FIELD: physics, computer engineering.
SUBSTANCE: invention relates to computers and their software and dataware, and specifically to methods and means of protecting applications from unauthorised copying and distribution and can primarily be used by software and dataware developers to restrict unauthorised use of program and information products. The aim is achieved by using a method of protecting software and dataware from unauthorised use using applications, involving plotting a control flow graph and complicating transforms, wherein after plotting the graph, the application is interpreted in form of a finite machine and divided, application variables are protected and low-level software is generated for an external apparatus module.
EFFECT: high degree of protecting applications and high efficiency of the protected application.
2 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD AND DEVICE FOR PROTECTING SOFTWARE FROM UNSANCTIONED USAGE | 2006 |
|
RU2296363C1 |
METHOD FOR COPY PROTECTION OF SOFTWARE | 1999 |
|
RU2159953C1 |
INITIALIZATION, MAINTENANCE, RENEWAL AND RESTORATION OF PROTECTED MODE OF OPERATION OF INTEGRATED SYSTEM, USING DEVICE FOR CONTROLLING ACCESS TO DATA | 2003 |
|
RU2295834C2 |
METHOD OF PROTECTING AVAILABILITY AND SECURITY OF STORED DATA AND SYSTEM FOR ADJUSTABLE PROTECTION OF STORED DATA | 2014 |
|
RU2584755C2 |
PROCESSOR | 2003 |
|
RU2248608C1 |
METHOD OF SHARING THE PROTECTED DATA | 2017 |
|
RU2659730C1 |
METHOD OF PROTECTING DATA IN A COMPUTING SYSTEM | 2019 |
|
RU2715293C1 |
COMPLEX OF HARDWARE AND SOFTWARE CREATING PROTECTED CLOUD ENVIRONMENT WITH AUTONOMOUS FULL-FUNCTION LOGICAL CONTROL INFRASTRUCTURE WITH BIOMETRIC-NEURAL NETWORK IDENTIFICATION OF USERS AND WITH AUDIT OF CONNECTED HARDWARE | 2016 |
|
RU2635269C1 |
METHOD OF ORGANIZING VOICE COMMUNICATION WITH END-TO-END ENCRYPTION AND USER AUTHENTICATION | 2023 |
|
RU2819563C1 |
TRUSTED BOOT TOOL WITH BUILT-IN BINARY TRANSLATOR OF OPERATING SYSTEM AND WIRELESS CONTROL CHANNEL | 2023 |
|
RU2820971C1 |
Authors
Dates
2012-11-20—Published
2011-06-07—Filed