IL159953A0 - Method to protect software against unauthorised use with a variable principle - Google Patents

Method to protect software against unauthorised use with a variable principle

Info

Publication number
IL159953A0
IL159953A0 IL15995302A IL15995302A IL159953A0 IL 159953 A0 IL159953 A0 IL 159953A0 IL 15995302 A IL15995302 A IL 15995302A IL 15995302 A IL15995302 A IL 15995302A IL 159953 A0 IL159953 A0 IL 159953A0
Authority
IL
Israel
Prior art keywords
unauthorised use
against unauthorised
protect software
software against
variable principle
Prior art date
Application number
IL15995302A
Other languages
English (en)
Original Assignee
Validy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Validy filed Critical Validy
Publication of IL159953A0 publication Critical patent/IL159953A0/xx

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Remote Sensing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Storage Device Security (AREA)
IL15995302A 2001-07-31 2002-07-04 Method to protect software against unauthorised use with a variable principle IL159953A0 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0110250A FR2828305B1 (fr) 2001-07-31 2001-07-31 Procede pour proteger un logiciel a l'aide d'un principe dit de "variable" contre son utilisation non autorisee
PCT/FR2002/002338 WO2003012649A2 (fr) 2001-07-31 2002-07-04 Procede pour proteger un logiciel a l'aide de 'variables' contre son utilisation non autorisee

Publications (1)

Publication Number Publication Date
IL159953A0 true IL159953A0 (en) 2004-06-20

Family

ID=8866125

Family Applications (1)

Application Number Title Priority Date Filing Date
IL15995302A IL159953A0 (en) 2001-07-31 2002-07-04 Method to protect software against unauthorised use with a variable principle

Country Status (29)

Country Link
EP (1) EP1412861A2 (ja)
JP (1) JP3949107B2 (ja)
KR (1) KR100940347B1 (ja)
CN (1) CN1288525C (ja)
AP (1) AP2004002958A0 (ja)
AU (1) AU2002325998B2 (ja)
BR (1) BR0211374A (ja)
CA (1) CA2454090A1 (ja)
CO (1) CO5550508A2 (ja)
CR (1) CR7231A (ja)
EA (1) EA005465B1 (ja)
EC (1) ECSP044951A (ja)
FR (1) FR2828305B1 (ja)
GE (1) GEP20053647B (ja)
HK (1) HK1070155A1 (ja)
HR (1) HRP20040049A2 (ja)
HU (1) HUP0400228A2 (ja)
IL (1) IL159953A0 (ja)
IS (1) IS7121A (ja)
MA (1) MA26126A1 (ja)
MX (1) MXPA04000488A (ja)
NO (1) NO20040232L (ja)
OA (1) OA12699A (ja)
PL (1) PL367366A1 (ja)
TN (1) TNSN04012A1 (ja)
UA (1) UA77186C2 (ja)
WO (1) WO2003012649A2 (ja)
YU (1) YU5404A (ja)
ZA (1) ZA200400348B (ja)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2852415B1 (fr) * 2003-03-11 2005-06-24 Actikey Support de type cle, de controle de l'acces a des donnees et/ou a un logiciel et procede correspondant
CN107194212B (zh) * 2017-06-21 2020-04-17 株洲中车时代电气股份有限公司 一种显示器源代码中协议内容的保护方法

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (fr) * 1988-08-01 1990-02-02 Pionchon Philippe Procede et dispositif de protection d'un logiciel, en particulier contre les copies non autorisees
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
WO1999001815A1 (en) * 1997-06-09 1999-01-14 Intertrust, Incorporated Obfuscation techniques for enhancing software security
DE69819790D1 (de) * 1998-06-12 2003-12-18 Gemplus Gemenos Verfahren zur kontrolle der ausführung eines programmproduktes

Also Published As

Publication number Publication date
OA12699A (en) 2006-06-23
CR7231A (es) 2005-07-21
ZA200400348B (en) 2005-03-30
YU5404A (sh) 2006-08-17
IS7121A (is) 2004-01-20
MA26126A1 (fr) 2004-04-01
NO20040232L (no) 2004-03-30
MXPA04000488A (es) 2005-03-07
TNSN04012A1 (fr) 2006-06-01
UA77186C2 (en) 2006-11-15
FR2828305A1 (fr) 2003-02-07
FR2828305B1 (fr) 2010-09-03
BR0211374A (pt) 2004-07-20
CN1288525C (zh) 2006-12-06
AP2004002958A0 (en) 2004-03-31
EA200400057A1 (ru) 2004-06-24
WO2003012649A2 (fr) 2003-02-13
AU2002325998B2 (en) 2008-10-30
JP2004537806A (ja) 2004-12-16
PL367366A1 (en) 2005-02-21
CN1535410A (zh) 2004-10-06
EP1412861A2 (fr) 2004-04-28
HK1070155A1 (en) 2005-06-10
WO2003012649A3 (fr) 2003-12-24
HRP20040049A2 (en) 2004-06-30
JP3949107B2 (ja) 2007-07-25
EA005465B1 (ru) 2005-02-24
GEP20053647B (en) 2005-10-25
CO5550508A2 (es) 2005-08-31
KR20040027881A (ko) 2004-04-01
ECSP044951A (es) 2004-04-28
CA2454090A1 (fr) 2003-02-13
KR100940347B1 (ko) 2010-02-04
HUP0400228A2 (en) 2004-09-28

Similar Documents

Publication Publication Date Title
EP1481456A4 (en) PROTECTION DEVICE
EP1228711A3 (de) Motorradschutzanzug
GB0316651D0 (en) A universasl software application
AU2002225105A1 (en) Protective glove
TW510372U (en) Afforesting and landscaping device
AU2002366888A1 (en) Varying segment sizes to increase security
EP1580580A4 (en) REFLECTING FUNCTIONAL ELEMENT AND RETRACTOR UNIT
HK1070154A1 (en) Method to protect software against unwanted use with a renaming principle
GB0219877D0 (en) Motorcycle
IL159953A0 (en) Method to protect software against unauthorised use with a variable principle
GB2409077B (en) Software protection
GB0421030D0 (en) Protecting computer software
IL159956A0 (en) Method to protect software against unauthorised use with a elementary functions principle
IL159952A0 (en) Method to protect software against unauthorised use with a conditional branch principle
IL159954A0 (en) Method to protect software against unauthorised use with a temporal dissociation principle
GB2370923B (en) Wheel with a generator
AU2002325998A1 (en) Method for protecting a software using a so-called variable principle against its unauthorised use
AU2002214122A1 (en) Protective glove
GB0229209D0 (en) Motorcycle exhaust protector
GB2377970B (en) Motorcycle engines
AU2002329536A1 (en) Method to protect software against unauthorized use
IL159955A0 (en) Method to protect software against unauthorised use with a detection and coercion principle
AU146573S (en) A motorcycle
AU2001274709A1 (en) A method to set tools and a device for carrying out the method
AU2002328375A1 (en) Method for protecting a software using a so-called renaming principle against its unauthorised use