WO2003012649A3 - Method for protecting a software using a so-called variable principle against its unauthorised use - Google Patents

Method for protecting a software using a so-called variable principle against its unauthorised use Download PDF

Info

Publication number
WO2003012649A3
WO2003012649A3 PCT/FR2002/002338 FR0202338W WO03012649A3 WO 2003012649 A3 WO2003012649 A3 WO 2003012649A3 FR 0202338 W FR0202338 W FR 0202338W WO 03012649 A3 WO03012649 A3 WO 03012649A3
Authority
WO
WIPO (PCT)
Prior art keywords
software
protecting
unauthorised use
called variable
source
Prior art date
Application number
PCT/FR2002/002338
Other languages
French (fr)
Other versions
WO2003012649A2 (en
Inventor
Jean-Christophe Cuenod
Gilles Sgro
Original Assignee
Validy
Jean-Christophe Cuenod
Gilles Sgro
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to UA2004010469A priority Critical patent/UA77186C2/en
Priority to MXPA04000488A priority patent/MXPA04000488A/en
Priority to IL15995302A priority patent/IL159953A0/en
Priority to KR1020047000804A priority patent/KR100940347B1/en
Priority to APAP/P/2004/002958A priority patent/AP2004002958A0/en
Priority to JP2003517758A priority patent/JP3949107B2/en
Priority to HU0400228A priority patent/HUP0400228A2/en
Priority to EA200400057A priority patent/EA005465B1/en
Application filed by Validy, Jean-Christophe Cuenod, Gilles Sgro filed Critical Validy
Priority to EP02760378A priority patent/EP1412861A2/en
Priority to AU2002325998A priority patent/AU2002325998B2/en
Priority to CA002454090A priority patent/CA2454090A1/en
Priority to BR0211374-0A priority patent/BR0211374A/en
Publication of WO2003012649A2 publication Critical patent/WO2003012649A2/en
Publication of WO2003012649A3 publication Critical patent/WO2003012649A3/en
Priority to ZA2004/00348A priority patent/ZA200400348B/en
Priority to HR20040049A priority patent/HRP20040049A2/en
Priority to TNP2004000012A priority patent/TNSN04012A1/en
Priority to NO20040232A priority patent/NO20040232L/en
Priority to IS7121A priority patent/IS7121A/en
Priority to HK05102678A priority patent/HK1070155A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Abstract

The invention concerns a method for protecting, from at least a unit, a vulnerable software against its unauthorised use, said vulnerable software operating on a data processing system. The method consists in creating a protected software: by selecting in the source of the vulnerable software at least a variable; by producing the source of the protected software by modifying the source of the vulnerable software, so that the selected variable becomes resident in a unit.
PCT/FR2002/002338 2001-07-31 2002-07-04 Method for protecting a software using a so-called variable principle against its unauthorised use WO2003012649A2 (en)

Priority Applications (18)

Application Number Priority Date Filing Date Title
UA2004010469A UA77186C2 (en) 2001-07-31 2002-04-07 Method for protecting software against unauthorized use by a controlled variable
EP02760378A EP1412861A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called variable principle against its unauthorised use
KR1020047000804A KR100940347B1 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called variable principle against its unauthorized use
APAP/P/2004/002958A AP2004002958A0 (en) 2001-07-31 2002-07-04 Method to protect software against unwanted use with a "variable" principle
JP2003517758A JP3949107B2 (en) 2001-07-31 2002-07-04 How to protect software against unauthorized use by "variable" principle
HU0400228A HUP0400228A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called variable principle against its unauthorised use
EA200400057A EA005465B1 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called variable principle against its unauthorised use
CA002454090A CA2454090A1 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called variable principle against its unauthorised use
AU2002325998A AU2002325998B2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called variable principle against its unauthorised use
MXPA04000488A MXPA04000488A (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called variable principle against its unauthorised use.
IL15995302A IL159953A0 (en) 2001-07-31 2002-07-04 Method to protect software against unauthorised use with a variable principle
BR0211374-0A BR0211374A (en) 2001-07-31 2002-07-04 Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit
ZA2004/00348A ZA200400348B (en) 2001-07-31 2004-01-16 Method for protecting a software using a so called variable principle against its unauthorused use
HR20040049A HRP20040049A2 (en) 2001-07-31 2004-01-19 Method for protecting a software using a so-called variable principle against its unauthorised use
NO20040232A NO20040232L (en) 2001-07-31 2004-01-19 Procedure for Protecting a Software, Using a Socially Variable Principle Against Unauthorized Use of it
TNP2004000012A TNSN04012A1 (en) 2001-07-31 2004-01-19 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE SAID "VARIABLE" AGAINST ITS UNAUTHORIZED USE
IS7121A IS7121A (en) 2001-07-31 2004-01-20 A method for protecting software against unauthorized use by using so-called conversion laws
HK05102678A HK1070155A1 (en) 2001-07-31 2005-03-30 Method to protect software against unwanted use with a "variable" principle

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR01/10250 2001-07-31
FR0110250A FR2828305B1 (en) 2001-07-31 2001-07-31 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE SAID "VARIABLE" AGAINST ITS UNAUTHORIZED USE

Publications (2)

Publication Number Publication Date
WO2003012649A2 WO2003012649A2 (en) 2003-02-13
WO2003012649A3 true WO2003012649A3 (en) 2003-12-24

Family

ID=8866125

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/FR2002/002338 WO2003012649A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called variable principle against its unauthorised use

Country Status (29)

Country Link
EP (1) EP1412861A2 (en)
JP (1) JP3949107B2 (en)
KR (1) KR100940347B1 (en)
CN (1) CN1288525C (en)
AP (1) AP2004002958A0 (en)
AU (1) AU2002325998B2 (en)
BR (1) BR0211374A (en)
CA (1) CA2454090A1 (en)
CO (1) CO5550508A2 (en)
CR (1) CR7231A (en)
EA (1) EA005465B1 (en)
EC (1) ECSP044951A (en)
FR (1) FR2828305B1 (en)
GE (1) GEP20053647B (en)
HK (1) HK1070155A1 (en)
HR (1) HRP20040049A2 (en)
HU (1) HUP0400228A2 (en)
IL (1) IL159953A0 (en)
IS (1) IS7121A (en)
MA (1) MA26126A1 (en)
MX (1) MXPA04000488A (en)
NO (1) NO20040232L (en)
OA (1) OA12699A (en)
PL (1) PL367366A1 (en)
TN (1) TNSN04012A1 (en)
UA (1) UA77186C2 (en)
WO (1) WO2003012649A2 (en)
YU (1) YU5404A (en)
ZA (1) ZA200400348B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2852415B1 (en) * 2003-03-11 2005-06-24 Actikey KEY TYPE MEDIUM, CONTROL OF ACCESS TO DATA AND / OR SOFTWARE, AND CORRESPONDING METHOD
CN107194212B (en) * 2017-06-21 2020-04-17 株洲中车时代电气股份有限公司 Method for protecting protocol content in source code of display

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (en) * 1988-08-01 1990-02-02 Pionchon Philippe METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
WO1999001815A1 (en) * 1997-06-09 1999-01-14 Intertrust, Incorporated Obfuscation techniques for enhancing software security
WO1999066387A1 (en) * 1998-06-12 1999-12-23 Gemplus Method for verifying the execution of a software product

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (en) * 1988-08-01 1990-02-02 Pionchon Philippe METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
WO1999001815A1 (en) * 1997-06-09 1999-01-14 Intertrust, Incorporated Obfuscation techniques for enhancing software security
WO1999066387A1 (en) * 1998-06-12 1999-12-23 Gemplus Method for verifying the execution of a software product

Also Published As

Publication number Publication date
MA26126A1 (en) 2004-04-01
NO20040232L (en) 2004-03-30
GEP20053647B (en) 2005-10-25
HRP20040049A2 (en) 2004-06-30
ZA200400348B (en) 2005-03-30
CN1288525C (en) 2006-12-06
HUP0400228A2 (en) 2004-09-28
IL159953A0 (en) 2004-06-20
IS7121A (en) 2004-01-20
FR2828305B1 (en) 2010-09-03
EA200400057A1 (en) 2004-06-24
WO2003012649A2 (en) 2003-02-13
AU2002325998B2 (en) 2008-10-30
BR0211374A (en) 2004-07-20
KR20040027881A (en) 2004-04-01
MXPA04000488A (en) 2005-03-07
JP2004537806A (en) 2004-12-16
CN1535410A (en) 2004-10-06
HK1070155A1 (en) 2005-06-10
YU5404A (en) 2006-08-17
KR100940347B1 (en) 2010-02-04
UA77186C2 (en) 2006-11-15
CR7231A (en) 2005-07-21
FR2828305A1 (en) 2003-02-07
CA2454090A1 (en) 2003-02-13
EP1412861A2 (en) 2004-04-28
OA12699A (en) 2006-06-23
CO5550508A2 (en) 2005-08-31
ECSP044951A (en) 2004-04-28
EA005465B1 (en) 2005-02-24
TNSN04012A1 (en) 2006-06-01
JP3949107B2 (en) 2007-07-25
AP2004002958A0 (en) 2004-03-31
PL367366A1 (en) 2005-02-21

Similar Documents

Publication Publication Date Title
MXPA02011835A (en) Data protection system that protects data by encrypting the data.
AU2003227411A1 (en) Processor system, task control method on computer system, computer program
HU0200434D0 (en) Method to determine which requirements from a general requirements document apply to a specific situation, computer system for operating the method and computer-readable medium containing instructions for...
WO2006036320A3 (en) System and method for creating a security application for programmable cryptography module
WO2003023701A3 (en) Operating device
AU2002332712A1 (en) Component-based, adaptive stroke-order system
WO2002067090A3 (en) System and method for selectively enabling and disabling access to software applications over a network
AU2002243674A1 (en) System, method and software application for accessing and processing information
WO2005110565A3 (en) Protecting a gaming machine from rogue code
WO2003012649A3 (en) Method for protecting a software using a so-called variable principle against its unauthorised use
HK1057667A1 (en) Method for storing encrypted data.
WO2002069255A3 (en) A method and system for the quantum mechanical representation and processing of fuzzy information
WO2003012650A3 (en) Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
GB0205546D0 (en) Control for a machine such as an I.S. machine
GB2375838B (en) Control for a machine such as an I.S. machine
WO2003012605A3 (en) Method for protecting a software using a so-called elementary functions principle against its unauthorised use
GB2375837B (en) Control for a machine such as an I.S. machine
GB2375836B (en) Control for a machine such as an I.S. machine
GB2375839B (en) Control for a machine such as an I.S. machine
GB2375835B (en) Control for a machine such as an I.S. machine
WO2003012374A3 (en) Method for protecting a software using a so-called conditional jump principle against its unauthorised use
AU2002325998A1 (en) Method for protecting a software using a so-called variable principle against its unauthorised use
AU2002953217A0 (en) T.P.T. (Thought process technology) M.O.S./O.M.O. (Mind operated systems / open mind operations)
AU2003269063A1 (en) Data encryption method, cryptographic system and associated component
ZA200203632B (en) Data processing system.

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: P-54/04

Country of ref document: YU

AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BY BZ CA CH CN CO CR CU CZ DE DM DZ EC EE ES FI GB GD GE GH HR HU ID IL IN IS JP KE KG KP KR LC LK LR LS LT LU LV MA MD MG MN MW MX MZ NO NZ OM PH PL PT RU SD SE SG SI SK SL TJ TM TN TR TZ UA UG US UZ VN YU ZA ZM

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ UG ZM ZW AM AZ BY KG KZ RU TJ TM AT BE BG CH CY CZ DK EE ES FI FR GB GR IE IT LU MC PT SE SK TR BF BJ CF CG CI GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2234/DELNP/2003

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2003517758

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: DZP2003000324

Country of ref document: DZ

WWE Wipo information: entry into national phase

Ref document number: 2004/00348

Country of ref document: ZA

Ref document number: PA/a/2004/000488

Country of ref document: MX

Ref document number: 1200400052

Country of ref document: VN

Ref document number: 1-2004-500083

Country of ref document: PH

Ref document number: 200400348

Country of ref document: ZA

Ref document number: 2454090

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 1020047000804

Country of ref document: KR

WWE Wipo information: entry into national phase

Ref document number: P20040049A

Country of ref document: HR

Ref document number: 159953

Country of ref document: IL

WWE Wipo information: entry into national phase

Ref document number: 530683

Country of ref document: NZ

Ref document number: 20028146840

Country of ref document: CN

Ref document number: 5431

Country of ref document: GE

Ref document number: 8014

Country of ref document: GE

Ref document number: 200400057

Country of ref document: EA

WWE Wipo information: entry into national phase

Ref document number: 2002760378

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2002325998

Country of ref document: AU

WWP Wipo information: published in national office

Ref document number: 2002760378

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642