WO2003012649A3 - Method for protecting a software using a so-called variable principle against its unauthorised use - Google Patents
Method for protecting a software using a so-called variable principle against its unauthorised use Download PDFInfo
- Publication number
- WO2003012649A3 WO2003012649A3 PCT/FR2002/002338 FR0202338W WO03012649A3 WO 2003012649 A3 WO2003012649 A3 WO 2003012649A3 FR 0202338 W FR0202338 W FR 0202338W WO 03012649 A3 WO03012649 A3 WO 03012649A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- software
- protecting
- unauthorised use
- called variable
- source
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Remote Sensing (AREA)
- Radar, Positioning & Navigation (AREA)
- Storage Device Security (AREA)
Abstract
Priority Applications (18)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
UA2004010469A UA77186C2 (en) | 2001-07-31 | 2002-04-07 | Method for protecting software against unauthorized use by a controlled variable |
MXPA04000488A MXPA04000488A (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called variable principle against its unauthorised use. |
BR0211374-0A BR0211374A (en) | 2001-07-31 | 2002-07-04 | Process for protecting vulnerable software from unauthorized use; system for process implementation; pre-customized unit; unit that allows you to run protected software and prevent unauthorized use; set of units; distribution set of protected software; processing and storage unit and processing and storage unit |
EA200400057A EA005465B1 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called variable principle against its unauthorised use |
HU0400228A HUP0400228A2 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called variable principle against its unauthorised use |
EP02760378A EP1412861A2 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called variable principle against its unauthorised use |
KR1020047000804A KR100940347B1 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called variable principle against its unauthorized use |
IL15995302A IL159953A0 (en) | 2001-07-31 | 2002-07-04 | Method to protect software against unauthorised use with a variable principle |
JP2003517758A JP3949107B2 (en) | 2001-07-31 | 2002-07-04 | How to protect software against unauthorized use by "variable" principle |
APAP/P/2004/002958A AP2004002958A0 (en) | 2001-07-31 | 2002-07-04 | Method to protect software against unwanted use with a "variable" principle |
AU2002325998A AU2002325998B2 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called variable principle against its unauthorised use |
CA002454090A CA2454090A1 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called variable principle against its unauthorised use |
ZA2004/00348A ZA200400348B (en) | 2001-07-31 | 2004-01-16 | Method for protecting a software using a so called variable principle against its unauthorused use |
TNP2004000012A TNSN04012A1 (en) | 2001-07-31 | 2004-01-19 | METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE SAID "VARIABLE" AGAINST ITS UNAUTHORIZED USE |
NO20040232A NO20040232L (en) | 2001-07-31 | 2004-01-19 | Procedure for Protecting a Software, Using a Socially Variable Principle Against Unauthorized Use of it |
HR20040049A HRP20040049A2 (en) | 2001-07-31 | 2004-01-19 | Method for protecting a software using a so-called variable principle against its unauthorised use |
IS7121A IS7121A (en) | 2001-07-31 | 2004-01-20 | A method for protecting software against unauthorized use by using so-called conversion laws |
HK05102678A HK1070155A1 (en) | 2001-07-31 | 2005-03-30 | Method to protect software against unwanted use with a "variable" principle |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0110250A FR2828305B1 (en) | 2001-07-31 | 2001-07-31 | METHOD FOR PROTECTING SOFTWARE USING A PRINCIPLE SAID "VARIABLE" AGAINST ITS UNAUTHORIZED USE |
FR01/10250 | 2001-07-31 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2003012649A2 WO2003012649A2 (en) | 2003-02-13 |
WO2003012649A3 true WO2003012649A3 (en) | 2003-12-24 |
Family
ID=8866125
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR2002/002338 WO2003012649A2 (en) | 2001-07-31 | 2002-07-04 | Method for protecting a software using a so-called variable principle against its unauthorised use |
Country Status (29)
Country | Link |
---|---|
EP (1) | EP1412861A2 (en) |
JP (1) | JP3949107B2 (en) |
KR (1) | KR100940347B1 (en) |
CN (1) | CN1288525C (en) |
AP (1) | AP2004002958A0 (en) |
AU (1) | AU2002325998B2 (en) |
BR (1) | BR0211374A (en) |
CA (1) | CA2454090A1 (en) |
CO (1) | CO5550508A2 (en) |
CR (1) | CR7231A (en) |
EA (1) | EA005465B1 (en) |
EC (1) | ECSP044951A (en) |
FR (1) | FR2828305B1 (en) |
GE (1) | GEP20053647B (en) |
HK (1) | HK1070155A1 (en) |
HR (1) | HRP20040049A2 (en) |
HU (1) | HUP0400228A2 (en) |
IL (1) | IL159953A0 (en) |
IS (1) | IS7121A (en) |
MA (1) | MA26126A1 (en) |
MX (1) | MXPA04000488A (en) |
NO (1) | NO20040232L (en) |
OA (1) | OA12699A (en) |
PL (1) | PL367366A1 (en) |
TN (1) | TNSN04012A1 (en) |
UA (1) | UA77186C2 (en) |
WO (1) | WO2003012649A2 (en) |
YU (1) | YU5404A (en) |
ZA (1) | ZA200400348B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2852415B1 (en) * | 2003-03-11 | 2005-06-24 | Actikey | KEY TYPE MEDIUM, CONTROL OF ACCESS TO DATA AND / OR SOFTWARE, AND CORRESPONDING METHOD |
CN107194212B (en) * | 2017-06-21 | 2020-04-17 | 株洲中车时代电气股份有限公司 | Method for protecting protocol content in source code of display |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2634917A1 (en) * | 1988-08-01 | 1990-02-02 | Pionchon Philippe | METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
WO1999001815A1 (en) * | 1997-06-09 | 1999-01-14 | Intertrust, Incorporated | Obfuscation techniques for enhancing software security |
WO1999066387A1 (en) * | 1998-06-12 | 1999-12-23 | Gemplus | Method for verifying the execution of a software product |
-
2001
- 2001-07-31 FR FR0110250A patent/FR2828305B1/en not_active Expired - Lifetime
-
2002
- 2002-04-07 UA UA2004010469A patent/UA77186C2/en unknown
- 2002-07-04 IL IL15995302A patent/IL159953A0/en unknown
- 2002-07-04 PL PL02367366A patent/PL367366A1/en not_active Application Discontinuation
- 2002-07-04 EP EP02760378A patent/EP1412861A2/en not_active Withdrawn
- 2002-07-04 JP JP2003517758A patent/JP3949107B2/en not_active Expired - Fee Related
- 2002-07-04 WO PCT/FR2002/002338 patent/WO2003012649A2/en active Application Filing
- 2002-07-04 MX MXPA04000488A patent/MXPA04000488A/en unknown
- 2002-07-04 AP APAP/P/2004/002958A patent/AP2004002958A0/en unknown
- 2002-07-04 GE GE5431A patent/GEP20053647B/en unknown
- 2002-07-04 CN CNB028146840A patent/CN1288525C/en not_active Expired - Fee Related
- 2002-07-04 AU AU2002325998A patent/AU2002325998B2/en not_active Ceased
- 2002-07-04 BR BR0211374-0A patent/BR0211374A/en not_active IP Right Cessation
- 2002-07-04 CA CA002454090A patent/CA2454090A1/en not_active Abandoned
- 2002-07-04 YU YU5404A patent/YU5404A/en unknown
- 2002-07-04 EA EA200400057A patent/EA005465B1/en not_active IP Right Cessation
- 2002-07-04 KR KR1020047000804A patent/KR100940347B1/en not_active Expired - Fee Related
- 2002-07-04 HU HU0400228A patent/HUP0400228A2/en unknown
- 2002-07-04 OA OA1200400013A patent/OA12699A/en unknown
-
2004
- 2004-01-16 ZA ZA2004/00348A patent/ZA200400348B/en unknown
- 2004-01-19 TN TNP2004000012A patent/TNSN04012A1/en unknown
- 2004-01-19 HR HR20040049A patent/HRP20040049A2/en not_active Application Discontinuation
- 2004-01-19 MA MA27492A patent/MA26126A1/en unknown
- 2004-01-19 CR CR7231A patent/CR7231A/en unknown
- 2004-01-19 NO NO20040232A patent/NO20040232L/en not_active Application Discontinuation
- 2004-01-20 CO CO04003765A patent/CO5550508A2/en not_active Application Discontinuation
- 2004-01-20 EC EC2004004951A patent/ECSP044951A/en unknown
- 2004-01-20 IS IS7121A patent/IS7121A/en unknown
-
2005
- 2005-03-30 HK HK05102678A patent/HK1070155A1/en unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2634917A1 (en) * | 1988-08-01 | 1990-02-02 | Pionchon Philippe | METHOD AND DEVICE FOR PROTECTING SOFTWARE, ESPECIALLY AGAINST UNAUTHORIZED COPIES |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
WO1999001815A1 (en) * | 1997-06-09 | 1999-01-14 | Intertrust, Incorporated | Obfuscation techniques for enhancing software security |
WO1999066387A1 (en) * | 1998-06-12 | 1999-12-23 | Gemplus | Method for verifying the execution of a software product |
Also Published As
Publication number | Publication date |
---|---|
BR0211374A (en) | 2004-07-20 |
CR7231A (en) | 2005-07-21 |
ECSP044951A (en) | 2004-04-28 |
GEP20053647B (en) | 2005-10-25 |
HRP20040049A2 (en) | 2004-06-30 |
CN1535410A (en) | 2004-10-06 |
CN1288525C (en) | 2006-12-06 |
PL367366A1 (en) | 2005-02-21 |
NO20040232L (en) | 2004-03-30 |
MXPA04000488A (en) | 2005-03-07 |
ZA200400348B (en) | 2005-03-30 |
KR100940347B1 (en) | 2010-02-04 |
EP1412861A2 (en) | 2004-04-28 |
CA2454090A1 (en) | 2003-02-13 |
IS7121A (en) | 2004-01-20 |
UA77186C2 (en) | 2006-11-15 |
OA12699A (en) | 2006-06-23 |
HK1070155A1 (en) | 2005-06-10 |
KR20040027881A (en) | 2004-04-01 |
HUP0400228A2 (en) | 2004-09-28 |
MA26126A1 (en) | 2004-04-01 |
AU2002325998B2 (en) | 2008-10-30 |
EA200400057A1 (en) | 2004-06-24 |
WO2003012649A2 (en) | 2003-02-13 |
YU5404A (en) | 2006-08-17 |
IL159953A0 (en) | 2004-06-20 |
FR2828305B1 (en) | 2010-09-03 |
JP2004537806A (en) | 2004-12-16 |
JP3949107B2 (en) | 2007-07-25 |
AP2004002958A0 (en) | 2004-03-31 |
CO5550508A2 (en) | 2005-08-31 |
FR2828305A1 (en) | 2003-02-07 |
TNSN04012A1 (en) | 2006-06-01 |
EA005465B1 (en) | 2005-02-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
MXPA02011835A (en) | Data protection system that protects data by encrypting the data. | |
AU2002241312A1 (en) | Data protection system that protects data by encrypting the data | |
AU2003227411A1 (en) | Processor system, task control method on computer system, computer program | |
HU0200434D0 (en) | Method to determine which requirements from a general requirements document apply to a specific situation, computer system for operating the method and computer-readable medium containing instructions for... | |
WO2002103532A3 (en) | Data processing method | |
WO2004095530A3 (en) | Adjoining adjacent coatings on an element | |
AU2002355533A1 (en) | Data processing system having an adaptive priority controller | |
WO2005022308A3 (en) | Systems and methods for a retail system | |
WO2006036320A3 (en) | System and method for creating a security application for programmable cryptography module | |
WO2002067090A3 (en) | System and method for selectively enabling and disabling access to software applications over a network | |
AU2002240697A1 (en) | Method for operating a distributed computer system | |
WO2003023701A3 (en) | Operating device | |
WO2003012649A3 (en) | Method for protecting a software using a so-called variable principle against its unauthorised use | |
WO2003012650A3 (en) | Method for protecting a software using a so-called temporal dissociation principle against its unauthorised use | |
GB2375841B (en) | Control for a machine such as an I.S. machine | |
AU2003300572A1 (en) | Quiet, vibration-free superimposed transmission for a superimposed steering system | |
WO2003012605A3 (en) | Method for protecting a software using a so-called elementary functions principle against its unauthorised use | |
GB2375835B (en) | Control for a machine such as an I.S. machine | |
GB2375843B (en) | Control for a machine such as an I.S machine | |
GB2375839B (en) | Control for a machine such as an I.S. machine | |
GB2375836B (en) | Control for a machine such as an I.S. machine | |
WO2003012374A3 (en) | Method for protecting a software using a so-called conditional jump principle against its unauthorised use | |
AU2002325998A1 (en) | Method for protecting a software using a so-called variable principle against its unauthorised use | |
GB0111291D0 (en) | Controlling system for subtitling software, and a method of using the system | |
AU2002953217A0 (en) | T.P.T. (Thought process technology) M.O.S./O.M.O. (Mind operated systems / open mind operations) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: P-54/04 Country of ref document: YU |
|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BY BZ CA CH CN CO CR CU CZ DE DM DZ EC EE ES FI GB GD GE GH HR HU ID IL IN IS JP KE KG KP KR LC LK LR LS LT LU LV MA MD MG MN MW MX MZ NO NZ OM PH PL PT RU SD SE SG SI SK SL TJ TM TN TR TZ UA UG US UZ VN YU ZA ZM |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ UG ZM ZW AM AZ BY KG KZ RU TJ TM AT BE BG CH CY CZ DK EE ES FI FR GB GR IE IT LU MC PT SE SK TR BF BJ CF CG CI GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2234/DELNP/2003 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2003517758 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: DZP2003000324 Country of ref document: DZ |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004/00348 Country of ref document: ZA Ref document number: PA/a/2004/000488 Country of ref document: MX Ref document number: 1200400052 Country of ref document: VN Ref document number: 1-2004-500083 Country of ref document: PH Ref document number: 200400348 Country of ref document: ZA Ref document number: 2454090 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020047000804 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: P20040049A Country of ref document: HR Ref document number: 159953 Country of ref document: IL |
|
WWE | Wipo information: entry into national phase |
Ref document number: 530683 Country of ref document: NZ Ref document number: 20028146840 Country of ref document: CN Ref document number: 5431 Country of ref document: GE Ref document number: 8014 Country of ref document: GE Ref document number: 200400057 Country of ref document: EA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002760378 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002325998 Country of ref document: AU |
|
WWP | Wipo information: published in national office |
Ref document number: 2002760378 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |