octimine technologies

Software protection patents

Laura HorcajadaLaura Horcajada

Software protection method and device

A software protection method and device are provided. The method comprises: using multiple code segments among N code segments of software under protection as a first ported code, converting the first ported code into an instruction of a security virtual machine and porting the instruction into the security virtual machine, using one or more code segments in the first ported code as a second ported code, and converting the second ported code into an instruction of a dongle and porting the instruction into the dongle, when a code segment to be executed is the first ported code during code execution by the software under protection, the software under protection invoking the security virtual machine to execute the first ported code, and when the security virtual machine executes the first ported code, if the code segment to be executed is the second ported code in the first ported code, the security virtual machine invoking the dongle to execute the second ported code. The software protection method and device can enhance the strength of software protection.

Publication number: WO2012146080A1 | Search similar patents

Software protection method

Disclosed is a software protection method, comprising: software under protection, during operation, invoking a dongle on a computer where the software under protection is located through a dongle API interface; where if a returned result is correct, the operation of the software under protection continues, and if the returned result is incorrect, the operation of the software under protection is terminated, and code for invoking the dongle in the software under protection is a new code generated by transforming an original code for invoking the dongle in the software before the software is delivered to a user. In the software protection method provided in the present invention, the code for invoking the dongle in the software under protection is transformed into a code which is hard for a cracker to analyze, so that the cracker cannot track input data and output data when the software under protection invokes the dongle. In this way, data interaction between the software under protection and the dongle API interface is protected, and the difficulty of analysis for the cracker is increased, thereby enhancing security strength of the software protection method based on the dongle.

Publication number: WO2012146079A1 | Search similar patents

Software copyright protecting method and system based on encryption lock and encryption lock

A dongle-based software copy protection method is disclosed. Protected software sends an invoking instruction to a dongle and goes on operating threads based on codes in the protected software. The dongle performs processing according to the invoking instruction, obtains a processing result and goes on operating threads based on codes in the dongle. The dongle sends the processing result to the protected software when necessary. A dongle-based software copy protection system and a dongle are also disclosed.

Publication number: EP2249278A1 | Search similar patents

Self-adaptive communication method for encryption dongle

A self-adaptive communication method for an encryption dongle, comprising: an upper-layer software platform sets communication mode information of self, when connection of an encryption dongle to a host is detected, acquires communication mode information of the encryption dongle, determines whether or not the communication mode information of self matches the communication mode information of the encryption dongle, if yes, then communicates with the encryption dongle via an interrupt transmit pipeline, and if not, then transmits a communication instruction to the encryption dongle via a control transmit pipeline; the encryption dongle sets a communication mode identifier on the basis of the communication mode information of the upper-layer software platform in the communication instruction, and, the encryption dongle resets and resets communication mode information of self on the basis of the communication mode identifier. As such, when connection of the encryption dongle to the host is re-detected, the upper-layer software platform re-acquires the communication mode information of the encryption dongle, determines that the communication mode information is a match, and then communicates via the interrupt transmission pipeline, thus solving the technical problem that an existing encryption dongle can only support one communication mode of the host, and implementing self-adaptive communication for the encryption dongle.

Publication number: WO2016034047A1 | Search similar patents

Monitoring system, monitoring method and monitoring device

[Problem] To provide a monitoring system which, with a low cost configuration, allows for easy handling and higher versatility, and can reliably detect the abnormality of a power supply unit in a recording device. [Solution] Provided is a monitoring system (S) which monitors the state of a storage device (2) that acquires and stores an image signal from a security camera (1), said monitoring system (S) being provided with a dongle (4) which receives power from a power supply unit (23) provided in the storage device (2) when the dongle is inserted into a USB port (24) formed in the storage device (2) while the power supply unit (23) is supplying the storage device body with power, and a monitoring device (3) for monitoring the state of the storage device by detecting the state of power supplied to the dongle (4) to determine the presence or absence of power being supplied to the storage device body from the power supply unit (23).

Publication number: WO2014141531A1 | Search similar patents

Using alternate port name for uninterrupted communication

In a method for communicating in a computing environment, a first computer establishing communication with a first virtual computer through a first virtual port using a primary port name for the first virtual port, wherein the first virtual computer is executing on a second computer. The first computer acquires an alternate port name for the first virtual port from the first virtual computer executing on the second computer. The first computer determines that the first virtual computer is not accessible using the primary port name for the first virtual port, wherein the first virtual computer is migrated to execute on a third computer. The first computer establishes communication with the first virtual computer executing on the third computer using the alternate port name of the first virtual port.

Publication number: US2015150000A1 | Search similar patents

Switch and program

A switch pertaining to the present invention has: a first setting processing unit that, when setting of a virtual sub-network has been instructed for a first port connected to an external device, executes the setting of the virtual sub-network for the first port; and a second setting processing unit that is associated beforehand to a second port connected to an external network and, if setting of a virtual sub-network has been made for the first port connected to the external device in this or another switch, executes setting of the virtual sub-network for the second port.

Publication number: WO2014128858A1 | Search similar patents

Setting method for network address and network address setting dongle

A setting method for a network address by which the network addresses of a computer device (50) and a peripheral device (21) can be easily set by using a dongle (1) and a network address setting dongle are provided. If judging that a network address (A) of the peripheral device (21) is included in a network address (E) of a network to which the computer device (50) is connected, a dongle (1) appends the network address (E) as a network address which is not permitted to be connected to a nonvolatile storage section of the dongle (1), generates a network address (B) other than the network address which includes the network address (E) and is not permitted to be connected, sets the network address (B) to the peripheral device (21), appends the network address (B) to the nonvolatile storage section of the dongle, and sets the network address (B) which is not included in the network address (E) to the computer device (50).

Publication number: WO2008117849A1 | Search similar patents

Computer anti-theft system

A computer anti-theft system that includes a remote transmitter unit carried by the user, a dongle that physically attaches and selectively locks onto the parallel port on an existing computer, and a software program that is loaded into the computer's memory. When the system is activated, the remote transmitter unit transmits a pulse code signal which is received by a receiver component located inside the dongle. When the pulse code signal is received, the dongle is elevated to an active state. The dongle then transmits a return pulse code signal to the remote transmitter unit and the loop continues. If no pulse code signal is received, the dongle, is elevated to an alarm state. An alarm pulse code signal is then broadcast to the remote transmitter unit and elevating it to an alarm state. In one embodiment, the software program is used to control a solenoid inside the dongle which prevents removal of the dongle from the parallel port. The dongle and remote transmitter are electrically self contained thereby enabling the computer to be turned-off.

Publication number: US6137409A | Search similar patents

Robot control device

The robot control device has: a memory (10), which is a software-storing unit in which software comprising basic functions for controlling the robot and advanced functions that can be added to the basic functions and are for improving a robot-controlling function or performance is stored; a CPU (11), which is a processing unit for reading from the software-storing unit a function that meets a request and executing same; and a clock (13), which is a basic capability-conferring unit for conferring a hardware capability for an action resulting from a basic function to the processing unit. When setting an advanced function to be usable, a hardware dongle (2-1 to 2-3) is mounted. The hardware dongle has a clock (15-1 to 15-3), which is an additional capability-conferring unit for conferring a hardware capability for an action resulting from an advanced function to the processing unit.

Publication number: WO2013183149A1 | Search similar patents

Dongle device for audio/music device

This dongle device comprises: a dongle input terminal (12) for connecting to a MIDI output terminal (4) of an audio/music device (2); a dongle output terminal (32) for connecting to a MIDI input terminal (6) of the audio/music device (2); a communication means for exchanging various electronic information between the audio/music device (2) and another electronic device via the dongle input terminal (12) and the dongle output terminal (32); and a power supply circuit (14) that takes in, via the dongle input terminal (12), electric power from a MIDI-format signal line from the audio/music device (2), supplies electric power to the communication means, and outputs electric power to the MIDI input terminal (6) of the audio/music device (2) via the dongle output terminal (32).

Publication number: WO2015141416A1 | Search similar patents

System and method for providing temporary remote access to a computer

A system and method for providing temporary access to a host computer from a remote computer. The host computer maintains a system date and time and is connected to the remote computer over a communications link. The system includes a first dongle and a second dongle. The first dongle is adapted to be connected to a parallel port of the host computer, and includes a first program memory for storing an encryption algorithm and a temporary memory for storing a key for use with the encryption algorithm. A second dongle is adapted to be connected to the remote computer, and includes a second program memory for storing a copy of the encryption algorithm and a non-volatile memory for storing a copy of the key for use with the copy of said encryption algorithm. A date range is stored in the non-volatile memory of the second dongle and includes a starting date on which temporary access will begin, and an ending date for the temporary access. The second program memory also includes program logic to deactivate the second dongle when the second dongle is accessed by the remote computer on a date outside of the date range.

Publication number: US6449651B1 | Search similar patents

Software piracy protection device

A software piracy protection and access authorization device is provided in the form of a USB dongle key. A first end is formed with a USB connector for insertion into a USB port receptacle in a computer device. A second end is formed with a USB port receptacle for receiving a USB connector of a peripheral device to be connected to the computer device. Piracy protection and access authorization software is operatively connected to the first end that plugs into the computer device. The second end is connected to the first end to enable an operative USB connection between the peripheral device and the computer device. The peripheral connection may be entirely transparent, i.e., completely independent of the piracy protection and access authorization software, or it may be a protected connection that is partly or wholly directed through the piracy protection and access authorization software.

Publication number: US2006185020A1 | Search similar patents

Device for protecting against unauthorized use of software

A device for protecting against unauthorized use of software, characterized in that a first processor emulates a second processor (3), whereby the second processor executes program code and the second processor transmits data to a computing system running the software in a process, whereby the process enters an error condition if the data contain errors.

Publication number: WO03079164A2 | Search similar patents

Start your free patent search now.

+49 89 444 78663 0 | contact@octimine.com | © octimine technologies GmbH, 2017