Patents by Inventor Gilles Sgro
Gilles Sgro has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7502940Abstract: The invention concerns a process to protect a vulnerable software working on a data processing system against its unauthorized usage using a processing and memorizing unit. The process comprises creating a protected software by choosing in the source of the vulnerable software at least one conditional branch and by producing the source of the protected software so that during the execution of the protected software a second execution part, executed in the processing and memorizing unit, executes at least the functionality of the chosen conditional branch and puts at the data processing system's disposal a piece of information enabling it to know where to carry on the execution of the software.Type: GrantFiled: June 25, 2002Date of Patent: March 10, 2009Assignee: SAS ValidyInventors: Jean-Christophe Cuenod, Gilles Sgro
-
Patent number: 7434064Abstract: The invention concerns a process to protect a vulnerable software working on a data processing system against its unauthorized usage using a processing and memorizing unit. The process comprises defining: 1) a set of elementary functions whose elementary functions are liable to be executed in a processing and memorizing unit 2) a set of elementary commands, said elementary commands being liable to be executed in the data processing system and to trigger the execution in a processing and memorizing unit, of the elementary functions 3) exploitation means designed to be used in a processing and memorizing unit during a usage phase, and enabling to execute the elementary functions of said set.Type: GrantFiled: June 25, 2002Date of Patent: October 7, 2008Assignee: Sas ValidyInventors: Jean-Christophe Cuenod, Gilles Sgro
-
Patent number: 7343494Abstract: The invention concerns a process to protect a vulnerable software working on a data processing system against its unauthorized usage using a processing and memorizing unit. The process comprises defining: 1) a set of dependent functions whose dependent functions are liable to be executed in a processing and memorizing unit 2) a set of triggering commands, said triggering commands being liable to be executed in the data processing system and to trigger the execution in a processing and memorizing unit, of the dependent functions 3) for each triggering command, an order 4) a method of renaming of the orders 5) restoring means designed to be implemented in a processing and memorizing unit during a usage phase, and enabling to restore the dependent function to execute, from the renamed order.Type: GrantFiled: June 25, 2002Date of Patent: March 11, 2008Assignee: SAS ValidyInventors: Jean-Christophe Cuenod, Gilles Sgro
-
Publication number: 20070294770Abstract: The invention concerns a process to protect a vulnerable software working on a data processing system against its unauthorized usage using a memorizing unit. The process comprises creating a protected software by choosing in the source of the vulnerable software at least one variable and by producing the source of the protected software by modifying the source of the vulnerable software, so that the chosen variable resides in the memorizing unit.Type: ApplicationFiled: August 7, 2007Publication date: December 20, 2007Applicant: SAS VALIDYInventors: Jean-Christophe CUENOD, Gilles SGRO
-
Publication number: 20070283437Abstract: The invention concerns a process to protect a vulnerable software working on a data processing system against its unauthorized usage using a processing and memorizing unit. The process comprises creating a protected software by choosing in the source of the vulnerable software at least one algorithmic processing and by producing the source of the protected software so that during the execution of the protected software appear several distinct steps, namely 1) the placing of at least one operand at the processing and memorizing unit's disposal 2) the carrying out by the processing and memorizing unit, of the algorithmic processing's functionality on at least said operand 3) and possibly, the placing at the data processing system's disposal of at least one result by the processing and memorizing unit.Type: ApplicationFiled: August 13, 2007Publication date: December 6, 2007Applicant: SAS VALIDYInventors: Jean-Christophe CUENOD, Gilles Sgro
-
Publication number: 20070277239Abstract: The invention concerns a process to protect a vulnerable software working on a data processing system against its unauthorized usage using a processing and memorizing unit. The process comprises defining: 1) a set of dependent functions whose dependent functions are liable to be executed in a processing and memorizing unit 2) a set of triggering commands, said triggering commands being liable to be executed in the data processing system and to trigger the execution in a processing and memorizing unit, of the dependent functions 3) for each triggering command, an order 4) a method of renaming of the orders 5) restoring means designed to be implemented in a processing and memorizing unit during a usage phase, and enabling to restore the dependent function to execute, from the renamed order.Type: ApplicationFiled: August 13, 2007Publication date: November 29, 2007Applicant: SAS VALIDYInventors: Jean-Christophe CUENOD, Gilles Sgro
-
Patent number: 7275264Abstract: The subject of the invention concerns a process to restrict, to the benefit of authorized users, access to at least one restricted access resource belonging to at least one interactive service of at least one cluster of services, each user having a processing and memorizing unit linked up to a client machine capable of executing a client program adapted to exchange from a transmission network, data with a server program associated to each interactive service having a service identifier, access to a resource being provided by a request sent by the client program to the server program which processes said request and returns to the client program the response to the request.Type: GrantFiled: December 24, 2001Date of Patent: September 25, 2007Assignee: SAS ValidyInventors: Jean-Christophe Cuenod, Gilles Sgro
-
Patent number: 7272725Abstract: The invention concerns a process to protect a vulnerable software working on a data processing system against its unauthorized usage using a processing and memorizing unit. The process comprises creating a protected software by choosing in the source of the vulnerable software at least one algorithmic processing and by producing the source of the protected software so that during the execution of the protected software appear several distinct steps, namely 1) the placing of at least one operand at the processing and memorizing unit's disposal 2) the carrying out by the processing and memorizing unit, of the algorithmic processing's functionality on at least said operand 3) and possibly, the placing at the data processing system's disposal of at least one result by the processing and memorizing unit.Type: GrantFiled: June 25, 2002Date of Patent: September 18, 2007Assignee: SAS ValidyInventors: Jean-Christophe Cuenod, Gilles Sgro
-
Patent number: 7269740Abstract: The invention concerns a process to protect a vulnerable software working on a data processing system against its unauthorized usage using a memorizing unit. The process comprises creating a protected software by choosing in the source of the vulnerable software at least one variable and by producing the source of the protected software by modifying the source of the vulnerable software, so that the chosen variable resides in the memorizing unit.Type: GrantFiled: June 25, 2002Date of Patent: September 11, 2007Assignee: SAS ValidyInventors: Jean-Christophe Cuenod, Gilles Sgro
-
Publication number: 20070136816Abstract: The invention concerns a process to protect a vulnerable software working on a data processing system against its unauthorized usage using a processing and memorizing unit. The process comprises defining: 1) at least one software execution characteristic, liable to be monitored at least in part in a processing and memorizing unit 2) at least one criterion to abide by for at least one software execution characteristic 3) detection means to implement in a processing and memorizing unit and enabling to detect that at least one software execution characteristic does not abide by at least one associated criterion 4) coercion means to implement in a processing and memorizing unit and enabling to inform the data processing system and/or modify the execution of a software when at least one criterion is not abided by.Type: ApplicationFiled: January 17, 2007Publication date: June 14, 2007Applicant: SAS VALIDYInventors: Jean-Christophe CUENOD, Gilles SGRO
-
Patent number: 7231527Abstract: A method of making secure the use of a piece of software, the method consisting: in a substage of generating modified data (D?): for a first category of users possessing a generation unit (11g) including at least one generation secret (Sg) to be able to obtain modified data (D?); and for a second category of users not possessing the generation unit (11g), to be able at best to generate original data (D) without being able to translate it in order to obtain modified data (D?); and in a substage of reconstituting original data (D): for a first category of users possessing a reconstitution unit including at least a reconstitution secret, to be able to restore the original data (D); and for a second category of users not possessing the reconstitution unit, to be able at best to use the modified data (D?).Type: GrantFiled: April 27, 2000Date of Patent: June 12, 2007Assignee: ValidyInventors: Jean-Christophe Cuenod, Gilles Sgro
-
Patent number: 7174466Abstract: The invention concerns a process to protect a vulnerable software working on a data processing system against its unauthorized usage using a processing and memorizing unit. The process comprises defining: 1) at least one software execution characteristic, liable to be monitored at least in part in a processing and memorizing unit 2) at least one criterion to abide by for at least one software execution characteristic 3) detection means to implement in a processing and memorizing unit and enabling to detect that at least one software execution characteristic does not abide by at least one associated criterion 4) coercion means to implement in a processing and memorizing unit and enabling to inform the data processing system and/or modify the execution of a software when at least one criterion is not abided by.Type: GrantFiled: June 25, 2002Date of Patent: February 6, 2007Assignee: Sas ValidyInventors: Jean-Christophe Cuenod, Gilles Sgro
-
Patent number: 7174464Abstract: The invention provides a method of making a user piece of software secure by means of a user processing and memorizing unit (11u) containing at least one user secret (Su). According to the invention, the method consists in: making a user piece of software and modified data (D?) available to a user; and in a stage of running the user piece of software with the associated modified data (D?), enabling the user possessing the user unit (11u) to recover the original data (D) from the modified data (D?).Type: GrantFiled: April 27, 2000Date of Patent: February 6, 2007Assignee: ValidyInventors: Jean-Christophe Cuenod, Gilles Sgro
-
Patent number: 7096361Abstract: The subject of the invention concerns a process and a system to limit the possibility to transform data, the transformation of TX-type data into TY-type data being carried out using an A-type transformation function, while the transformation of TY-type data into TX-type data is carried out using a B-type transformation function, inverse of the A-type transformation function, the data being in particular designed to constitute for instance pre-payment tokens. According to the invention, the system includes at least one A-type data processing system (STDA), at least one B-type data processing system (STDB), at least one link, at least once, between the system (STDA) and the system (STDB), at least one A-type processing and memorizing unit (UTMA) including at least the A-type transformation function, at least one B-type processing and memorizing unit (UTMB) including the B-type transformation function and not including the A-type transformation function.Type: GrantFiled: July 4, 2001Date of Patent: August 22, 2006Assignee: VALIDYInventors: Jean-Christophe Cuenod, Gilles Sgro
-
Publication number: 20040083390Abstract: The subject of the invention concerns a process to restrict, to the benefit of authorized users, access to at least one restricted access resource belonging to at least one interactive service of at least one cluster of services, each user having a processing and memorizing unit linked up to a client machine capable of executing a client program adapted to exchange from a transmission network, data with a server program associated to each interactive service having a service identifier, access to a resource being provided by a request sent by the client program to the server program which processes said request and returns to the client program the response to the request.Type: ApplicationFiled: December 31, 2003Publication date: April 29, 2004Inventors: Jean-Christophe Cuenod, Gilles Sgro
-
Publication number: 20040032951Abstract: The subject of the invention concerns a process and a system to limit the possibility to transform data, the transformation of TX-type data into TY-type data being carried out using an A-type transformation function, while the transformation of TY-type data into TX-type data is carried out using a B-type transformation function, inverse of the A-type transformation function, the data being in particular designed to constitute for instance pre-payment tokens.Type: ApplicationFiled: December 26, 2002Publication date: February 19, 2004Inventors: Jean-Christophe Cuenod, Gilles Sgro
-
Publication number: 20030037249Abstract: The invention concerns a process to protect a vulnerable software working on a data processing system against its unauthorized usage using a processing and memorizing unit. The process comprises defining: 1) at least one software execution characteristic, liable to be monitored at least in part in a processing and memorizing unit 2) at least one criterion to abide by for at least one software execution characteristic 3) detection means to implement in a processing and memorizing unit and enabling to detect that at least one software execution characteristic does not abide by at least one associated criterion 4) coercion means to implement in a processing and memorizing unit and enabling to inform the data processing system and/or modify the execution of a software when at least one criterion is not abided by.Type: ApplicationFiled: June 25, 2002Publication date: February 20, 2003Inventors: Jean-Christophe Cuenod, Gilles Sgro
-
Publication number: 20030037245Abstract: The invention concerns a process to protect a vulnerable software working on a data processing system against its unauthorized usage using a memorizing unit. The process comprises creating a protected software by choosing in the source of the vulnerable software at least one variable and by producing the source of the protected software by modifying the source of the vulnerable software, so that the chosen variable resides in the memorizing unit.Type: ApplicationFiled: June 25, 2002Publication date: February 20, 2003Inventors: Jean-Christophe Cuenod, Gilles Sgro