AU2002325998A1 - Method for protecting a software using a so-called variable principle against its unauthorised use - Google Patents
Method for protecting a software using a so-called variable principle against its unauthorised useInfo
- Publication number
- AU2002325998A1 AU2002325998A1 AU2002325998A AU2002325998A AU2002325998A1 AU 2002325998 A1 AU2002325998 A1 AU 2002325998A1 AU 2002325998 A AU2002325998 A AU 2002325998A AU 2002325998 A AU2002325998 A AU 2002325998A AU 2002325998 A1 AU2002325998 A1 AU 2002325998A1
- Authority
- AU
- Australia
- Prior art keywords
- protecting
- software
- called variable
- unauthorised use
- principle against
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0110250A FR2828305B1 (en) | 2001-07-31 | 2001-07-31 | METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE SAID "VARIABLE" AGAINST ITS UNAUTHORIZED USE |
FR01/10250 | 2001-07-31 | ||
PCT/FR2002/002338 WO2003012649A2 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called variable principle against its unauthorised use |
Publications (2)
Publication Number | Publication Date |
---|---|
AU2002325998A1 true AU2002325998A1 (en) | 2003-05-29 |
AU2002325998B2 AU2002325998B2 (en) | 2008-10-30 |
Family
ID=8866125
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2002325998A Ceased AU2002325998B2 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called variable principle against its unauthorised use |
Country Status (29)
Country | Link |
---|---|
EP (1) | EP1412861A2 (en) |
JP (1) | JP3949107B2 (en) |
KR (1) | KR100940347B1 (en) |
CN (1) | CN1288525C (en) |
AP (1) | AP2004002958A0 (en) |
AU (1) | AU2002325998B2 (en) |
BR (1) | BR0211374A (en) |
CA (1) | CA2454090A1 (en) |
CO (1) | CO5550508A2 (en) |
CR (1) | CR7231A (en) |
EA (1) | EA005465B1 (en) |
EC (1) | ECSP044951A (en) |
FR (1) | FR2828305B1 (en) |
GE (1) | GEP20053647B (en) |
HK (1) | HK1070155A1 (en) |
HR (1) | HRP20040049A2 (en) |
HU (1) | HUP0400228A2 (en) |
IL (1) | IL159953A0 (en) |
IS (1) | IS7121A (en) |
MA (1) | MA26126A1 (en) |
MX (1) | MXPA04000488A (en) |
NO (1) | NO20040232L (en) |
OA (1) | OA12699A (en) |
PL (1) | PL367366A1 (en) |
TN (1) | TNSN04012A1 (en) |
UA (1) | UA77186C2 (en) |
WO (1) | WO2003012649A2 (en) |
YU (1) | YU5404A (en) |
ZA (1) | ZA200400348B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2852415B1 (en) * | 2003-03-11 | 2005-06-24 | Actikey | KEY TYPE MEDIUM, CONTROL OF ACCESS TO DATA AND / OR SOFTWARE, AND CORRESPONDING METHOD |
CN107194212B (en) * | 2017-06-21 | 2020-04-17 | 株洲中车时代电气股份有限公司 | Method for protecting protocol content in source code of display |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2634917A1 (en) * | 1988-08-01 | 1990-02-02 | Pionchon Philippe | METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
WO1999066387A1 (en) * | 1998-06-12 | 1999-12-23 | Gemplus | Method for verifying the execution of a software product |
JP4739465B2 (en) * | 1997-06-09 | 2011-08-03 | インタートラスト テクノロジーズ コーポレイション | Confusing technology to enhance software security |
-
2001
- 2001-07-31 FR FR0110250A patent/FR2828305B1/en not_active Expired - Lifetime
-
2002
- 2002-04-07 UA UA2004010469A patent/UA77186C2/en unknown
- 2002-07-04 WO PCT/FR2002/002338 patent/WO2003012649A2/en active Application Filing
- 2002-07-04 PL PL02367366A patent/PL367366A1/en not_active Application Discontinuation
- 2002-07-04 BR BR0211374-0A patent/BR0211374A/en not_active IP Right Cessation
- 2002-07-04 CA CA002454090A patent/CA2454090A1/en not_active Abandoned
- 2002-07-04 CN CNB028146840A patent/CN1288525C/en not_active Expired - Fee Related
- 2002-07-04 KR KR1020047000804A patent/KR100940347B1/en not_active IP Right Cessation
- 2002-07-04 AU AU2002325998A patent/AU2002325998B2/en not_active Ceased
- 2002-07-04 IL IL15995302A patent/IL159953A0/en unknown
- 2002-07-04 EP EP02760378A patent/EP1412861A2/en not_active Withdrawn
- 2002-07-04 EA EA200400057A patent/EA005465B1/en not_active IP Right Cessation
- 2002-07-04 HU HU0400228A patent/HUP0400228A2/en unknown
- 2002-07-04 YU YU5404A patent/YU5404A/en unknown
- 2002-07-04 MX MXPA04000488A patent/MXPA04000488A/en unknown
- 2002-07-04 GE GE5431A patent/GEP20053647B/en unknown
- 2002-07-04 JP JP2003517758A patent/JP3949107B2/en not_active Expired - Fee Related
- 2002-07-04 OA OA1200400013A patent/OA12699A/en unknown
- 2002-07-04 AP APAP/P/2004/002958A patent/AP2004002958A0/en unknown
-
2004
- 2004-01-16 ZA ZA2004/00348A patent/ZA200400348B/en unknown
- 2004-01-19 CR CR7231A patent/CR7231A/en unknown
- 2004-01-19 NO NO20040232A patent/NO20040232L/en not_active Application Discontinuation
- 2004-01-19 MA MA27492A patent/MA26126A1/en unknown
- 2004-01-19 HR HR20040049A patent/HRP20040049A2/en not_active Application Discontinuation
- 2004-01-19 TN TNP2004000012A patent/TNSN04012A1/en unknown
- 2004-01-20 CO CO04003765A patent/CO5550508A2/en not_active Application Discontinuation
- 2004-01-20 IS IS7121A patent/IS7121A/en unknown
- 2004-01-20 EC EC2004004951A patent/ECSP044951A/en unknown
-
2005
- 2005-03-30 HK HK05102678A patent/HK1070155A1/en unknown
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1282025B8 (en) | An interface for a security coprocessor | |
AUPS045702A0 (en) | A protection device | |
AU7288400A (en) | Method for protecting a program flow | |
EP1329627B8 (en) | Method and apparatus for controlling a component protection function | |
AU2003269185A1 (en) | Software protection | |
AU2003209448A1 (en) | Protecting computer software | |
AU2002325998A1 (en) | Method for protecting a software using a so-called variable principle against its unauthorised use | |
AU2001224530A1 (en) | Methods for protecting a surface | |
PL367440A1 (en) | Method for protecting a software using a so-called renaming principle against its unauthorised use | |
PL367366A1 (en) | Method for protecting a software using a so-called variable principle against its unauthorised use | |
AU2002328378A1 (en) | Method for protecting a software using a so-called elementary functions principle against its unauthorised use | |
AU2002328375A1 (en) | Method for protecting a software using a so-called renaming principle against its unauthorised use | |
PL367486A1 (en) | Method for protecting a software using a so-called elementary functions principle against its unauthorised use | |
HRP20040047A2 (en) | Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use | |
AU2003267505A1 (en) | Device for protecting seacoasts | |
AU2003231470A1 (en) | A protecting device for metal structures | |
AU2002328376A1 (en) | Method for protecting a software using a so-called conditional jump principle against its unauthorised use | |
AU2002325999A1 (en) | Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use | |
PL367485A1 (en) | Method for protecting a software using a so-called conditional jump principle against its unauthorised use | |
AU2003214250A1 (en) | Device for protecting against unauthorised use of software | |
AU2002360232A1 (en) | Position based copy protection | |
AU2002329536A1 (en) | Method to protect software against unauthorized use | |
AU2002328377A1 (en) | Method for protecting a software using a so-called detection and coercion principle against its unauthorised use | |
AU2002354412A1 (en) | Device for protecting a person | |
AU2002304370A1 (en) | Method for protecting privacy when using a bluetooth device |