+

WO2003012650A3 - Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use - Google Patents

Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use Download PDF

Info

Publication number
WO2003012650A3
WO2003012650A3 PCT/FR2002/002339 FR0202339W WO03012650A3 WO 2003012650 A3 WO2003012650 A3 WO 2003012650A3 FR 0202339 W FR0202339 W FR 0202339W WO 03012650 A3 WO03012650 A3 WO 03012650A3
Authority
WO
WIPO (PCT)
Prior art keywords
software
protecting
unit
unauthorised use
source
Prior art date
Application number
PCT/FR2002/002339
Other languages
French (fr)
Other versions
WO2003012650A2 (en
Inventor
Jean-Christophe Cuenod
Gilles Sgro
Original Assignee
Validy
Jean-Christophe Cuenod
Gilles Sgro
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to IL15995402A priority Critical patent/IL159954A0/en
Priority to CA002454092A priority patent/CA2454092A1/en
Priority to KR10-2004-7000805A priority patent/KR20040031778A/en
Priority to BR0211371-6A priority patent/BR0211371A/en
Priority to MXPA04000594A priority patent/MXPA04000594A/en
Priority to JP2003517759A priority patent/JP3949108B2/en
Priority to HU0400223A priority patent/HUP0400223A2/en
Priority to EP02760379A priority patent/EP1412862A2/en
Application filed by Validy, Jean-Christophe Cuenod, Gilles Sgro filed Critical Validy
Publication of WO2003012650A2 publication Critical patent/WO2003012650A2/en
Publication of WO2003012650A3 publication Critical patent/WO2003012650A3/en
Priority to ZA2004/00349A priority patent/ZA200400349B/en
Priority to TNP2004000014A priority patent/TNSN04014A1/en
Priority to NO20040227A priority patent/NO20040227L/en
Priority to HR20040047A priority patent/HRP20040047A2/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention concerns a method for protecting, from a unit, a vulnerable software, against unauthorised use, said vulnerable software operating on a data processing system. The inventive method consists in creating a protected software: by selecting at least an algorithmic processing; by producing the source of the protected software from the vulnerable software source, by modifying the vulnerable software source, so that at least a selected algorithmic processing is broken down such that when the protected software is executed there occur several separate steps, namely: providing at least an operand for the unit; production by the unit, of the functionality of the algorithmic processing on at least said operand; and optionally, production of at least a result, by the unit for the data processing system.
PCT/FR2002/002339 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use WO2003012650A2 (en)

Priority Applications (12)

Application Number Priority Date Filing Date Title
HU0400223A HUP0400223A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
KR10-2004-7000805A KR20040031778A (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorized use
BR0211371-6A BR0211371A (en) 2001-07-31 2002-07-04 Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit
MXPA04000594A MXPA04000594A (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use.
JP2003517759A JP3949108B2 (en) 2001-07-31 2002-07-04 How to protect software against unauthorized use with the “temporary separation” principle
IL15995402A IL159954A0 (en) 2001-07-31 2002-07-04 Method to protect software against unauthorised use with a temporal dissociation principle
CA002454092A CA2454092A1 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
EP02760379A EP1412862A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
ZA2004/00349A ZA200400349B (en) 2001-07-31 2004-01-16 Method for protecting a software using a so called temporal dissociation principle against its unauthorised use
TNP2004000014A TNSN04014A1 (en) 2001-07-31 2004-01-19 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "TIME DISSOCIATION" AGAINST ITS UNAUTHORIZED USE
NO20040227A NO20040227L (en) 2001-07-31 2004-01-19 Procedure for Protecting a Software, Using a Sacred Temporal Dissociation Principle, from Unauthorized Use of it
HR20040047A HRP20040047A2 (en) 2001-07-31 2004-01-19 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR01/10247 2001-07-31
FR0110247A FR2828304B1 (en) 2001-07-31 2001-07-31 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "TIME DISSOCIATION" AGAINST ITS UNAUTHORIZED USE

Publications (2)

Publication Number Publication Date
WO2003012650A2 WO2003012650A2 (en) 2003-02-13
WO2003012650A3 true WO2003012650A3 (en) 2003-12-24

Family

ID=8866122

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/FR2002/002339 WO2003012650A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use

Country Status (18)

Country Link
EP (1) EP1412862A2 (en)
JP (1) JP3949108B2 (en)
KR (1) KR20040031778A (en)
CN (1) CN100451910C (en)
BR (1) BR0211371A (en)
CA (1) CA2454092A1 (en)
FR (1) FR2828304B1 (en)
HR (1) HRP20040047A2 (en)
HU (1) HUP0400223A2 (en)
IL (1) IL159954A0 (en)
MA (1) MA26125A1 (en)
MX (1) MXPA04000594A (en)
NO (1) NO20040227L (en)
PL (1) PL367424A1 (en)
TN (1) TNSN04014A1 (en)
WO (1) WO2003012650A2 (en)
YU (1) YU5504A (en)
ZA (1) ZA200400349B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102011006000B4 (en) * 2011-03-23 2015-01-15 Infineon Technologies Ag Signature update by code transformation
KR101217668B1 (en) * 2011-05-12 2013-01-02 주식회사 안랩 Malicious program hooking prevention apparatus and method
US11595201B2 (en) * 2020-02-21 2023-02-28 Cyber Armor Ltd. System and method for generation of a disposable software module for cryptographic material protection

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (en) * 1988-08-01 1990-02-02 Pionchon Philippe METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
WO1999001815A1 (en) * 1997-06-09 1999-01-14 Intertrust, Incorporated Obfuscation techniques for enhancing software security
WO1999066387A1 (en) * 1998-06-12 1999-12-23 Gemplus Method for verifying the execution of a software product

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (en) * 1988-08-01 1990-02-02 Pionchon Philippe METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
WO1999001815A1 (en) * 1997-06-09 1999-01-14 Intertrust, Incorporated Obfuscation techniques for enhancing software security
WO1999066387A1 (en) * 1998-06-12 1999-12-23 Gemplus Method for verifying the execution of a software product

Also Published As

Publication number Publication date
EP1412862A2 (en) 2004-04-28
HUP0400223A2 (en) 2004-08-30
KR20040031778A (en) 2004-04-13
JP3949108B2 (en) 2007-07-25
MA26125A1 (en) 2004-04-01
NO20040227L (en) 2004-03-30
CN100451910C (en) 2009-01-14
PL367424A1 (en) 2005-02-21
FR2828304B1 (en) 2010-09-03
MXPA04000594A (en) 2005-02-17
CN1552010A (en) 2004-12-01
YU5504A (en) 2006-05-25
BR0211371A (en) 2004-09-28
TNSN04014A1 (en) 2006-06-01
CA2454092A1 (en) 2003-02-13
WO2003012650A2 (en) 2003-02-13
JP2004537807A (en) 2004-12-16
IL159954A0 (en) 2004-06-20
FR2828304A1 (en) 2003-02-07
ZA200400349B (en) 2005-03-30
HRP20040047A2 (en) 2004-06-30

Similar Documents

Publication Publication Date Title
AU2001294017A1 (en) A method for controlling access to protected content
AU2003227411A1 (en) Processor system, task control method on computer system, computer program
WO2002067090A3 (en) System and method for selectively enabling and disabling access to software applications over a network
WO2002103532A3 (en) Data processing method
WO2006036320A3 (en) System and method for creating a security application for programmable cryptography module
WO2004019204A8 (en) Processing application data
WO2003034188A3 (en) Method and system for detecting unauthorised executable programs _______________________________________________________________
AU2002337829A1 (en) Video tripwire
WO2002101497A3 (en) System, method and computer program product for programmable fragment processing in a graphics pipeline
WO2001052061A3 (en) Method and apparatus for using an assist processor to pre-fetch data values for a primary processor
WO2007024367A8 (en) System and method for controlling access to mobile devices
WO2004027586A3 (en) Method for protecting against manipulation of a controller for at least one motor vehicle component and controller
WO2003012650A3 (en) Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
WO2002069255A3 (en) A method and system for the quantum mechanical representation and processing of fuzzy information
WO2004012029A3 (en) Restricting access to a method in a component
GR950100366A (en) System for the protection of the software of an optical disk.
WO2003012649A3 (en) Method for protecting a software using a so-called variable principle against its unauthorised use
WO2003012605A3 (en) Method for protecting a software using a so-called elementary functions principle against its unauthorised use
IL164596A0 (en) Method and computer for experimental design
WO2005110565A3 (en) Protecting a gaming machine from rogue code
WO2003012374A3 (en) Method for protecting a software using a so-called conditional jump principle against its unauthorised use
WO2004026641A8 (en) Method for protecting a motor vehicle component against manipulations in a control device, and control device
YU5604A (en) Method for protecting a software using a so-called renaming principle against its unauthorised use
WO2003007150A3 (en) A data-flow programming method and system
WO2005078537A3 (en) Projection method for an automation system

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: P-55/04

Country of ref document: YU

AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BY BZ CA CH CN CO CR CU CZ DE DM DZ EC EE ES FI GB GD GE GH HR HU ID IL IN IS JP KE KG KP KR LC LK LR LS LT LU LV MA MD MG MN MW MX MZ NO NZ OM PH PL PT RU SD SE SG SI SK SL TJ TM TN TR TZ UA UG US UZ VN YU ZA ZM

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ UG ZM ZW AM AZ BY KG KZ RU TJ TM AT BE BG CH CY CZ DK EE ES FI FR GB GR IE IT LU MC PT SE SK TR BF BJ CF CG CI GA GN GQ GW ML MR NE SN TD TG

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2236/DELNP/2003

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2003517759

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: DZP2003000325

Country of ref document: DZ

WWE Wipo information: entry into national phase

Ref document number: 2004/00349

Country of ref document: ZA

Ref document number: 2454092

Country of ref document: CA

Ref document number: 200400349

Country of ref document: ZA

WWE Wipo information: entry into national phase

Ref document number: 1020047000805

Country of ref document: KR

WWE Wipo information: entry into national phase

Ref document number: P20040047A

Country of ref document: HR

Ref document number: 159954

Country of ref document: IL

WWE Wipo information: entry into national phase

Ref document number: 20028146859

Country of ref document: CN

Ref document number: PA/a/2004/000594

Country of ref document: MX

WWE Wipo information: entry into national phase

Ref document number: 2002760379

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2002325999

Country of ref document: AU

WWP Wipo information: published in national office

Ref document number: 2002760379

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载