Method and system for protection of computer applications and software products against unauthorized copying

作者: Victor I. Sheymov

DOI:

关键词:

摘要: A method, system, and computer program product for protection of an application or program, including making secret a command commands that are normally fixed in operating system (OS) and/or Basic Input/Output System (BIOS); generating values names the commands; providing legitimate users devices with generated enabling receiving services from kernel, OS, BIOS; translating via translation mechanism provided between BIOS and/SEND modifying, changing, replacing employed BIOS.

参考文章(7)
Michael Peter R. Burton, Ian Anderson, Andrew Garsten, James Roche, Yuval Rakavy, Network enhanced BIOS enabling remote management of a computer without a functioning operating system ,(1998)
Randall Scott Springfield, Richard Alan Dayan, William Fred Keown, Joseph Wayne Freeman, Recovery of a BIOS image ,(2001)
Karl L. Ginter, Francis J. Spahn, Victor H. Shear, David M. Van Wie, Systems and Methods for Secure Transaction Management and Electronic Rights Protection ,(2010)
Jeffrey Gongxian Cheng, Zheng Huang, Jae Chong, Efim Neiman, Vladimir F. Giemborek, Andrej Zdravkovic, Velodymyr Stempen, Methods and apparatus for communicating between multiple levels of software components ,(2005)