FIELD: computer engineering. SUBSTANCE: method involves storing software application with embedded unique code, removing at least one functional component, adding hardware code and software copy code into software using protection elements, transmission of code to software supplier or licensing authority, which produce and enter activation code into software. Then, method involves production of a code using hardware code, software copy code and activation code. When the code matches unique code, which is hidden in software application, use and/or copying of software application is authorized, and removed component is returned to legal user. EFFECT: improved protection of software against unauthorized copying, distribution and reverse engineering, minimal cost of protection. 6 cl
Title | Year | Author | Number |
---|---|---|---|
METHOD AND DEVICE FOR PROTECTING SOFTWARE FROM UNSANCTIONED USAGE | 2006 |
|
RU2296363C1 |
DEVICE TO CREATE TRUSTED EXECUTION ENVIRONMENT FOR SPECIAL PURPOSE COMPUTERS | 2014 |
|
RU2569577C1 |
DEVICE FOR PROTECTION AGAINST UNAUTHORIZED ACCESS TO INFORMATION THAT IS STORED IN PERSONAL COMPUTER | 1995 |
|
RU2067313C1 |
APPARATUS FOR CREATING TRUSTED ENVIRONMENT FOR COMPUTERS OF INFORMATION COMPUTER SYSTEMS | 2013 |
|
RU2538329C1 |
METHOD FOR AUTOMATIC RECOGNITION OF A PERSON WITH USE OF ACOUSTIC SIGNALS, READ FROM BODY OF SAID PERSON | 2003 |
|
RU2263358C2 |
METHOD OF PROTECTING SOFTWARE FROM UNAUTHORISED ACTIVATION AND COPYING | 2010 |
|
RU2470358C2 |
SYSTEM CONTROL MODULE | 2003 |
|
RU2265240C2 |
COMPUTER APPLICATIONS LICENSING COMPONENT | 2010 |
|
RU2446458C1 |
DEVICE FOR PROTECTING INFORMATION FROM UNSANCTIONED ACCESS FOR COMPUTERS OF INFORMATIONAL AND COMPUTING SYSTEMS | 2006 |
|
RU2321055C2 |
SYSTEM AND METHOD FOR PROTECTING ELECTRONIC DOCUMENTS CONTAINING CONFIDENTIAL INFORMATION FROM UNAUTHORISED ACCESS | 2020 |
|
RU2759210C1 |
Authors
Dates
2000-11-27—Published
1999-12-27—Filed