发明名称 METHOD FOR PROTECTING A SOFTWARE USING A SO-CALLED RENAMING PRINCIPLE AGAINST ITS UNAUTHORISED USE
摘要 <p>The invention concerns a method for protecting, from a unit, a vulnerable software against unauthorised use, said vulnerable software operating on a data processing system. The inventive method consists in defining: a set of dependent functions whereof the dependent functions are executable in a unit; a set of triggering commands, said triggering commands capable of being executed in the data processing system and of triggering execution of the dependent functions in a unit; for each triggering command, an instruction; a method for renaming the instructions; and reinstating means for implementation in a unit during a use phase, and enabling to recover the dependent function to be executed, from the renamed instruction.</p>
申请公布号 WO2003012604(A2) 申请公布日期 2003.02.13
申请号 FR2002002340 申请日期 2002.07.04
申请人 发明人
分类号 主分类号
代理机构 代理人
主权项
地址