ZA200400351B - Method for protecting a software using a so called conditional jump principle against its unauthorised use - Google Patents
Method for protecting a software using a so called conditional jump principle against its unauthorised use Download PDFInfo
- Publication number
- ZA200400351B ZA200400351B ZA2004/00351A ZA200400351A ZA200400351B ZA 200400351 B ZA200400351 B ZA 200400351B ZA 2004/00351 A ZA2004/00351 A ZA 2004/00351A ZA 200400351 A ZA200400351 A ZA 200400351A ZA 200400351 B ZA200400351 B ZA 200400351B
- Authority
- ZA
- South Africa
- Prior art keywords
- execution
- unit
- protected software
- software
- during
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 116
- 238000012545 processing Methods 0.000 claims description 269
- 230000001419 dependent effect Effects 0.000 claims description 94
- 230000008569 process Effects 0.000 claims description 93
- 238000005259 measurement Methods 0.000 claims description 75
- 238000001514 detection method Methods 0.000 claims description 67
- 238000012986 modification Methods 0.000 claims description 57
- 230000004048 modification Effects 0.000 claims description 57
- 230000001960 triggered effect Effects 0.000 claims description 21
- 238000010276 construction Methods 0.000 claims description 15
- 230000001131 transforming effect Effects 0.000 claims description 7
- 238000012546 transfer Methods 0.000 description 60
- 238000010586 diagram Methods 0.000 description 10
- 230000006872 improvement Effects 0.000 description 10
- 238000012544 monitoring process Methods 0.000 description 10
- 238000010494 dissociation reaction Methods 0.000 description 8
- 230000005593 dissociations Effects 0.000 description 8
- 230000002123 temporal effect Effects 0.000 description 8
- 230000014509 gene expression Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 238000011161 development Methods 0.000 description 4
- 238000009830 intercalation Methods 0.000 description 3
- 230000002093 peripheral effect Effects 0.000 description 3
- 230000004069 differentiation Effects 0.000 description 2
- 102100030886 Complement receptor type 1 Human genes 0.000 description 1
- 101000727061 Homo sapiens Complement receptor type 1 Proteins 0.000 description 1
- 101100072652 Xenopus laevis ins-b gene Proteins 0.000 description 1
- ULFUTCYGWMQVIO-PCVRPHSVSA-N [(6s,8r,9s,10r,13s,14s,17r)-17-acetyl-6,10,13-trimethyl-3-oxo-2,6,7,8,9,11,12,14,15,16-decahydro-1h-cyclopenta[a]phenanthren-17-yl] acetate;[(8r,9s,13s,14s,17s)-3-hydroxy-13-methyl-6,7,8,9,11,12,14,15,16,17-decahydrocyclopenta[a]phenanthren-17-yl] pentano Chemical compound C1CC2=CC(O)=CC=C2[C@@H]2[C@@H]1[C@@H]1CC[C@H](OC(=O)CCCC)[C@@]1(C)CC2.C([C@@]12C)CC(=O)C=C1[C@@H](C)C[C@@H]1[C@@H]2CC[C@]2(C)[C@@](OC(C)=O)(C(C)=O)CC[C@H]21 ULFUTCYGWMQVIO-PCVRPHSVSA-N 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 239000003550 marker Substances 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Storage Device Security (AREA)
- Circuits Of Receivers In General (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0110245A FR2828302B1 (fr) | 2001-07-31 | 2001-07-31 | Procede pour proteger un logiciel a l'aide d'un principe dit de "branchement conditionnel" contre son utilisation non autorisee |
PCT/FR2002/002342 WO2003012374A2 (fr) | 2001-07-31 | 2002-07-04 | Procede pour proteger un logiciel a l'aide de 'branchement conditionnel' contre son utilisation non autorisee |
Publications (1)
Publication Number | Publication Date |
---|---|
ZA200400351B true ZA200400351B (en) | 2005-03-30 |
Family
ID=8866120
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
ZA2004/00351A ZA200400351B (en) | 2001-07-31 | 2004-01-16 | Method for protecting a software using a so called conditional jump principle against its unauthorised use |
Country Status (19)
Country | Link |
---|---|
EP (1) | EP1412705A2 (zh) |
JP (1) | JP3949103B2 (zh) |
KR (1) | KR20040032859A (zh) |
CN (1) | CN1313898C (zh) |
BR (1) | BR0211370A (zh) |
CA (1) | CA2454095A1 (zh) |
FR (1) | FR2828302B1 (zh) |
HK (1) | HK1072110A1 (zh) |
HR (1) | HRP20040046A2 (zh) |
HU (1) | HUP0400221A2 (zh) |
IL (1) | IL159952A0 (zh) |
MA (1) | MA26124A1 (zh) |
MX (1) | MXPA04000593A (zh) |
NO (1) | NO20040228L (zh) |
PL (1) | PL367485A1 (zh) |
TN (1) | TNSN04010A1 (zh) |
WO (1) | WO2003012374A2 (zh) |
YU (1) | YU5904A (zh) |
ZA (1) | ZA200400351B (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101217668B1 (ko) * | 2011-05-12 | 2013-01-02 | 주식회사 안랩 | 악성 프로그램 후킹 방지 장치 및 방법 |
KR101444929B1 (ko) * | 2012-12-04 | 2014-09-26 | 주식회사 안랩 | 비정상 경로 호출 감지 장치 및 비정상 경로 호출 감지 방법 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2634917A1 (fr) * | 1988-08-01 | 1990-02-02 | Pionchon Philippe | Procede et dispositif de protection d'un logiciel, en particulier contre les copies non autorisees |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
JP4739465B2 (ja) * | 1997-06-09 | 2011-08-03 | インタートラスト テクノロジーズ コーポレイション | ソフトウェアセキュリティを増強するための混乱化技術 |
EP1086411B1 (fr) * | 1998-06-12 | 2003-11-12 | Gemplus | Procede de controle de l'execution d'un produit logiciel |
-
2001
- 2001-07-31 FR FR0110245A patent/FR2828302B1/fr not_active Expired - Lifetime
-
2002
- 2002-07-04 IL IL15995202A patent/IL159952A0/xx unknown
- 2002-07-04 EP EP02762527A patent/EP1412705A2/fr not_active Withdrawn
- 2002-07-04 JP JP2003517522A patent/JP3949103B2/ja not_active Expired - Fee Related
- 2002-07-04 HU HU0400221A patent/HUP0400221A2/hu unknown
- 2002-07-04 BR BR0211370-8A patent/BR0211370A/pt not_active IP Right Cessation
- 2002-07-04 CA CA002454095A patent/CA2454095A1/fr not_active Abandoned
- 2002-07-04 YU YU5904A patent/YU5904A/sh unknown
- 2002-07-04 KR KR10-2004-7000807A patent/KR20040032859A/ko not_active Application Discontinuation
- 2002-07-04 MX MXPA04000593A patent/MXPA04000593A/es unknown
- 2002-07-04 CN CNB028146735A patent/CN1313898C/zh not_active Expired - Fee Related
- 2002-07-04 WO PCT/FR2002/002342 patent/WO2003012374A2/fr active Application Filing
- 2002-07-04 PL PL02367485A patent/PL367485A1/xx not_active Application Discontinuation
-
2004
- 2004-01-16 ZA ZA2004/00351A patent/ZA200400351B/en unknown
- 2004-01-19 HR HR20040046A patent/HRP20040046A2/hr not_active Application Discontinuation
- 2004-01-19 TN TNP2004000010A patent/TNSN04010A1/fr unknown
- 2004-01-19 MA MA27490A patent/MA26124A1/fr unknown
- 2004-01-19 NO NO20040228A patent/NO20040228L/no not_active Application Discontinuation
-
2005
- 2005-04-26 HK HK05103547A patent/HK1072110A1/xx not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
HRP20040046A2 (en) | 2004-10-31 |
CN1541351A (zh) | 2004-10-27 |
NO20040228L (no) | 2004-03-30 |
CA2454095A1 (fr) | 2003-02-13 |
EP1412705A2 (fr) | 2004-04-28 |
FR2828302A1 (fr) | 2003-02-07 |
KR20040032859A (ko) | 2004-04-17 |
FR2828302B1 (fr) | 2010-09-03 |
MXPA04000593A (es) | 2005-02-17 |
WO2003012374A2 (fr) | 2003-02-13 |
TNSN04010A1 (fr) | 2006-06-01 |
HUP0400221A2 (en) | 2004-08-30 |
JP2004537794A (ja) | 2004-12-16 |
WO2003012374A3 (fr) | 2003-12-24 |
YU5904A (sh) | 2006-08-17 |
JP3949103B2 (ja) | 2007-07-25 |
PL367485A1 (en) | 2005-02-21 |
MA26124A1 (fr) | 2004-04-01 |
BR0211370A (pt) | 2004-09-21 |
IL159952A0 (en) | 2004-06-20 |
CN1313898C (zh) | 2007-05-02 |
HK1072110A1 (en) | 2005-08-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20070294770A1 (en) | Method to Protect Software Against Unwanted Use with a Variable Principle | |
US20070136816A1 (en) | Method to protect software against unwanted use with a detection and coercion principle | |
US20070283437A1 (en) | Method to Protect Software Against Unwanted Use with a "Temporal Dissociation" Principle | |
US20070277239A1 (en) | Method to Protect Software Against Unwanted Use with a "Renaming" Principle | |
US7502940B2 (en) | Method to protect software against unwanted use with a “conditional branch” principle | |
US7434064B2 (en) | Method to protect software against unwanted use with a “elementary functions” principle | |
ZA200400350B (en) | Method for protecting a software using a so called renaming principle against its unauthorised use | |
ZA200400351B (en) | Method for protecting a software using a so called conditional jump principle against its unauthorised use | |
AU2002325998B2 (en) | Method for protecting a software using a so-called variable principle against its unauthorised use | |
ZA200400349B (en) | Method for protecting a software using a so called temporal dissociation principle against its unauthorised use | |
AU2002328377B2 (en) | Method for protecting a software using a so-called detection and coercion principle against its unauthorised use | |
ZA200400353B (en) | Method for protecting a software using a so called elementary functions principle against its unauthorised use |