首页>
外国专利>
METHOD FOR PROTECTING A SOFTWARE USING A SO CALLED RENAMING PRINCIPLE AGAINST ITS UNAUTHORISED USE
METHOD FOR PROTECTING A SOFTWARE USING A SO CALLED RENAMING PRINCIPLE AGAINST ITS UNAUTHORISED USE
展开▼
机译:使用未经许可的使用重新命名原则保护软件的方法
展开▼
页面导航
摘要
著录项
相似文献
摘要
The invention concerns a method for protecting, from a unit, a vulnerable software against unauthorised use, said vulnerable software operating on a data processing system. The inventive method consists in defining: a set of dependent functions whereof the dependent functions are executable in a unit; a set of triggering commands, said triggering commands capable of being executed in the data processing system and of triggering execution of the dependent functions in a unit; for each triggering command, an instruction; a method for renaming the instructions; and reinstating means for implementation in a unit during a use phase, and enabling to recover the dependent function to be executed, from the renamed instruction.
展开▼