A technique for imparting substantial break-once-run-everywhere (BORE)
resistance to passive and active software objects, and for controlling
access and use of resulting protected objects by a client computer (400).
Specifically, a relatively large number, n, of identical watermarks
(1720) are embedded throughout a software object (1700), through use of n
different secret watermark keys to form a protected object, with each key
defining a pointer to a location in the protected object at which a
corresponding watermark appears.