO2002103532A3 (en) | Data processing method | |
AU2003227411A1 (en) | Processor system, task control method on computer system, computer program | |
WO2004055634A3 (en) | Systems and methods for detecting a security breach in a computer system | |
WO2004019204A8 (en) | Processing application data | |
AU2002245463A1 (en) | System and method for selectively enabling and disabling access to software applications over a network | |
WO2006035227A3 (en) | Source code protection | |
SG155210A1 (en) | Substrate processing apparatus, use state ascertaining method, and false use preventing method | |
WO2007035383A3 (en) | A system and method for allowing copying or distribution of a copy protected signal | |
EP1566970A4 (en) | Moving image predicting method, moving image encoding method and device, and moving image decoding method and device | |
AU2002211253A1 (en) | Method and apparatus to improve the protection of information presented by a computer | |
DE50113101D1 (en) | Software protection mechanism | |
YU5504A (en) | Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use | |
AU2003256174A1 (en) | Irregular mesh and embedded geometric description in a computer graphics system | |
WO2004012029A3 (en) | Restricting access to a method in a component | |
YU5404A (en) | Method for protecting a software using a so-called variable principle against its unauthorised use | |
YU5804A (en) | Method for protecting a software using a so-called elementary functions principle against its unauthorised use | |
GR1003432B (en) | System for the protection of the software of an optical disk | |
YU5904A (en) | Method for protecting a software using a so-called conditional jump principle against its unauthorised use | |
AU2002253122A1 (en) | Coding of data in a data package | |
WO2003079164A3 (en) | Device for protection against unauthorized use of software | |
TW200513088A (en) | The system and method for protecting digital content | |
TW200723035A (en) | Data processing method and system | |
WO2003007150A3 (en) | A data-flow programming method and system |