×

Method to Protect Software Against Unwanted Use with a "Renaming" Principle

  • US 20070277239A1
  • Filed: 08/13/2007
  • Published: 11/29/2007
  • Est. Priority Date: 08/01/2001
  • Status: Abandoned Application
First Claim
Patent Images

1. A method to protect software comprising:

  • storing a first portion of the software on a first unit, the first unit comprises a memory and a processor;

    storing a second portion of the software on a second unit, the second unit comprises a secure processor and a secure memory, where the second portion of the software is secret and the first and second portions of the software form a single program; and

    executing the program, during which the first portion of the software executes an instruction directed to the second portion of the software comprising at least one function, wherein the instruction comprises an identifier of a function in the second portion of the software, and wherein the memory of the second unit stores a reference table in which the identifier of the function in the instruction is correlated to an actual identifier of the function in the second portion of the software.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×