WO2003012604A3 - Method for protecting a software using a so-called renaming principle against its unauthorised use - Google Patents
Method for protecting a software using a so-called renaming principle against its unauthorised use Download PDFInfo
- Publication number
- WO2003012604A3 WO2003012604A3 PCT/FR2002/002340 FR0202340W WO03012604A3 WO 2003012604 A3 WO2003012604 A3 WO 2003012604A3 FR 0202340 W FR0202340 W FR 0202340W WO 03012604 A3 WO03012604 A3 WO 03012604A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- renaming
- unit
- protecting
- triggering
- software
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 4
- 230000001419 dependent effect Effects 0.000 abstract 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Storage Device Security (AREA)
- Executing Machine-Instructions (AREA)
- Logic Circuits (AREA)
Abstract
Priority Applications (13)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2003517722A JP3949105B2 (en) | 2001-07-31 | 2002-07-04 | How to protect the software against its unauthorized use using the "Rename" principle |
KR10-2004-7000806A KR20040032858A (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called renaming principle against its unauthorized use |
IL15995102A IL159951A0 (en) | 2001-07-31 | 2002-07-04 | Method to protect software against unauthorised use with a renaming principle |
HU0400232A HUP0400232A2 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called renaming principle against its unauthorised use |
EP02762526A EP1412837A2 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called renaming principle against its unauthorised use |
MXPA04000596A MXPA04000596A (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called renaming principle against its unauthorised use. |
BR0211375-9A BR0211375A (en) | 2001-07-31 | 2002-07-04 | Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit |
CA002454094A CA2454094A1 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called renaming principle against its unauthorised use |
ZA2004/00350A ZA200400350B (en) | 2001-07-31 | 2004-01-16 | Method for protecting a software using a so called renaming principle against its unauthorised use |
TNP2004000013A TNSN04013A1 (en) | 2001-07-31 | 2004-01-19 | METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "RENAMING" AGAINST ITS UNAUTHORIZED USE |
HR20040048A HRP20040048A2 (en) | 2001-07-31 | 2004-01-19 | Method for protecting a software using a so-called renaming principle against its unauthorised use |
NO20040231A NO20040231L (en) | 2001-07-31 | 2004-01-19 | Procedure for Protecting a Software, Using a Socially Named Principle, From Unauthorized Use of It |
HK05102677A HK1070154A1 (en) | 2001-07-31 | 2005-03-30 | Method to protect software against unwanted use with a renaming principle |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0110246A FR2828303B1 (en) | 2001-07-31 | 2001-07-31 | METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "RENAMING" AGAINST ITS UNAUTHORIZED USE |
FR01/10246 | 2001-07-31 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2003012604A2 WO2003012604A2 (en) | 2003-02-13 |
WO2003012604A3 true WO2003012604A3 (en) | 2004-01-22 |
Family
ID=8866121
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR2002/002340 WO2003012604A2 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called renaming principle against its unauthorised use |
Country Status (19)
Country | Link |
---|---|
EP (1) | EP1412837A2 (en) |
JP (1) | JP3949105B2 (en) |
KR (1) | KR20040032858A (en) |
CN (1) | CN1288524C (en) |
BR (1) | BR0211375A (en) |
CA (1) | CA2454094A1 (en) |
FR (1) | FR2828303B1 (en) |
HK (1) | HK1070154A1 (en) |
HR (1) | HRP20040048A2 (en) |
HU (1) | HUP0400232A2 (en) |
IL (1) | IL159951A0 (en) |
MA (1) | MA26127A1 (en) |
MX (1) | MXPA04000596A (en) |
NO (1) | NO20040231L (en) |
PL (1) | PL367440A1 (en) |
TN (1) | TNSN04013A1 (en) |
WO (1) | WO2003012604A2 (en) |
YU (1) | YU5604A (en) |
ZA (1) | ZA200400350B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100346252C (en) * | 2005-09-28 | 2007-10-31 | 珠海金山软件股份有限公司 | Computer software security loophole repairing apparatus and method |
JP4770425B2 (en) * | 2005-11-24 | 2011-09-14 | 富士ゼロックス株式会社 | Program, method and apparatus for creating protected execution program |
CN100437615C (en) * | 2006-10-16 | 2008-11-26 | 珠海金山软件股份有限公司 | Method for protecting dynamic chanining bank interface under windows platform |
CN103198244B (en) * | 2013-03-26 | 2016-06-29 | 北京深思数盾科技股份有限公司 | The method of protection dynamic link library |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2634917A1 (en) * | 1988-08-01 | 1990-02-02 | Pionchon Philippe | METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
WO1999001815A1 (en) * | 1997-06-09 | 1999-01-14 | Intertrust, Incorporated | Obfuscation techniques for enhancing software security |
WO1999066387A1 (en) * | 1998-06-12 | 1999-12-23 | Gemplus | Method for verifying the execution of a software product |
-
2001
- 2001-07-31 FR FR0110246A patent/FR2828303B1/en not_active Expired - Lifetime
-
2002
- 2002-07-04 HU HU0400232A patent/HUP0400232A2/en unknown
- 2002-07-04 EP EP02762526A patent/EP1412837A2/en not_active Withdrawn
- 2002-07-04 CN CNB028146719A patent/CN1288524C/en not_active Expired - Fee Related
- 2002-07-04 JP JP2003517722A patent/JP3949105B2/en not_active Expired - Fee Related
- 2002-07-04 CA CA002454094A patent/CA2454094A1/en not_active Abandoned
- 2002-07-04 WO PCT/FR2002/002340 patent/WO2003012604A2/en active Application Filing
- 2002-07-04 MX MXPA04000596A patent/MXPA04000596A/en unknown
- 2002-07-04 IL IL15995102A patent/IL159951A0/en unknown
- 2002-07-04 PL PL02367440A patent/PL367440A1/en not_active Application Discontinuation
- 2002-07-04 KR KR10-2004-7000806A patent/KR20040032858A/en not_active Withdrawn
- 2002-07-04 YU YU5604A patent/YU5604A/en unknown
- 2002-07-04 BR BR0211375-9A patent/BR0211375A/en not_active IP Right Cessation
-
2004
- 2004-01-16 ZA ZA2004/00350A patent/ZA200400350B/en unknown
- 2004-01-19 TN TNP2004000013A patent/TNSN04013A1/en unknown
- 2004-01-19 MA MA27493A patent/MA26127A1/en unknown
- 2004-01-19 NO NO20040231A patent/NO20040231L/en not_active Application Discontinuation
- 2004-01-19 HR HR20040048A patent/HRP20040048A2/en not_active Application Discontinuation
-
2005
- 2005-03-30 HK HK05102677A patent/HK1070154A1/en not_active IP Right Cessation
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2634917A1 (en) * | 1988-08-01 | 1990-02-02 | Pionchon Philippe | METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
WO1999001815A1 (en) * | 1997-06-09 | 1999-01-14 | Intertrust, Incorporated | Obfuscation techniques for enhancing software security |
WO1999066387A1 (en) * | 1998-06-12 | 1999-12-23 | Gemplus | Method for verifying the execution of a software product |
Also Published As
Publication number | Publication date |
---|---|
IL159951A0 (en) | 2004-06-20 |
NO20040231L (en) | 2004-03-30 |
MA26127A1 (en) | 2004-04-01 |
EP1412837A2 (en) | 2004-04-28 |
HUP0400232A2 (en) | 2004-09-28 |
HK1070154A1 (en) | 2005-06-10 |
YU5604A (en) | 2006-08-17 |
ZA200400350B (en) | 2005-03-30 |
TNSN04013A1 (en) | 2006-06-01 |
CA2454094A1 (en) | 2003-02-13 |
HRP20040048A2 (en) | 2004-06-30 |
PL367440A1 (en) | 2005-02-21 |
CN1535408A (en) | 2004-10-06 |
CN1288524C (en) | 2006-12-06 |
JP2004537800A (en) | 2004-12-16 |
JP3949105B2 (en) | 2007-07-25 |
FR2828303B1 (en) | 2010-09-03 |
FR2828303A1 (en) | 2003-02-07 |
WO2003012604A2 (en) | 2003-02-13 |
BR0211375A (en) | 2004-08-17 |
MXPA04000596A (en) | 2005-02-17 |
KR20040032858A (en) | 2004-04-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2006065956A3 (en) | Protecting computing systems from unauthorized programs | |
IL157542A0 (en) | System and method for restoring computer systems damaged by a malicious computer program | |
WO2004053684A3 (en) | Processing activity masking in a data processing system | |
AU2003227411A1 (en) | Processor system, task control method on computer system, computer program | |
WO2005020043A3 (en) | Program execution device | |
WO1999017202A3 (en) | System and method for computer operating system protection | |
EP1967981A4 (en) | Program execution control method, device, and execution control program | |
AU2001240137A1 (en) | Method and system for detecting viruses on handheld computers | |
WO2006047163A3 (en) | System and method for identifying and removing malware on a computer system | |
WO2007084263A3 (en) | Creating a relatively unique environment for computing platforms | |
WO2000023887A3 (en) | Method and apparatus for automatically optimizing execution of a computer program | |
WO2006101549A3 (en) | Secure system for allowing the execution of authorized computer program code | |
MY146723A (en) | System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container | |
WO2004086220A3 (en) | Controlled execution of a program used for a virtual machine on a portable data carrier | |
WO2007022392A3 (en) | Information protection method and system | |
AU5552000A (en) | Conditional instruction execution in a computer | |
WO2003090067A3 (en) | System for expanded instruction encoding and method thereof | |
WO2004040821A3 (en) | Handling files operated on physically different computers | |
WO2003012604A3 (en) | Method for protecting a software using a so-called renaming principle against its unauthorised use | |
WO2002082440A3 (en) | Method and system for protecting data | |
WO2005045557A3 (en) | The secure attention instruction central processing unit and system architecture | |
WO2008057694A3 (en) | Method and apparatus for protecting a software application against a virus | |
WO2004057434A3 (en) | Access control to a memory portion, the memory portion being concealed from operating system | |
WO1999019795A8 (en) | Method and apparatus for optimizing execution of load and store instructions | |
WO2003012374A3 (en) | Method for protecting a software using a so-called conditional jump principle against its unauthorised use |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: P-56/04 Country of ref document: YU |
|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BY BZ CA CH CN CO CR CU CZ DE DM DZ EC EE ES FI GB GD GE GH HR HU ID IL IN IS JP KE KG KP KR LC LK LR LS LT LU LV MA MD MG MN MW MX MZ NO NZ OM PH PL PT RU SD SE SG SI SK SL TJ TM TN TR TZ UA UG US UZ VN YU ZA ZM |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ UG ZM ZW AM AZ BY KG KZ RU TJ TM AT BE BG CH CY CZ DK EE ES FI FR GB GR IE IT LU MC PT SE SK TR BF BJ CF CG CI GA GN GQ GW ML MR NE SN TD TG Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2264/DELNP/2003 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2003517722 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: DZP2003000327 Country of ref document: DZ |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004/00350 Country of ref document: ZA Ref document number: 200400350 Country of ref document: ZA Ref document number: 2454094 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020047000806 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: P20040048A Country of ref document: HR Ref document number: 159951 Country of ref document: IL |
|
WWE | Wipo information: entry into national phase |
Ref document number: PA/a/2004/000596 Country of ref document: MX Ref document number: 20028146719 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002762526 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002328375 Country of ref document: AU |
|
WWP | Wipo information: published in national office |
Ref document number: 2002762526 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |