发明名称 METHOD FOR PROTECTING A SOFTWARE USING A SO-CALLED RENAMING PRINCIPLE AGAINST ITS UNAUTHORISED USE
摘要 The invention concerns a method for protecting, from a unit, a vulnerable software against unauthorised use, said vulnerable software operating on a data processing system. The inventive method consists in defining: a set of dependent functions whereof the dependent functions are executable in a unit; a set of triggering commands, said triggering commands capable of being executed in the data processing system and of triggering execution of the dependent functions in a unit; for each triggering command, an instruction; a method for renaming the instructions; and reinstating means for implementation in a unit during a use phase, and enabling to recover the dependent function to be executed, from the renamed instruction.
申请公布号 KR20040032858(A) 申请公布日期 2004.04.17
申请号 KR20047000806 申请日期 2002.07.04
申请人 发明人
分类号 G06F1/00;G06F21/00;G06F21/12;G06F21/22 主分类号 G06F1/00
代理机构 代理人
主权项
地址