WO1999041651A3 - Method for protecting bytecode - Google Patents
Method for protecting bytecode Download PDFInfo
- Publication number
- WO1999041651A3 WO1999041651A3 PCT/SG1998/000010 SG9800010W WO9941651A3 WO 1999041651 A3 WO1999041651 A3 WO 1999041651A3 SG 9800010 W SG9800010 W SG 9800010W WO 9941651 A3 WO9941651 A3 WO 9941651A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- bytecode
- protecting
- encrypted
- executing
- run
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
Abstract
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0009367A GB2349250A (en) | 1998-02-13 | 1998-02-13 | Method for protecting bytecode |
PCT/SG1998/000010 WO1999041651A2 (en) | 1998-02-13 | 1998-02-13 | Method for protecting bytecode |
AU66453/98A AU6645398A (en) | 1998-02-13 | 1998-02-13 | Method for protecting bytecode |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/SG1998/000010 WO1999041651A2 (en) | 1998-02-13 | 1998-02-13 | Method for protecting bytecode |
Publications (2)
Publication Number | Publication Date |
---|---|
WO1999041651A2 WO1999041651A2 (en) | 1999-08-19 |
WO1999041651A3 true WO1999041651A3 (en) | 2002-06-20 |
Family
ID=20429836
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SG1998/000010 WO1999041651A2 (en) | 1998-02-13 | 1998-02-13 | Method for protecting bytecode |
Country Status (3)
Country | Link |
---|---|
AU (1) | AU6645398A (en) |
GB (1) | GB2349250A (en) |
WO (1) | WO1999041651A2 (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2343022B (en) * | 1998-10-19 | 2003-01-08 | Ibm | Encrypting of java methods |
US6681212B1 (en) | 1999-04-23 | 2004-01-20 | Nianning Zeng | Internet-based automated system and a method for software copyright protection and sales |
GB0024918D0 (en) * | 2000-10-11 | 2000-11-22 | Sealedmedia Ltd | Method of providing java tamperproofing |
DE10105053A1 (en) * | 2001-02-05 | 2002-08-29 | Hmd Software Ag | Method and device for transmitting program codes on the Internet |
GB2385951A (en) | 2001-09-21 | 2003-09-03 | Sun Microsystems Inc | Data encryption and decryption |
GB0310142D0 (en) * | 2003-05-02 | 2003-06-04 | Bitarts Ltd | Delivering a software component |
DE102004061634A1 (en) * | 2004-12-17 | 2006-06-29 | Siemens Ag | Method and apparatus for encrypting and executing a software library |
CN101957903A (en) * | 2010-09-13 | 2011-01-26 | 中兴通讯股份有限公司 | Method and device for protecting class files |
EP3188063A1 (en) * | 2015-12-29 | 2017-07-05 | GuardSquare NV | A build system |
CN111131281B (en) * | 2019-12-30 | 2022-09-02 | 北京永新视博数字电视技术有限公司 | Message transmission method, device and system and protection code updating method and device thereof |
US11550883B2 (en) | 2020-09-08 | 2023-01-10 | Assured Information Security, Inc. | Code protection |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0115395A2 (en) * | 1983-01-26 | 1984-08-08 | International Computers Limited | Computer processor system with software protection |
US4562305A (en) * | 1982-12-22 | 1985-12-31 | International Business Machines Corporation | Software cryptographic apparatus and method |
US4740890A (en) * | 1983-12-22 | 1988-04-26 | Software Concepts, Inc. | Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media |
EP0359220A2 (en) * | 1988-09-16 | 1990-03-21 | Wayne W. Chou | Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded hardware device |
EP0515739A1 (en) * | 1991-05-31 | 1992-12-02 | International Business Machines Corporation | Program code generator |
EP0555715A1 (en) * | 1992-02-12 | 1993-08-18 | International Business Machines Corporation | User defined cryptographic function facility |
US5259029A (en) * | 1990-05-16 | 1993-11-02 | Duncan Jr F Jeff | Decoding device for computer software protection |
US5522073A (en) * | 1993-11-22 | 1996-05-28 | Hewlett-Packard Company | Method and apparatus for automating and controlling execution of software tools and tool sets via when/then relationships |
US5544244A (en) * | 1993-10-28 | 1996-08-06 | Nec Corporation | Method for protecting an enciphered computer object code against cryptanalysis |
EP0740250A2 (en) * | 1995-04-24 | 1996-10-30 | Motorola, Inc. | Apparatus for dynamically reading and writing multiple object code formats through use of objective code readers and writers |
US5604803A (en) * | 1994-06-03 | 1997-02-18 | Sun Microsystems, Inc. | Method and apparatus for secure remote authentication in a public network |
-
1998
- 1998-02-13 WO PCT/SG1998/000010 patent/WO1999041651A2/en active Application Filing
- 1998-02-13 GB GB0009367A patent/GB2349250A/en not_active Withdrawn
- 1998-02-13 AU AU66453/98A patent/AU6645398A/en not_active Abandoned
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4562305A (en) * | 1982-12-22 | 1985-12-31 | International Business Machines Corporation | Software cryptographic apparatus and method |
EP0115395A2 (en) * | 1983-01-26 | 1984-08-08 | International Computers Limited | Computer processor system with software protection |
US4740890A (en) * | 1983-12-22 | 1988-04-26 | Software Concepts, Inc. | Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media |
EP0359220A2 (en) * | 1988-09-16 | 1990-03-21 | Wayne W. Chou | Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded hardware device |
US5259029A (en) * | 1990-05-16 | 1993-11-02 | Duncan Jr F Jeff | Decoding device for computer software protection |
EP0515739A1 (en) * | 1991-05-31 | 1992-12-02 | International Business Machines Corporation | Program code generator |
EP0555715A1 (en) * | 1992-02-12 | 1993-08-18 | International Business Machines Corporation | User defined cryptographic function facility |
US5544244A (en) * | 1993-10-28 | 1996-08-06 | Nec Corporation | Method for protecting an enciphered computer object code against cryptanalysis |
US5522073A (en) * | 1993-11-22 | 1996-05-28 | Hewlett-Packard Company | Method and apparatus for automating and controlling execution of software tools and tool sets via when/then relationships |
US5604803A (en) * | 1994-06-03 | 1997-02-18 | Sun Microsystems, Inc. | Method and apparatus for secure remote authentication in a public network |
EP0740250A2 (en) * | 1995-04-24 | 1996-10-30 | Motorola, Inc. | Apparatus for dynamically reading and writing multiple object code formats through use of objective code readers and writers |
Also Published As
Publication number | Publication date |
---|---|
WO1999041651A2 (en) | 1999-08-19 |
GB0009367D0 (en) | 2000-05-31 |
GB2349250A (en) | 2000-10-25 |
AU6645398A (en) | 1999-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
HK1020629A1 (en) | Method for storing and operating sensitive information in a security module, and associated security module | |
WO2005052841A3 (en) | Tamper-resistant trusted virtual machine | |
WO2003054662A3 (en) | A system and method for preventing unauthorized use of protected software utilizing a portable security device | |
WO2003042799A3 (en) | Device and method with reduced information leakage | |
WO2000052875A8 (en) | Transparent encryption and decryption with algorithm independent cryptographic engine that allows for containerization of encrypted files | |
EP0869635A3 (en) | Encrypted data recovery method using split storage key and system thereof | |
AU2002334409A1 (en) | An encryption device, a decrypting device, a secret key generation device,a copyright protection system and a cipher communication device | |
WO2004049620A8 (en) | System and method for securely installing a cryptographic system on a secure device | |
WO2001075563A3 (en) | Generating a key hierarchy for use in an isolated execution environment | |
GB2407238B (en) | A system and method for performing blind encryption and decryption | |
RU2010114241A (en) | MULTIFACTOR CONTENT PROTECTION | |
EP0746126A3 (en) | System for data copyright management using key distribution | |
WO2002056156A3 (en) | Computer system protection | |
MXPA04000265A (en) | Apparatus and method for installing a decryption key. | |
WO2006091304A3 (en) | System and method for drm regional and timezone key management | |
EP1282261A3 (en) | Method and system for the secure transfer of cryptographic keys via a network | |
CA2253102A1 (en) | Method of and system for processing electronic document and recording medium for recording processing program | |
WO1999041651A3 (en) | Method for protecting bytecode | |
WO2000059151A3 (en) | Rendering digital content in an encrypted rights-protected form | |
WO2002001333A3 (en) | System and method for providing an individualized secure repository | |
WO2006134304A3 (en) | Method for protecting a source code in semi-interpreted language | |
EP1054314A3 (en) | Information processing apparatus, information processing method and providing medium | |
CN100437615C (en) | Method for protecting dynamic chanining bank interface under windows platform | |
WO2002045320A3 (en) | Method for dynamically using cryptographic keys in a postage meter | |
EP0891053A3 (en) | Key recovery condition encryption and decryption apparatuses |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AU CA CN GB IL JP KR NZ SG US |
|
ENP | Entry into the national phase |
Ref country code: GB Ref document number: 200009367 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09582724 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: KR |
|
NENP | Non-entry into the national phase |
Ref country code: CA |
|
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AU CA CN GB IL JP KR NZ SG US |