FR2828304B1 - METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "TIME DISSOCIATION" AGAINST ITS UNAUTHORIZED USE - Google Patents

METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "TIME DISSOCIATION" AGAINST ITS UNAUTHORIZED USE

Info

Publication number
FR2828304B1
FR2828304B1 FR0110247A FR0110247A FR2828304B1 FR 2828304 B1 FR2828304 B1 FR 2828304B1 FR 0110247 A FR0110247 A FR 0110247A FR 0110247 A FR0110247 A FR 0110247A FR 2828304 B1 FR2828304 B1 FR 2828304B1
Authority
FR
France
Prior art keywords
principle
unauthorized use
protecting software
time dissociation
dissociation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
FR0110247A
Other languages
French (fr)
Other versions
FR2828304A1 (en
Inventor
Jean Christophe Cuenod
Gilles Sgro
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Validy Net Inc Us
Original Assignee
Validy SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to FR0110247A priority Critical patent/FR2828304B1/en
Application filed by Validy SAS filed Critical Validy SAS
Priority to JP2003517759A priority patent/JP3949108B2/en
Priority to BR0211371-6A priority patent/BR0211371A/en
Priority to CA002454092A priority patent/CA2454092A1/en
Priority to KR10-2004-7000805A priority patent/KR20040031778A/en
Priority to PCT/FR2002/002339 priority patent/WO2003012650A2/en
Priority to IL15995402A priority patent/IL159954A0/en
Priority to MXPA04000594A priority patent/MXPA04000594A/en
Priority to HU0400223A priority patent/HUP0400223A2/en
Priority to EP02760379A priority patent/EP1412862A2/en
Priority to YU5504A priority patent/YU5504A/en
Priority to CNB028146859A priority patent/CN100451910C/en
Priority to PL02367424A priority patent/PL367424A1/en
Publication of FR2828304A1 publication Critical patent/FR2828304A1/en
Priority to ZA2004/00349A priority patent/ZA200400349B/en
Priority to HR20040047A priority patent/HRP20040047A2/en
Priority to NO20040227A priority patent/NO20040227L/en
Priority to TNP2004000014A priority patent/TNSN04014A1/en
Priority to MA27491A priority patent/MA26125A1/en
Publication of FR2828304B1 publication Critical patent/FR2828304B1/en
Application granted granted Critical
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Remote Sensing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Storage Device Security (AREA)
FR0110247A 2001-07-31 2001-07-31 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "TIME DISSOCIATION" AGAINST ITS UNAUTHORIZED USE Expired - Lifetime FR2828304B1 (en)

Priority Applications (18)

Application Number Priority Date Filing Date Title
FR0110247A FR2828304B1 (en) 2001-07-31 2001-07-31 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "TIME DISSOCIATION" AGAINST ITS UNAUTHORIZED USE
PL02367424A PL367424A1 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
BR0211371-6A BR0211371A (en) 2001-07-31 2002-07-04 Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit
KR10-2004-7000805A KR20040031778A (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorized use
PCT/FR2002/002339 WO2003012650A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
IL15995402A IL159954A0 (en) 2001-07-31 2002-07-04 Method to protect software against unauthorised use with a temporal dissociation principle
MXPA04000594A MXPA04000594A (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use.
HU0400223A HUP0400223A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
CNB028146859A CN100451910C (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
YU5504A YU5504A (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
JP2003517759A JP3949108B2 (en) 2001-07-31 2002-07-04 How to protect software against unauthorized use with the “temporary separation” principle
CA002454092A CA2454092A1 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
EP02760379A EP1412862A2 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
ZA2004/00349A ZA200400349B (en) 2001-07-31 2004-01-16 Method for protecting a software using a so called temporal dissociation principle against its unauthorised use
HR20040047A HRP20040047A2 (en) 2001-07-31 2004-01-19 Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
NO20040227A NO20040227L (en) 2001-07-31 2004-01-19 Procedure for Protecting a Software, Using a Sacred Temporal Dissociation Principle, from Unauthorized Use of it
TNP2004000014A TNSN04014A1 (en) 2001-07-31 2004-01-19 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "TIME DISSOCIATION" AGAINST ITS UNAUTHORIZED USE
MA27491A MA26125A1 (en) 2001-07-31 2004-01-19 PROCESS FOR PROTECTING SOFTWARE USING A PRINCIPLE CALLED OF "TEMPORAL DISSOCIATION" AGAINST ITS UNAUTHORIZED USE

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR0110247A FR2828304B1 (en) 2001-07-31 2001-07-31 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "TIME DISSOCIATION" AGAINST ITS UNAUTHORIZED USE

Publications (2)

Publication Number Publication Date
FR2828304A1 FR2828304A1 (en) 2003-02-07
FR2828304B1 true FR2828304B1 (en) 2010-09-03

Family

ID=8866122

Family Applications (1)

Application Number Title Priority Date Filing Date
FR0110247A Expired - Lifetime FR2828304B1 (en) 2001-07-31 2001-07-31 METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "TIME DISSOCIATION" AGAINST ITS UNAUTHORIZED USE

Country Status (18)

Country Link
EP (1) EP1412862A2 (en)
JP (1) JP3949108B2 (en)
KR (1) KR20040031778A (en)
CN (1) CN100451910C (en)
BR (1) BR0211371A (en)
CA (1) CA2454092A1 (en)
FR (1) FR2828304B1 (en)
HR (1) HRP20040047A2 (en)
HU (1) HUP0400223A2 (en)
IL (1) IL159954A0 (en)
MA (1) MA26125A1 (en)
MX (1) MXPA04000594A (en)
NO (1) NO20040227L (en)
PL (1) PL367424A1 (en)
TN (1) TNSN04014A1 (en)
WO (1) WO2003012650A2 (en)
YU (1) YU5504A (en)
ZA (1) ZA200400349B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102011006000B4 (en) 2011-03-23 2015-01-15 Infineon Technologies Ag Signature update by code transformation
KR101217668B1 (en) * 2011-05-12 2013-01-02 주식회사 안랩 Malicious program hooking prevention apparatus and method
US11595201B2 (en) 2020-02-21 2023-02-28 Cyber Armor Ltd. System and method for generation of a disposable software module for cryptographic material protection

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (en) * 1988-08-01 1990-02-02 Pionchon Philippe METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
AU7957998A (en) * 1997-06-09 1999-01-25 Intertrust, Incorporated Obfuscation techniques for enhancing software security
JP2002518727A (en) * 1998-06-12 2002-06-25 ジェムプリュス How to control the execution of software products

Also Published As

Publication number Publication date
IL159954A0 (en) 2004-06-20
CN100451910C (en) 2009-01-14
TNSN04014A1 (en) 2006-06-01
JP3949108B2 (en) 2007-07-25
EP1412862A2 (en) 2004-04-28
KR20040031778A (en) 2004-04-13
ZA200400349B (en) 2005-03-30
CA2454092A1 (en) 2003-02-13
JP2004537807A (en) 2004-12-16
FR2828304A1 (en) 2003-02-07
WO2003012650A2 (en) 2003-02-13
MA26125A1 (en) 2004-04-01
BR0211371A (en) 2004-09-28
PL367424A1 (en) 2005-02-21
MXPA04000594A (en) 2005-02-17
CN1552010A (en) 2004-12-01
WO2003012650A3 (en) 2003-12-24
HRP20040047A2 (en) 2004-06-30
NO20040227L (en) 2004-03-30
HUP0400223A2 (en) 2004-08-30
YU5504A (en) 2006-05-25

Similar Documents

Publication Publication Date Title
DE10249427B4 (en) A method for defining the security state of a computer system
FR2797860B1 (en) SECURITY SYSTEM FOR ELEVATOR MECHANICS
DE69824199D1 (en) LACTAM COMPOUNDS AS METALLOPROTEASE INHIBITORS
MA25562A1 (en) METHOD FOR ADMINISTERING A PHOSPHODIESTERASE 4 INHIBITOR.
FR2815874B1 (en) PERSONAL SECURITY DEVICE FOR A VERTICAL CABLE
AU2001246244A1 (en) A device for preventing removal of a lid
FR2828304B1 (en) METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "TIME DISSOCIATION" AGAINST ITS UNAUTHORIZED USE
FR2828303B1 (en) METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "RENAMING" AGAINST ITS UNAUTHORIZED USE
MA26126A1 (en) METHOD FOR PROTECTING SOFTWARE USING A "VARIABLE" PRINCIPLE AGAINST ITS UNAUTHORIZED USE
FR2828302B1 (en) METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE SAID "CONDITIONAL CONNECTION" AGAINST ITS UNAUTHORIZED USE
MA26123A1 (en) METHOD FOR PROTECTING SOFTWARE USING A "BASIC FUNCTION" PRINCIPLE AGAINST ITS UNAUTHORIZED USE
DE59810621D1 (en) Device for theft protection of a device
ATA18832000A (en) DEVICE FOR TRANSFORMING KEGS
FR2844815B3 (en) SAFETY COVER FOR SEWERS
DE60007025D1 (en) Device for compensating pressure surges
NO976016D0 (en) Device for snubing rig
IT245373Y1 (en) LOCKING DEVICE OF A FENDER FOR BICYCLES
NO20016230D0 (en) Pollution Removal Procedure
GB0116603D0 (en) Apparatus for preventing unauthorised access to a till
FR2797896B3 (en) DEVICE FOR PLACING A DRAIN
FR2820768B1 (en) DEPOSITED SECURITY GUARDRAIL FOR MASONRY
FR2768216B1 (en) EVENT FOR UNDERGROUND BOX
FR2852039B1 (en) DEVICE FOR SOLIDARIZING A CHEVRON OF A PROFILE
FR2846750B1 (en) DEVICE FOR CHARACTERIZING PAIR CABLES
ITBS930126A1 (en) MANHOLE COVER FOR TOMBINI WELLS

Legal Events

Date Code Title Description
CJ Change in legal form
PLFP Fee payment

Year of fee payment: 15

TP Transmission of property

Owner name: VALIDY NET INC, US

Effective date: 20160215

PLFP Fee payment

Year of fee payment: 16

PLFP Fee payment

Year of fee payment: 17

PLFP Fee payment

Year of fee payment: 18

PLFP Fee payment

Year of fee payment: 20