PL367366A1 - Method for protecting a software using a so-called variable principle against its unauthorised use - Google Patents

Method for protecting a software using a so-called variable principle against its unauthorised use

Info

Publication number
PL367366A1
PL367366A1 PL02367366A PL36736602A PL367366A1 PL 367366 A1 PL367366 A1 PL 367366A1 PL 02367366 A PL02367366 A PL 02367366A PL 36736602 A PL36736602 A PL 36736602A PL 367366 A1 PL367366 A1 PL 367366A1
Authority
PL
Poland
Prior art keywords
protecting
software
called variable
unauthorised use
principle against
Prior art date
Application number
PL02367366A
Other languages
English (en)
Polish (pl)
Inventor
Jean-Christophe Cuenod
Gilles Sgro
Original Assignee
Validy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Validy filed Critical Validy
Publication of PL367366A1 publication Critical patent/PL367366A1/xx

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Storage Device Security (AREA)
PL02367366A 2001-07-31 2002-07-04 Method for protecting a software using a so-called variable principle against its unauthorised use PL367366A1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR0110250A FR2828305B1 (fr) 2001-07-31 2001-07-31 Procede pour proteger un logiciel a l'aide d'un principe dit de "variable" contre son utilisation non autorisee

Publications (1)

Publication Number Publication Date
PL367366A1 true PL367366A1 (en) 2005-02-21

Family

ID=8866125

Family Applications (1)

Application Number Title Priority Date Filing Date
PL02367366A PL367366A1 (en) 2001-07-31 2002-07-04 Method for protecting a software using a so-called variable principle against its unauthorised use

Country Status (29)

Country Link
EP (1) EP1412861A2 (ru)
JP (1) JP3949107B2 (ru)
KR (1) KR100940347B1 (ru)
CN (1) CN1288525C (ru)
AP (1) AP2004002958A0 (ru)
AU (1) AU2002325998B2 (ru)
BR (1) BR0211374A (ru)
CA (1) CA2454090A1 (ru)
CO (1) CO5550508A2 (ru)
CR (1) CR7231A (ru)
EA (1) EA005465B1 (ru)
EC (1) ECSP044951A (ru)
FR (1) FR2828305B1 (ru)
GE (1) GEP20053647B (ru)
HK (1) HK1070155A1 (ru)
HR (1) HRP20040049A2 (ru)
HU (1) HUP0400228A2 (ru)
IL (1) IL159953A0 (ru)
IS (1) IS7121A (ru)
MA (1) MA26126A1 (ru)
MX (1) MXPA04000488A (ru)
NO (1) NO20040232L (ru)
OA (1) OA12699A (ru)
PL (1) PL367366A1 (ru)
TN (1) TNSN04012A1 (ru)
UA (1) UA77186C2 (ru)
WO (1) WO2003012649A2 (ru)
YU (1) YU5404A (ru)
ZA (1) ZA200400348B (ru)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2852415B1 (fr) * 2003-03-11 2005-06-24 Actikey Support de type cle, de controle de l'acces a des donnees et/ou a un logiciel et procede correspondant
CN107194212B (zh) * 2017-06-21 2020-04-17 株洲中车时代电气股份有限公司 一种显示器源代码中协议内容的保护方法

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2634917A1 (fr) * 1988-08-01 1990-02-02 Pionchon Philippe Procede et dispositif de protection d'un logiciel, en particulier contre les copies non autorisees
US5754646A (en) * 1995-07-19 1998-05-19 Cable Television Laboratories, Inc. Method for protecting publicly distributed software
AU7957998A (en) * 1997-06-09 1999-01-25 Intertrust, Incorporated Obfuscation techniques for enhancing software security
JP2002518727A (ja) * 1998-06-12 2002-06-25 ジェムプリュス ソフトウェア製品の実行の制御方法

Also Published As

Publication number Publication date
HRP20040049A2 (en) 2004-06-30
CA2454090A1 (fr) 2003-02-13
IS7121A (is) 2004-01-20
MA26126A1 (fr) 2004-04-01
OA12699A (en) 2006-06-23
EA005465B1 (ru) 2005-02-24
TNSN04012A1 (fr) 2006-06-01
FR2828305A1 (fr) 2003-02-07
BR0211374A (pt) 2004-07-20
HK1070155A1 (en) 2005-06-10
FR2828305B1 (fr) 2010-09-03
ECSP044951A (es) 2004-04-28
UA77186C2 (en) 2006-11-15
AU2002325998B2 (en) 2008-10-30
ZA200400348B (en) 2005-03-30
CN1535410A (zh) 2004-10-06
HUP0400228A2 (en) 2004-09-28
IL159953A0 (en) 2004-06-20
WO2003012649A3 (fr) 2003-12-24
JP2004537806A (ja) 2004-12-16
GEP20053647B (en) 2005-10-25
MXPA04000488A (es) 2005-03-07
CN1288525C (zh) 2006-12-06
AP2004002958A0 (en) 2004-03-31
WO2003012649A2 (fr) 2003-02-13
NO20040232L (no) 2004-03-30
CO5550508A2 (es) 2005-08-31
EP1412861A2 (fr) 2004-04-28
KR100940347B1 (ko) 2010-02-04
KR20040027881A (ko) 2004-04-01
JP3949107B2 (ja) 2007-07-25
EA200400057A1 (ru) 2004-06-24
CR7231A (es) 2005-07-21
YU5404A (sh) 2006-08-17

Similar Documents

Publication Publication Date Title
EP1282025B8 (en) An interface for a security coprocessor
GB0316651D0 (en) A universasl software application
AUPS045702A0 (en) A protection device
AU2002357814A1 (en) Apparatus and method for protecting a memory
HK1070154A1 (en) Method to protect software against unwanted use with a renaming principle
PL367366A1 (en) Method for protecting a software using a so-called variable principle against its unauthorised use
HK1067427A1 (en) Method for preventing unauthorized copy application program execution
GB2409077B (en) Software protection
GB0205047D0 (en) Protecting computer software
AU2002325998A1 (en) Method for protecting a software using a so-called variable principle against its unauthorised use
AU2001224530A1 (en) Methods for protecting a surface
PL367486A1 (en) Method for protecting a software using a so-called elementary functions principle against its unauthorised use
HRP20040047A2 (en) Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
PL367485A1 (en) Method for protecting a software using a so-called conditional jump principle against its unauthorised use
AU2002328378A1 (en) Method for protecting a software using a so-called elementary functions principle against its unauthorised use
AU2002328375A1 (en) Method for protecting a software using a so-called renaming principle against its unauthorised use
AU2003231470A1 (en) A protecting device for metal structures
AU2002328376A1 (en) Method for protecting a software using a so-called conditional jump principle against its unauthorised use
AU2002325999A1 (en) Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use
AU2002354412A1 (en) Device for protecting a person
AU2003214250A1 (en) Device for protecting against unauthorised use of software
AU2002328377A1 (en) Method for protecting a software using a so-called detection and coercion principle against its unauthorised use
GB0210354D0 (en) Method for preventing unauthorized software usage
AU2002329536A1 (en) Method to protect software against unauthorized use
PL338752A1 (en) Method protecting sewers against heavings

Legal Events

Date Code Title Description
REFS Decisions on refusal to grant patents (taken after the publication of the particulars of the applications)