Method for stega-cipher protection of computer code
DCFirst Claim
Patent Images
1. A method for copy protection of computer software, the computer software including executable code and a non-executable digital sample, said method comprising the steps of:
- identifying a portion of the executable code to be encoded;
generating an encoded code resource from the identified portion of the executable code; and
embedding the encoded code resource in the non-executable digital sample.
5 Assignments
Litigations
1 Petition

Accused Products

Abstract
A method for protecting computer code copyrights by encoding the code into a data resource with a digital watermark. The digital watermark contains licensing information interwoven with essential code resources encoded into data resources. The result is that while an application program can be copied in an uninhibited manner, only the licensed user having the license code can access essential code resources to operate the program and any descendant copies bear the required license code.
680 Citations
20 Claims
-
1. A method for copy protection of computer software, the computer software including executable code and a non-executable digital sample, said method comprising the steps of:
-
identifying a portion of the executable code to be encoded; generating an encoded code resource from the identified portion of the executable code; and embedding the encoded code resource in the non-executable digital sample. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for copy protection of computer software to be provided to an authorized user, the computer software including a plurality of code resources and a plurality of data resources, wherein each of the plurality of code resources includes a set of executable instructions, said method comprising the steps of:
-
selecting a code resource to be encoded; using information relating to the authorized user to associate the selected code resource with a data resource; and encoding the selected code resource within the associated data resource. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method for copy protecting a software application executed by a computer system, the software application including a plurality of executable code resources loaded in a memory of the computer system, said method comprising the steps of:
-
determining an address within the memory of the computer system associated with each of the plurality of executable code resources; and intermittently relocating each of the plurality of executable code resources to a different address within the memory of the computer during execution of the software application. - View Dependent Claims (17, 18, 19, 20)
-
Specification