AU2002325998A1 - Method for protecting a software using a so-called variable principle against its unauthorised use - Google Patents

Method for protecting a software using a so-called variable principle against its unauthorised use

Info

Publication number
AU2002325998A1
AU2002325998A1 AU2002325998A AU2002325998A AU2002325998A1 AU 2002325998 A1 AU2002325998 A1 AU 2002325998A1 AU 2002325998 A AU2002325998 A AU 2002325998A AU 2002325998 A AU2002325998 A AU 2002325998A AU 2002325998 A1 AU2002325998 A1 AU 2002325998A1
Authority
AU
Australia
Prior art keywords
protecting
software
called variable
unauthorised use
principle against
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
AU2002325998A
Other versions
AU2002325998B2 (en
Inventor
Jean-Christophe Cuenod
Gilles Sgro
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Validy SAS
Original Assignee
Validy SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from FR0110250A external-priority patent/FR2828305B1/en
Application filed by Validy SAS filed Critical Validy SAS
Publication of AU2002325998A1 publication Critical patent/AU2002325998A1/en
Application granted granted Critical
Publication of AU2002325998B2 publication Critical patent/AU2002325998B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

AU2002325998A 2001-07-31 2002-07-04 Method for protecting a software using a so-called variable principle against its unauthorised use Ceased AU2002325998B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
FR0110250A FR2828305B1 (en) 2001-07-31 2001-07-31 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE SAID "VARIABLE" AGAINST ITS UNAUTHORIZED USE
FR01/10250 2001-07-31
PCT/FR2002/002338 WO2003012649A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called variable principle against its unauthorised use

Publications (2)

Publication Number Publication Date
AU2002325998A1 true AU2002325998A1 (en) 2003-05-29
AU2002325998B2 AU2002325998B2 (en) 2008-10-30

Family

ID=8866125

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2002325998A Ceased AU2002325998B2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called variable principle against its unauthorised use

Country Status (29)

Country Link
EP (1) EP1412861A2 (en)
JP (1) JP3949107B2 (en)
KR (1) KR100940347B1 (en)
CN (1) CN1288525C (en)
AP (1) AP2004002958A0 (en)
AU (1) AU2002325998B2 (en)
BR (1) BR0211374A (en)
CA (1) CA2454090A1 (en)
CO (1) CO5550508A2 (en)
CR (1) CR7231A (en)
EA (1) EA005465B1 (en)
EC (1) ECSP044951A (en)
FR (1) FR2828305B1 (en)
GE (1) GEP20053647B (en)
HK (1) HK1070155A1 (en)
HR (1) HRP20040049A2 (en)
HU (1) HUP0400228A2 (en)
IL (1) IL159953A0 (en)
IS (1) IS7121A (en)
MA (1) MA26126A1 (en)
MX (1) MXPA04000488A (en)
NO (1) NO20040232L (en)
OA (1) OA12699A (en)
PL (1) PL367366A1 (en)
TN (1) TNSN04012A1 (en)
UA (1) UA77186C2 (en)
WO (1) WO2003012649A2 (en)
YU (1) YU5404A (en)
ZA (1) ZA200400348B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2852415B1 (en) * 2003-03-11 2005-06-24 Actikey KEY TYPE MEDIUM, CONTROL OF ACCESS TO DATA AND / OR SOFTWARE, AND CORRESPONDING METHOD
CN107194212B (en) * 2017-06-21 2020-04-17 株洲中车时代电气股份有限公司 Method for protecting protocol content in source code of display

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (en) * 1988-08-01 1990-02-02 Pionchon Philippe METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
WO1999066387A1 (en) * 1998-06-12 1999-12-23 Gemplus Method for verifying the execution of a software product
JP4739465B2 (en) * 1997-06-09 2011-08-03 インタートラスト テクノロジーズ コーポレイション Confusing technology to enhance software security

Similar Documents

Publication Publication Date Title
EP1282025B8 (en) An interface for a security coprocessor
AUPS045702A0 (en) A protection device
AU7288400A (en) Method for protecting a program flow
EP1329627B8 (en) Method and apparatus for controlling a component protection function
AU2003269185A1 (en) Software protection
AU2003209448A1 (en) Protecting computer software
AU2002325998A1 (en) Method for protecting a software using a so-called variable principle against its unauthorised use
AU2001224530A1 (en) Methods for protecting a surface
PL367440A1 (en) Method for protecting a software using a so-called renaming principle against its unauthorised use
PL367366A1 (en) Method for protecting a software using a so-called variable principle against its unauthorised use
AU2002328378A1 (en) Method for protecting a software using a so-called elementary functions principle against its unauthorised use
AU2002328375A1 (en) Method for protecting a software using a so-called renaming principle against its unauthorised use
PL367486A1 (en) Method for protecting a software using a so-called elementary functions principle against its unauthorised use
HRP20040047A2 (en) Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
AU2003267505A1 (en) Device for protecting seacoasts
AU2003231470A1 (en) A protecting device for metal structures
AU2002328376A1 (en) Method for protecting a software using a so-called conditional jump principle against its unauthorised use
AU2002325999A1 (en) Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
PL367485A1 (en) Method for protecting a software using a so-called conditional jump principle against its unauthorised use
AU2003214250A1 (en) Device for protecting against unauthorised use of software
AU2002360232A1 (en) Position based copy protection
AU2002329536A1 (en) Method to protect software against unauthorized use
AU2002328377A1 (en) Method for protecting a software using a so-called detection and coercion principle against its unauthorised use
AU2002354412A1 (en) Device for protecting a person
AU2002304370A1 (en) Method for protecting privacy when using a bluetooth device