摘要 |
The invention concerns a method for protecting, from a unit, a vulnerable software, against unauthorised use, said vulnerable software operating on a data processing system. The inventive method consists in creating a protected software: by selecting at least an algorithmic processing; by producing the source of the protected software from the vulnerable software source, by modifying the vulnerable software source, so that at least a selected algorithmic processing is broken down such that when the protected software is executed there occur several separate steps, namely: providing at least an operand for the unit; production by the unit, of the functionality of the algorithmic processing on at least said operand; and optionally, production of at least a result, by the unit for the data processing system.
|