AU2003227616A1 - Method for securing a program - Google Patents

Method for securing a program

Info

Publication number
AU2003227616A1
AU2003227616A1 AU2003227616A AU2003227616A AU2003227616A1 AU 2003227616 A1 AU2003227616 A1 AU 2003227616A1 AU 2003227616 A AU2003227616 A AU 2003227616A AU 2003227616 A AU2003227616 A AU 2003227616A AU 2003227616 A1 AU2003227616 A1 AU 2003227616A1
Authority
AU
Australia
Prior art keywords
securing
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2003227616A
Other versions
AU2003227616A8 (en
Inventor
Nikola Mamuzic
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Giesecke and Devrient GmbH
Original Assignee
Giesecke and Devrient GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Giesecke and Devrient GmbH filed Critical Giesecke and Devrient GmbH
Publication of AU2003227616A8 publication Critical patent/AU2003227616A8/en
Publication of AU2003227616A1 publication Critical patent/AU2003227616A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/084Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/33Security of mobile devices; Security of mobile applications using wearable devices, e.g. using a smartwatch or smart-glasses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
AU2003227616A 2002-04-15 2003-04-14 Method for securing a program Abandoned AU2003227616A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE10216601A DE10216601A1 (en) 2002-04-15 2002-04-15 Program assurance procedures
DE10216601.3 2002-04-15
PCT/EP2003/003859 WO2003088053A2 (en) 2002-04-15 2003-04-14 Method for securing a program

Publications (2)

Publication Number Publication Date
AU2003227616A8 AU2003227616A8 (en) 2003-10-27
AU2003227616A1 true AU2003227616A1 (en) 2003-10-27

Family

ID=28685069

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2003227616A Abandoned AU2003227616A1 (en) 2002-04-15 2003-04-14 Method for securing a program

Country Status (3)

Country Link
AU (1) AU2003227616A1 (en)
DE (1) DE10216601A1 (en)
WO (1) WO2003088053A2 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10339173A1 (en) * 2003-08-26 2005-03-24 Giesecke & Devrient Gmbh Mobile telecommunications device for fixing and issuing an authenticating code has a subscriber identity module for telecommunications functions
US8645695B2 (en) * 2009-10-07 2014-02-04 Blackberry Limited System and method for managing security key architecture in multiple security contexts of a network environment

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI980427A (en) * 1998-02-25 1999-08-26 Ericsson Telefon Ab L M Procedure, arrangement and device for verification
ES2277458T3 (en) * 1998-11-24 2007-07-01 Telefonaktiebolaget Lm Ericsson (Publ) AUTOMATIC LOGIN ON A PC FROM A MOBILE PHONE.
WO2000072149A1 (en) * 1999-05-25 2000-11-30 Motorola Inc. Pre-verification of applications in mobile computing
SE0001211L (en) * 2000-04-04 2001-10-05 Wireless Car Ab Improvements in or in connection with mobile telephony
WO2001084761A1 (en) * 2000-04-28 2001-11-08 Swisscom Mobile Ag Method for securing communications between a terminal and an additional user equipment

Also Published As

Publication number Publication date
AU2003227616A8 (en) 2003-10-27
WO2003088053A2 (en) 2003-10-23
WO2003088053A3 (en) 2004-04-01
WO2003088053A8 (en) 2004-05-13
DE10216601A1 (en) 2003-10-30

Similar Documents

Publication Publication Date Title
AU2003208489A1 (en) Method for desinging a well completion
AU2003303003A1 (en) Method for a mosaic program guide
AU2003216220A1 (en) Method for securing a headset
AU2002300036A1 (en) Method for creating a workflow
AU2003276045A1 (en) Method of solving a split-brain condition
AU2003253024A1 (en) Method for training a learning-capable system
HK1188993A1 (en) Method for preparing a 2-halo-4-nitroimidazole compound 2--4-
AU2003219148A1 (en) Method for operating a turbine
AU2003210042A1 (en) A method for preparing organic fluorocompounds
AU2003223855A1 (en) Method for operating a call-centre
AU2003264095A1 (en) Method for path-seacher scheduling
AU2003243355A1 (en) Method for providing a pre-security depository
AU2003255554A1 (en) A method for bricklaying
AU2003263714A1 (en) Method for obtaining a fraction
AU2003261577A1 (en) A language-code input method
AU2003253813A1 (en) Method for colpoplasty
AU2003227616A1 (en) Method for securing a program
AU2003242767A1 (en) Method for modifying plants
AU2003298519A1 (en) Methods for preparing a solid-fibrin web
AU2003272577A1 (en) Method for creating a sculpture
AU2003304690A1 (en) A tool and a method for creating the tool
AU2003206283A1 (en) Preventing method for a vehicle
AU2003100320A4 (en) A method for carrying out a design project
AU2002950476A0 (en) A method for knowledge acquisition
AU2002363893A1 (en) Method for producing a holding element

Legal Events

Date Code Title Description
MK6 Application lapsed section 142(2)(f)/reg. 8.3(3) - pct applic. not entering national phase