×

Method to Protect Software Against Unwanted Use with a Variable Principle

  • US 20070294770A1
  • Filed: 08/07/2007
  • Published: 12/20/2007
  • Est. Priority Date: 08/01/2001
  • Status: Abandoned Application
First Claim
Patent Images

1. A method to protect, using at least one blank unit (60) including memorization means (15), a vulnerable software (2v) against its unauthorized usage, said vulnerable software (2v) being produced from a source (2vs) and working on a data processing system (3), said protection process comprising:

  • during a protection phase (P);

    creating a protected software (2p);

    by choosing in the source of the vulnerable software (2vs);

    at least one variable which, during the execution of the vulnerable software (2v), partially defines the state of the latter, and at least one portion containing at least one chosen variable, by producing a source of the protected software (2ps) from the source of the vulnerable software (2vs), by modifying at least one chosen portion of the source of the vulnerable software (2vs), this modification being such that during the execution of the protected software (2p), at least one chosen variable or at least one copy of chosen variable resides in the blank unit (60) which is thus transformed into a unit (6), and by producing a first object part (2pos) of the protected software (2p) from the source of the protected software (2ps), said first object part (2pos) being such that during the execution of the protected software (2p), appears a first execution part (2pes) which is executed in the data processing system (3) and whose at least a portion takes into account that at least a variable or at least a copy of variable resides in the unit (6), and during a usage phase (U) during which the protected software (2p) is executed;

    in the presence of the unit (6), each time a portion of the first execution part (2pes) imposes it, using a variable or a copy of variable residing in the unit (6), so that said portion is executed correctly and that, consequently, the protected software (2p) is completely functional, and in the absence of the unit (6), in spite of the request by a portion of the first execution part (2pes) to use a variable or a copy of variable residing in the unit (6), not being able to fulfill said request correctly, so that at least said portion is not executed correctly and that, consequently the protected software (2p) is not completely functional, wherein said at least one blank unit (60) includes only the memorization means (15).

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×