YU5804A - Postupak za zaštitu softvera protiv neovlašćenog korišćenja, koristeći princip elementarnih funkcija - Google Patents
Postupak za zaštitu softvera protiv neovlašćenog korišćenja, koristeći princip elementarnih funkcijaInfo
- Publication number
- YU5804A YU5804A YU5804A YUP5804A YU5804A YU 5804 A YU5804 A YU 5804A YU 5804 A YU5804 A YU 5804A YU P5804 A YUP5804 A YU P5804A YU 5804 A YU5804 A YU 5804A
- Authority
- YU
- Yugoslavia
- Prior art keywords
- software
- elementary functions
- protecting
- unauthorised use
- source
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0110241A FR2828300B1 (fr) | 2001-07-31 | 2001-07-31 | Procede pour proteger un logiciel a l'aide d'un principe dit de "fonctions elementaires" contre son utilisation non autorisee |
Publications (1)
Publication Number | Publication Date |
---|---|
YU5804A true YU5804A (sh) | 2006-05-25 |
Family
ID=8866116
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
YU5804A YU5804A (sh) | 2001-07-31 | 2002-07-04 | Postupak za zaštitu softvera protiv neovlašćenog korišćenja, koristeći princip elementarnih funkcija |
Country Status (19)
Country | Link |
---|---|
EP (1) | EP1412839A2 (xx) |
JP (1) | JP3949106B2 (xx) |
KR (1) | KR20040032860A (xx) |
CN (1) | CN1275115C (xx) |
BR (1) | BR0211372A (xx) |
CA (1) | CA2454096A1 (xx) |
FR (1) | FR2828300B1 (xx) |
HK (1) | HK1070958A1 (xx) |
HR (1) | HRP20040044A2 (xx) |
HU (1) | HUP0400239A2 (xx) |
IL (1) | IL159956A0 (xx) |
MA (1) | MA26123A1 (xx) |
MX (1) | MXPA04000595A (xx) |
NO (1) | NO20040230L (xx) |
PL (1) | PL367486A1 (xx) |
TN (1) | TNSN04009A1 (xx) |
WO (1) | WO2003012605A2 (xx) |
YU (1) | YU5804A (xx) |
ZA (1) | ZA200400353B (xx) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109102436B (zh) * | 2018-06-22 | 2020-10-27 | 芯启源(上海)半导体科技有限公司 | 基于usb3.0协议ts1训练序列的ip软核产权保护与侵权鉴定方法 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2634917A1 (fr) * | 1988-08-01 | 1990-02-02 | Pionchon Philippe | Procede et dispositif de protection d'un logiciel, en particulier contre les copies non autorisees |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
WO1999066387A1 (fr) * | 1998-06-12 | 1999-12-23 | Gemplus | Procede de controle de l'execution d'un produit logiciel |
EP0988591A1 (en) * | 1997-06-09 | 2000-03-29 | Intertrust, Incorporated | Obfuscation techniques for enhancing software security |
-
2001
- 2001-07-31 FR FR0110241A patent/FR2828300B1/fr not_active Expired - Lifetime
-
2002
- 2002-07-04 CA CA002454096A patent/CA2454096A1/fr not_active Abandoned
- 2002-07-04 IL IL15995602A patent/IL159956A0/xx unknown
- 2002-07-04 JP JP2003517723A patent/JP3949106B2/ja not_active Expired - Fee Related
- 2002-07-04 YU YU5804A patent/YU5804A/sh unknown
- 2002-07-04 CN CNB028146743A patent/CN1275115C/zh not_active Expired - Fee Related
- 2002-07-04 WO PCT/FR2002/002344 patent/WO2003012605A2/fr active Application Filing
- 2002-07-04 PL PL02367486A patent/PL367486A1/xx not_active Application Discontinuation
- 2002-07-04 KR KR10-2004-7000810A patent/KR20040032860A/ko not_active Application Discontinuation
- 2002-07-04 MX MXPA04000595A patent/MXPA04000595A/es unknown
- 2002-07-04 HU HU0400239A patent/HUP0400239A2/hu unknown
- 2002-07-04 BR BR0211372-4A patent/BR0211372A/pt not_active Application Discontinuation
- 2002-07-04 EP EP02762529A patent/EP1412839A2/fr not_active Withdrawn
-
2004
- 2004-01-16 ZA ZA2004/00353A patent/ZA200400353B/en unknown
- 2004-01-19 MA MA27489A patent/MA26123A1/fr unknown
- 2004-01-19 TN TNP2004000009A patent/TNSN04009A1/fr unknown
- 2004-01-19 NO NO20040230A patent/NO20040230L/no not_active Application Discontinuation
- 2004-01-19 HR HR20040044A patent/HRP20040044A2/hr not_active Application Discontinuation
-
2005
- 2005-03-30 HK HK05102680A patent/HK1070958A1/xx not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
HRP20040044A2 (en) | 2005-02-28 |
FR2828300B1 (fr) | 2010-09-03 |
BR0211372A (pt) | 2004-09-14 |
CN1535409A (zh) | 2004-10-06 |
MXPA04000595A (es) | 2005-02-17 |
FR2828300A1 (fr) | 2003-02-07 |
CA2454096A1 (fr) | 2003-02-13 |
IL159956A0 (en) | 2004-06-20 |
ZA200400353B (en) | 2005-03-30 |
TNSN04009A1 (fr) | 2006-06-01 |
HK1070958A1 (en) | 2005-06-30 |
CN1275115C (zh) | 2006-09-13 |
WO2003012605A3 (fr) | 2003-12-24 |
EP1412839A2 (fr) | 2004-04-28 |
HUP0400239A2 (en) | 2004-09-28 |
NO20040230L (no) | 2004-03-30 |
WO2003012605A2 (fr) | 2003-02-13 |
PL367486A1 (en) | 2005-02-21 |
JP3949106B2 (ja) | 2007-07-25 |
JP2004537801A (ja) | 2004-12-16 |
KR20040032860A (ko) | 2004-04-17 |
MA26123A1 (fr) | 2004-04-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2003034188A3 (en) | Method and system for detecting unauthorised executable programs _______________________________________________________________ | |
AU2001294017A1 (en) | A method for controlling access to protected content | |
WO2001086372A3 (en) | Information security method and system | |
WO2003010681A3 (en) | Method and system for digital signal processing in an adaptive computing engine | |
CA2481569A1 (en) | Initializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function | |
HK1069240A1 (en) | Verbose hardware indetification for biding a software package to a computer system having tolerance for hardware changes | |
WO2002043065A3 (en) | A copy protected dvd disc and method for producing and validating same | |
WO2002067090A3 (en) | System and method for selectively enabling and disabling access to software applications over a network | |
WO2007035383A3 (en) | A system and method for allowing copying or distribution of a copy protected signal | |
TW200622703A (en) | Source code protection | |
WO2002101521A3 (en) | Method of invisibly embedding into a text document the license identification of the generating licensed software | |
WO2003049106A3 (en) | Method and apparatus for verifying the integrity of system data | |
AU2002211253A1 (en) | Method and apparatus to improve the protection of information presented by a computer | |
WO2004034180A3 (en) | Processes and systems for enabling secure and controlled distribution and use of information | |
WO2002088014A3 (en) | Method for solving a multi-goal problem | |
WO2005110565A3 (en) | Protecting a gaming machine from rogue code | |
YU5804A (sh) | Postupak za zaštitu softvera protiv neovlašćenog korišćenja, koristeći princip elementarnih funkcija | |
WO2003012650A3 (fr) | Procede pour proteger un logiciel a l'aide de 'dissociation temporelle' contre son utilisation non autorisee | |
WO2004012029A3 (en) | Restricting access to a method in a component | |
GR1003432B (el) | Συστημα προστασιας λογισμικου οπτικου δισκου. | |
YU5404A (sh) | Postupak za zaštitu softvera protiv neovlašćenog korišćenja koristeći takozvani princip promenljive | |
WO2003012374A3 (fr) | Procede pour proteger un logiciel a l'aide de 'branchement conditionnel' contre son utilisation non autorisee | |
YU5604A (sh) | Postupak za zaštitu softvera protiv neovlašćenog korišćenja, koristeći princip preimenovanja | |
WO2003079164A3 (de) | Vorrichtung zum schutz gegen unauthorisierte benutzung von software | |
WO2002093329A3 (de) | Verfahren zum betreiben eines steuergeräts |