IL159951A0 - Method to protect software against unauthorised use with a renaming principle - Google Patents
Method to protect software against unauthorised use with a renaming principleInfo
- Publication number
- IL159951A0 IL159951A0 IL15995102A IL15995102A IL159951A0 IL 159951 A0 IL159951 A0 IL 159951A0 IL 15995102 A IL15995102 A IL 15995102A IL 15995102 A IL15995102 A IL 15995102A IL 159951 A0 IL159951 A0 IL 159951A0
- Authority
- IL
- Israel
- Prior art keywords
- renaming
- principle
- unauthorised use
- against unauthorised
- protect software
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Storage Device Security (AREA)
- Executing Machine-Instructions (AREA)
- Logic Circuits (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0110246A FR2828303B1 (en) | 2001-07-31 | 2001-07-31 | METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE OF "RENAMING" AGAINST ITS UNAUTHORIZED USE |
PCT/FR2002/002340 WO2003012604A2 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called renaming principle against its unauthorised use |
Publications (1)
Publication Number | Publication Date |
---|---|
IL159951A0 true IL159951A0 (en) | 2004-06-20 |
Family
ID=8866121
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IL15995102A IL159951A0 (en) | 2001-07-31 | 2002-07-04 | Method to protect software against unauthorised use with a renaming principle |
Country Status (19)
Country | Link |
---|---|
EP (1) | EP1412837A2 (en) |
JP (1) | JP3949105B2 (en) |
KR (1) | KR20040032858A (en) |
CN (1) | CN1288524C (en) |
BR (1) | BR0211375A (en) |
CA (1) | CA2454094A1 (en) |
FR (1) | FR2828303B1 (en) |
HK (1) | HK1070154A1 (en) |
HR (1) | HRP20040048A2 (en) |
HU (1) | HUP0400232A2 (en) |
IL (1) | IL159951A0 (en) |
MA (1) | MA26127A1 (en) |
MX (1) | MXPA04000596A (en) |
NO (1) | NO20040231L (en) |
PL (1) | PL367440A1 (en) |
TN (1) | TNSN04013A1 (en) |
WO (1) | WO2003012604A2 (en) |
YU (1) | YU5604A (en) |
ZA (1) | ZA200400350B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100346252C (en) * | 2005-09-28 | 2007-10-31 | 珠海金山软件股份有限公司 | Computer software security loophole repairing apparatus and method |
JP4770425B2 (en) * | 2005-11-24 | 2011-09-14 | 富士ゼロックス株式会社 | Program, method and apparatus for creating protected execution program |
CN100437615C (en) * | 2006-10-16 | 2008-11-26 | 珠海金山软件股份有限公司 | Method for protecting dynamic chanining bank interface under windows platform |
CN103198244B (en) * | 2013-03-26 | 2016-06-29 | 北京深思数盾科技股份有限公司 | The method of protection dynamic link library |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2634917A1 (en) * | 1988-08-01 | 1990-02-02 | Pionchon Philippe | METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
WO1999066387A1 (en) * | 1998-06-12 | 1999-12-23 | Gemplus | Method for verifying the execution of a software product |
EP0988591A1 (en) * | 1997-06-09 | 2000-03-29 | Intertrust, Incorporated | Obfuscation techniques for enhancing software security |
-
2001
- 2001-07-31 FR FR0110246A patent/FR2828303B1/en not_active Expired - Lifetime
-
2002
- 2002-07-04 YU YU5604A patent/YU5604A/en unknown
- 2002-07-04 JP JP2003517722A patent/JP3949105B2/en not_active Expired - Fee Related
- 2002-07-04 PL PL02367440A patent/PL367440A1/en not_active Application Discontinuation
- 2002-07-04 KR KR10-2004-7000806A patent/KR20040032858A/en not_active Application Discontinuation
- 2002-07-04 IL IL15995102A patent/IL159951A0/en unknown
- 2002-07-04 HU HU0400232A patent/HUP0400232A2/en unknown
- 2002-07-04 WO PCT/FR2002/002340 patent/WO2003012604A2/en active Application Filing
- 2002-07-04 MX MXPA04000596A patent/MXPA04000596A/en unknown
- 2002-07-04 CA CA002454094A patent/CA2454094A1/en not_active Abandoned
- 2002-07-04 CN CNB028146719A patent/CN1288524C/en not_active Expired - Fee Related
- 2002-07-04 BR BR0211375-9A patent/BR0211375A/en not_active IP Right Cessation
- 2002-07-04 EP EP02762526A patent/EP1412837A2/en not_active Withdrawn
-
2004
- 2004-01-16 ZA ZA2004/00350A patent/ZA200400350B/en unknown
- 2004-01-19 NO NO20040231A patent/NO20040231L/en not_active Application Discontinuation
- 2004-01-19 TN TNP2004000013A patent/TNSN04013A1/en unknown
- 2004-01-19 MA MA27493A patent/MA26127A1/en unknown
- 2004-01-19 HR HR20040048A patent/HRP20040048A2/en not_active Application Discontinuation
-
2005
- 2005-03-30 HK HK05102677A patent/HK1070154A1/en not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
HRP20040048A2 (en) | 2004-06-30 |
MA26127A1 (en) | 2004-04-01 |
FR2828303B1 (en) | 2010-09-03 |
EP1412837A2 (en) | 2004-04-28 |
NO20040231L (en) | 2004-03-30 |
TNSN04013A1 (en) | 2006-06-01 |
CN1535408A (en) | 2004-10-06 |
JP3949105B2 (en) | 2007-07-25 |
CA2454094A1 (en) | 2003-02-13 |
ZA200400350B (en) | 2005-03-30 |
FR2828303A1 (en) | 2003-02-07 |
JP2004537800A (en) | 2004-12-16 |
MXPA04000596A (en) | 2005-02-17 |
WO2003012604A3 (en) | 2004-01-22 |
BR0211375A (en) | 2004-08-17 |
YU5604A (en) | 2006-08-17 |
KR20040032858A (en) | 2004-04-17 |
HK1070154A1 (en) | 2005-06-10 |
PL367440A1 (en) | 2005-02-21 |
WO2003012604A2 (en) | 2003-02-13 |
HUP0400232A2 (en) | 2004-09-28 |
CN1288524C (en) | 2006-12-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG106642A1 (en) | Protecting a surface of a nickel-base article with a corrosion-resistant aluminum-alloy layer | |
DE50205098D1 (en) | Motorcycle with attached motorcycle case | |
HK1070154A1 (en) | Method to protect software against unwanted use with a renaming principle | |
AU2003295844A8 (en) | Photomask and method for creating a protective layer on the same | |
EP1580580A4 (en) | Retroreflecting functional member and retroreflecting unit | |
IL159953A0 (en) | Method to protect software against unauthorised use with a variable principle | |
GB0205047D0 (en) | Protecting computer software | |
GB0505148D0 (en) | Software protection | |
IL159952A0 (en) | Method to protect software against unauthorised use with a conditional branch principle | |
IL159956A0 (en) | Method to protect software against unauthorised use with a elementary functions principle | |
AU2001224530A1 (en) | Methods for protecting a surface | |
IL159954A0 (en) | Method to protect software against unauthorised use with a temporal dissociation principle | |
GB2370923B (en) | Wheel with a generator | |
TW537343U (en) | Clutch locks used in cam wheel sleeves | |
AU2002328375A1 (en) | Method for protecting a software using a so-called renaming principle against its unauthorised use | |
AU2002325998A1 (en) | Method for protecting a software using a so-called variable principle against its unauthorised use | |
IL159955A0 (en) | Method to protect software against unauthorised use with a detection and coercion principle | |
GB0212386D0 (en) | Copy protect | |
AU2002329536A1 (en) | Method to protect software against unauthorized use | |
AU2001274709A1 (en) | A method to set tools and a device for carrying out the method | |
AU2002328377A1 (en) | Method for protecting a software using a so-called detection and coercion principle against its unauthorised use | |
AU2002328378A1 (en) | Method for protecting a software using a so-called elementary functions principle against its unauthorised use | |
AU2001295626A1 (en) | Anti-theft gas grip for motorcycles and the like | |
GB0114725D0 (en) | A lockable file | |
GB0323770D0 (en) | A new approach to the design and operation of reuseable launch vehicles |