GB2349250A - Method for protecting bytecode - Google Patents
Method for protecting bytecodeInfo
- Publication number
- GB2349250A GB2349250A GB0009367A GB0009367A GB2349250A GB 2349250 A GB2349250 A GB 2349250A GB 0009367 A GB0009367 A GB 0009367A GB 0009367 A GB0009367 A GB 0009367A GB 2349250 A GB2349250 A GB 2349250A
- Authority
- GB
- United Kingdom
- Prior art keywords
- bytecode
- protecting
- encrypted
- executing
- run
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/SG1998/000010 WO1999041651A2 (en) | 1998-02-13 | 1998-02-13 | Method for protecting bytecode |
Publications (2)
Publication Number | Publication Date |
---|---|
GB0009367D0 GB0009367D0 (en) | 2000-05-31 |
GB2349250A true GB2349250A (en) | 2000-10-25 |
Family
ID=20429836
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0009367A Withdrawn GB2349250A (en) | 1998-02-13 | 1998-02-13 | Method for protecting bytecode |
Country Status (3)
Country | Link |
---|---|
AU (1) | AU6645398A (en) |
GB (1) | GB2349250A (en) |
WO (1) | WO1999041651A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2385951A (en) * | 2001-09-21 | 2003-09-03 | Sun Microsystems Inc | Data encryption and decryption |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2343022B (en) * | 1998-10-19 | 2003-01-08 | Ibm | Encrypting of java methods |
US6681212B1 (en) | 1999-04-23 | 2004-01-20 | Nianning Zeng | Internet-based automated system and a method for software copyright protection and sales |
GB0024918D0 (en) * | 2000-10-11 | 2000-11-22 | Sealedmedia Ltd | Method of providing java tamperproofing |
DE10105053A1 (en) * | 2001-02-05 | 2002-08-29 | Hmd Software Ag | Method and device for transmitting program codes on the Internet |
GB0310142D0 (en) * | 2003-05-02 | 2003-06-04 | Bitarts Ltd | Delivering a software component |
DE102004061634A1 (en) * | 2004-12-17 | 2006-06-29 | Siemens Ag | Method and apparatus for encrypting and executing a software library |
CN101957903A (en) * | 2010-09-13 | 2011-01-26 | 中兴通讯股份有限公司 | Method and device for protecting class files |
EP3188063A1 (en) * | 2015-12-29 | 2017-07-05 | GuardSquare NV | A build system |
CN111131281B (en) * | 2019-12-30 | 2022-09-02 | 北京永新视博数字电视技术有限公司 | Message transmission method, device and system and protection code updating method and device thereof |
US11550883B2 (en) | 2020-09-08 | 2023-01-10 | Assured Information Security, Inc. | Code protection |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4562305A (en) * | 1982-12-22 | 1985-12-31 | International Business Machines Corporation | Software cryptographic apparatus and method |
GB8302096D0 (en) * | 1983-01-26 | 1983-03-02 | Int Computers Ltd | Software protection in computer systems |
US4740890A (en) * | 1983-12-22 | 1988-04-26 | Software Concepts, Inc. | Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media |
US4932054A (en) * | 1988-09-16 | 1990-06-05 | Chou Wayne W | Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded hardware device |
US5259029A (en) * | 1990-05-16 | 1993-11-02 | Duncan Jr F Jeff | Decoding device for computer software protection |
EP0515739A1 (en) * | 1991-05-31 | 1992-12-02 | International Business Machines Corporation | Program code generator |
US5301231A (en) * | 1992-02-12 | 1994-04-05 | International Business Machines Corporation | User defined function facility |
JP2576385B2 (en) * | 1993-10-28 | 1997-01-29 | 日本電気株式会社 | Data protection device |
US5522073A (en) * | 1993-11-22 | 1996-05-28 | Hewlett-Packard Company | Method and apparatus for automating and controlling execution of software tools and tool sets via when/then relationships |
US5604803A (en) * | 1994-06-03 | 1997-02-18 | Sun Microsystems, Inc. | Method and apparatus for secure remote authentication in a public network |
US5740469A (en) * | 1995-04-24 | 1998-04-14 | Motorola Inc. | Apparatus for dynamically reading/writing multiple object file formats through use of object code readers/writers interfacing with generalized object file format interface and applications programmers' interface |
-
1998
- 1998-02-13 WO PCT/SG1998/000010 patent/WO1999041651A2/en active Application Filing
- 1998-02-13 GB GB0009367A patent/GB2349250A/en not_active Withdrawn
- 1998-02-13 AU AU66453/98A patent/AU6645398A/en not_active Abandoned
Non-Patent Citations (1)
Title |
---|
Not yet advised * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2385951A (en) * | 2001-09-21 | 2003-09-03 | Sun Microsystems Inc | Data encryption and decryption |
US7171566B2 (en) | 2001-09-21 | 2007-01-30 | Sun Microsystems, Inc. | Data encryption and decryption |
Also Published As
Publication number | Publication date |
---|---|
WO1999041651A2 (en) | 1999-08-19 |
AU6645398A (en) | 1999-08-30 |
WO1999041651A3 (en) | 2002-06-20 |
GB0009367D0 (en) | 2000-05-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
HK1020629A1 (en) | Method for storing and operating sensitive information in a security module, and associated security module | |
WO2005052841A3 (en) | Tamper-resistant trusted virtual machine | |
EP1202150A3 (en) | Microprocessor with program and data protection function under multi-task environment | |
WO2003054662A3 (en) | A system and method for preventing unauthorized use of protected software utilizing a portable security device | |
MXPA04000265A (en) | Apparatus and method for installing a decryption key. | |
WO2000052875A8 (en) | Transparent encryption and decryption with algorithm independent cryptographic engine that allows for containerization of encrypted files | |
WO2003042799A3 (en) | Device and method with reduced information leakage | |
GB2368691A (en) | Web environment access control | |
GB2407238B (en) | A system and method for performing blind encryption and decryption | |
MY128566A (en) | Method and device for controlling distribution and use of digital works | |
WO2001075563A3 (en) | Generating a key hierarchy for use in an isolated execution environment | |
HK1048674A1 (en) | Protection of software against use without permit | |
BR9708685A (en) | Device and method for re-encrypting data | |
EP0746126A3 (en) | System for data copyright management using key distribution | |
DE69912109D1 (en) | SYSTEM FOR COLLECTING FILE ACCESS AND FOR AUTOMATICALLY ENCRYPTING AND RE-ENCRYPTING FILE DATA ON A USER BASE | |
WO2001046782A3 (en) | Method of pre-releasing encrypted digital data | |
EP1282261A3 (en) | Method and system for the secure transfer of cryptographic keys via a network | |
GB2349250A (en) | Method for protecting bytecode | |
CA2253102A1 (en) | Method of and system for processing electronic document and recording medium for recording processing program | |
WO2000059151A3 (en) | Rendering digital content in an encrypted rights-protected form | |
WO2006134304A3 (en) | Method for protecting a source code in semi-interpreted language | |
IL136748A0 (en) | System and method of securing a computer from unauthorized access | |
CN100437615C (en) | Method for protecting dynamic chanining bank interface under windows platform | |
ATE399407T1 (en) | PROTECTING AN ELECTRONIC FILE USING LOCATION | |
DE10345457A1 (en) | Data encrypting and decrypting device for protecting contents of e.g. smart card, against unauthorized reading, applies part of data to encryption input and part to decryption input |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
710B | Request of alter time limits |
Free format text: IN RESPECT OF PCT APPLICATION PCT/SG98/00010 - (PATENT APPLICATION NUMBER GB0009367.4), WHICH SHOULD HAVE ENTERED THE UK NATIONAL PHASE ON 13 OCTOBER 1999 THE PATENT OFFICE RECEIVED ON 14 APRIL 2000 A REQUEST UNDER RULE 110 (4) OF THE PATENT RULES 1995 TO EXTEND THE PERIOD PRESCRIBED IN RULE 85 (1). |
|
710B | Request of alter time limits |
Free format text: METHOD FOR PROTECTING BYTECODE. APPLICATION FOR EXTENSION OF THE PERIOD (S) PRESCRIBED BY RULE (S) 85 (1) FILED ON 14 APRIL 2000. |
|
710B | Request of alter time limits |
Free format text: "IN RESPECT OF PCT APPLICATION NUMBER PCT/SG98/00010 (PATENT APPLICATION NUMBER GB200009367.4) DISCRETION HAS BEEN EXERCISED UNDER RULE 110(4) OF THE PATENT RULES 1995 TO EXTEND THE PERIOD PRESCRIBED BY RULE 85(1). THE APPLICATION IS PROCEEDING SUBJECT TO THE ATTACHMENT OF TERMS TO PROTECT THIRD PARTIES." |
|
710B | Request of alter time limits |
Free format text: EXTENSION ALLOWED: METHOD FOR PROTECTING BYTECODE. PERIOD(S) PRESCRIBED BY RULE(S) 85(1) EXTENDED UNDER RULE 110(6) IN ACCORDANCE WITH THE DECISION OF THE COMPTROLLER DATED 28 JUN 2000. THE PATENT/APPLICATION IS REINSTATED SUBJECT TO SPECIAL TERMS FOR THIRD PARTY INTERESTS. |
|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |