Device for protecting against unauthorized use of software
First Claim
1. A device for protecting against unauthorized use of software, characterized in that a first processor emulates a second processor, whereby the second processor executes program code and the second processor transmits data to a computing system running the software in a process, whereby the process enters an error condition if the data contain errors.
4 Assignments
0 Petitions
Accused Products
Abstract
A device for protecting against unauthorized use of software, characterized in that a first processor emulates a second processor (3), whereby the second processor executes program code and the second processor transmits data to a computing system running the software in a process, whereby the process enters an error condition if the data contain errors.
16 Citations
11 Claims
- 1. A device for protecting against unauthorized use of software, characterized in that a first processor emulates a second processor, whereby the second processor executes program code and the second processor transmits data to a computing system running the software in a process, whereby the process enters an error condition if the data contain errors.
Specification