WO2003012604A3 - Method for protecting a software using a so-called renaming principle against its unauthorised use - Google Patents

Method for protecting a software using a so-called renaming principle against its unauthorised use Download PDF

Info

Publication number
WO2003012604A3
WO2003012604A3 PCT/FR2002/002340 FR0202340W WO03012604A3 WO 2003012604 A3 WO2003012604 A3 WO 2003012604A3 FR 0202340 W FR0202340 W FR 0202340W WO 03012604 A3 WO03012604 A3 WO 03012604A3
Authority
WO
WIPO (PCT)
Prior art keywords
renaming
unit
protecting
triggering
software
Prior art date
Application number
PCT/FR2002/002340
Other languages
French (fr)
Other versions
WO2003012604A2 (en
Inventor
Jean-Christophe Cuenod
Gilles Sgro
Original Assignee
Validy
Jean-Christophe Cuenod
Gilles Sgro
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to MXPA04000596A priority Critical patent/MXPA04000596A/en
Priority to HU0400232A priority patent/HUP0400232A2/en
Priority to JP2003517722A priority patent/JP3949105B2/en
Priority to KR10-2004-7000806A priority patent/KR20040032858A/en
Application filed by Validy, Jean-Christophe Cuenod, Gilles Sgro filed Critical Validy
Priority to IL15995102A priority patent/IL159951A0/en
Priority to BR0211375-9A priority patent/BR0211375A/en
Priority to EP02762526A priority patent/EP1412837A2/en
Priority to CA002454094A priority patent/CA2454094A1/en
Publication of WO2003012604A2 publication Critical patent/WO2003012604A2/en
Priority to ZA2004/00350A priority patent/ZA200400350B/en
Priority to NO20040231A priority patent/NO20040231L/en
Priority to HR20040048A priority patent/HRP20040048A2/en
Priority to TNP2004000013A priority patent/TNSN04013A1/en
Publication of WO2003012604A3 publication Critical patent/WO2003012604A3/en
Priority to HK05102677A priority patent/HK1070154A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Storage Device Security (AREA)
  • Executing Machine-Instructions (AREA)
  • Logic Circuits (AREA)

Abstract

The invention concerns a method for protecting, from a unit, a vulnerable software against unauthorised use, said vulnerable software operating on a data processing system. The inventive method consists in defining: a set of dependent functions whereof the dependent functions are executable in a unit; a set of triggering commands, said triggering commands capable of being executed in the data processing system and of triggering execution of the dependent functions in a unit; for each triggering command, an instruction; a method for renaming the instructions; and reinstating means for implementation in a unit during a use phase, and enabling to recover the dependent function to be executed, from the renamed instruction.
PCT/FR2002/002340 2001-07-31 2002-07-04 Method for protecting a software using a so-called renaming principle against its unauthorised use WO2003012604A2 (en)

Priority Applications (13)

Application Number Priority Date Filing Date Title
BR0211375-9A BR0211375A (en) 2001-07-31 2002-07-04 Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit
JP2003517722A JP3949105B2 (en) 2001-07-31 2002-07-04 How to protect the software against its unauthorized use using the "Rename" principle
KR10-2004-7000806A KR20040032858A (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called renaming principle against its unauthorized use
CA002454094A CA2454094A1 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called renaming principle against its unauthorised use
IL15995102A IL159951A0 (en) 2001-07-31 2002-07-04 Method to protect software against unauthorised use with a renaming principle
HU0400232A HUP0400232A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called renaming principle against its unauthorised use
EP02762526A EP1412837A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called renaming principle against its unauthorised use
MXPA04000596A MXPA04000596A (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called renaming principle against its unauthorised use.
ZA2004/00350A ZA200400350B (en) 2001-07-31 2004-01-16 Method for protecting a software using a so called renaming principle against its unauthorised use
NO20040231A NO20040231L (en) 2001-07-31 2004-01-19 Procedure for Protecting a Software, Using a Socially Named Principle, From Unauthorized Use of It
HR20040048A HRP20040048A2 (en) 2001-07-31 2004-01-19 Method for protecting a software using a so-called renaming principle against its unauthorised use
TNP2004000013A TNSN04013A1 (en) 2001-07-31 2004-01-19 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "RENAMING" AGAINST ITS UNAUTHORIZED USE
HK05102677A HK1070154A1 (en) 2001-07-31 2005-03-30 Method to protect software against unwanted use with a renaming principle

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0110246A FR2828303B1 (en) 2001-07-31 2001-07-31 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "RENAMING" AGAINST ITS UNAUTHORIZED USE
FR01/10246 2001-07-31

Publications (2)

Publication Number Publication Date
WO2003012604A2 WO2003012604A2 (en) 2003-02-13
WO2003012604A3 true WO2003012604A3 (en) 2004-01-22

Family

ID=8866121

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/FR2002/002340 WO2003012604A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called renaming principle against its unauthorised use

Country Status (19)

Country Link
EP (1) EP1412837A2 (en)
JP (1) JP3949105B2 (en)
KR (1) KR20040032858A (en)
CN (1) CN1288524C (en)
BR (1) BR0211375A (en)
CA (1) CA2454094A1 (en)
FR (1) FR2828303B1 (en)
HK (1) HK1070154A1 (en)
HR (1) HRP20040048A2 (en)
HU (1) HUP0400232A2 (en)
IL (1) IL159951A0 (en)
MA (1) MA26127A1 (en)
MX (1) MXPA04000596A (en)
NO (1) NO20040231L (en)
PL (1) PL367440A1 (en)
TN (1) TNSN04013A1 (en)
WO (1) WO2003012604A2 (en)
YU (1) YU5604A (en)
ZA (1) ZA200400350B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100346252C (en) * 2005-09-28 2007-10-31 珠海金山软件股份有限公司 Computer software security loophole repairing apparatus and method
JP4770425B2 (en) * 2005-11-24 2011-09-14 富士ゼロックス株式会社 Program, method and apparatus for creating protected execution program
CN100437615C (en) * 2006-10-16 2008-11-26 珠海金山软件股份有限公司 Method for protecting dynamic chanining bank interface under windows platform
CN103198244B (en) * 2013-03-26 2016-06-29 北京深思数盾科技股份有限公司 The method of protection dynamic link library

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (en) * 1988-08-01 1990-02-02 Pionchon Philippe METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
WO1999001815A1 (en) * 1997-06-09 1999-01-14 Intertrust, Incorporated Obfuscation techniques for enhancing software security
WO1999066387A1 (en) * 1998-06-12 1999-12-23 Gemplus Method for verifying the execution of a software product

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (en) * 1988-08-01 1990-02-02 Pionchon Philippe METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
WO1999001815A1 (en) * 1997-06-09 1999-01-14 Intertrust, Incorporated Obfuscation techniques for enhancing software security
WO1999066387A1 (en) * 1998-06-12 1999-12-23 Gemplus Method for verifying the execution of a software product

Also Published As

Publication number Publication date
MXPA04000596A (en) 2005-02-17
ZA200400350B (en) 2005-03-30
CA2454094A1 (en) 2003-02-13
BR0211375A (en) 2004-08-17
FR2828303A1 (en) 2003-02-07
FR2828303B1 (en) 2010-09-03
CN1288524C (en) 2006-12-06
JP2004537800A (en) 2004-12-16
HK1070154A1 (en) 2005-06-10
MA26127A1 (en) 2004-04-01
HUP0400232A2 (en) 2004-09-28
NO20040231L (en) 2004-03-30
JP3949105B2 (en) 2007-07-25
HRP20040048A2 (en) 2004-06-30
IL159951A0 (en) 2004-06-20
EP1412837A2 (en) 2004-04-28
KR20040032858A (en) 2004-04-17
CN1535408A (en) 2004-10-06
PL367440A1 (en) 2005-02-21
YU5604A (en) 2006-08-17
TNSN04013A1 (en) 2006-06-01
WO2003012604A2 (en) 2003-02-13

Similar Documents

Publication Publication Date Title
WO2006065956A3 (en) Protecting computing systems from unauthorized programs
IL157542A0 (en) System and method for restoring computer systems damaged by a malicious computer program
WO2004053684A3 (en) Processing activity masking in a data processing system
AU2003227411A1 (en) Processor system, task control method on computer system, computer program
EP1967981A4 (en) Program execution control method, device, and execution control program
WO2006047163A3 (en) System and method for identifying and removing malware on a computer system
WO2007084263A3 (en) Creating a relatively unique environment for computing platforms
WO2000023887A3 (en) Method and apparatus for automatically optimizing execution of a computer program
WO2006101549A3 (en) Secure system for allowing the execution of authorized computer program code
WO2006036320A3 (en) System and method for creating a security application for programmable cryptography module
MY146723A (en) System and method for protection against untrusted system management code by redirecting a system management interrupt and creating a virtual machine container
WO2001057658A3 (en) A system and method for altering an operating system start-up sequence prior to operating system loading
WO2004086220A3 (en) Controlled execution of a program used for a virtual machine on a portable data carrier
WO2007011816A3 (en) An improved means for protecting computers from malicious software
WO2007022392A3 (en) Information protection method and system
WO2006015945A3 (en) Method, operating system, and computing device for processing a computer program
AU5552000A (en) Conditional instruction execution in a computer
WO2003090067A3 (en) System for expanded instruction encoding and method thereof
WO2004079513A3 (en) System and method for determining when an ejb compiler needs to be executed
WO2004040821A3 (en) Handling files operated on physically different computers
WO2003012604A3 (en) Method for protecting a software using a so-called renaming principle against its unauthorised use
WO2004077206A3 (en) Data processing system having a plurality of processing elements, a method of controlling a data processing system having a plurality of processing elements
WO2005045557A3 (en) The secure attention instruction central processing unit and system architecture
WO2008057694A3 (en) Method and apparatus for protecting a software application against a virus
WO2002003200A3 (en) Method and apparatus to replay transformed instructions

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: P-56/04

Country of ref document: YU

AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BY BZ CA CH CN CO CR CU CZ DE DM DZ EC EE ES FI GB GD GE GH HR HU ID IL IN IS JP KE KG KP KR LC LK LR LS LT LU LV MA MD MG MN MW MX MZ NO NZ OM PH PL PT RU SD SE SG SI SK SL TJ TM TN TR TZ UA UG US UZ VN YU ZA ZM

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ UG ZM ZW AM AZ BY KG KZ RU TJ TM AT BE BG CH CY CZ DK EE ES FI FR GB GR IE IT LU MC PT SE SK TR BF BJ CF CG CI GA GN GQ GW ML MR NE SN TD TG

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2264/DELNP/2003

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2003517722

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: DZP2003000327

Country of ref document: DZ

WWE Wipo information: entry into national phase

Ref document number: 2004/00350

Country of ref document: ZA

Ref document number: 200400350

Country of ref document: ZA

Ref document number: 2454094

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 1020047000806

Country of ref document: KR

WWE Wipo information: entry into national phase

Ref document number: P20040048A

Country of ref document: HR

Ref document number: 159951

Country of ref document: IL

WWE Wipo information: entry into national phase

Ref document number: PA/a/2004/000596

Country of ref document: MX

Ref document number: 20028146719

Country of ref document: CN

WWE Wipo information: entry into national phase

Ref document number: 2002762526

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2002328375

Country of ref document: AU

WWP Wipo information: published in national office

Ref document number: 2002762526

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642