AU2666595A - Method for preventing use of software on an unauthorized computer - Google Patents
Method for preventing use of software on an unauthorized computerInfo
- Publication number
- AU2666595A AU2666595A AU26665/95A AU2666595A AU2666595A AU 2666595 A AU2666595 A AU 2666595A AU 26665/95 A AU26665/95 A AU 26665/95A AU 2666595 A AU2666595 A AU 2666595A AU 2666595 A AU2666595 A AU 2666595A
- Authority
- AU
- Australia
- Prior art keywords
- software
- preventing use
- unauthorized computer
- unauthorized
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US26149694A | 1994-06-17 | 1994-06-17 | |
US261496 | 1994-06-17 | ||
PCT/CA1995/000354 WO1995035533A1 (en) | 1994-06-17 | 1995-06-16 | Method for preventing use of software on an unauthorized computer |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2666595A true AU2666595A (en) | 1996-01-15 |
Family
ID=22993565
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU26665/95A Abandoned AU2666595A (en) | 1994-06-17 | 1995-06-16 | Method for preventing use of software on an unauthorized computer |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2666595A (en) |
WO (1) | WO1995035533A1 (en) |
Families Citing this family (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6161179A (en) * | 1997-09-05 | 2000-12-12 | Wea Manufacturing, Inc. | Key-based protection method for light-readable discs |
US5991402A (en) * | 1997-09-23 | 1999-11-23 | Aegisoft Corporation | Method and system of dynamic transformation of encrypted material |
WO1999026123A1 (en) * | 1997-11-18 | 1999-05-27 | Christopher Benjamin Wakely | Improvements relating to software protection systems |
US6406336B1 (en) | 1998-01-20 | 2002-06-18 | Fci Americas Technology, Inc. | Contact with anti-skiving feature |
US7246246B2 (en) | 1998-04-17 | 2007-07-17 | Iomega Corporation | System for keying protected electronic data to particular media to prevent unauthorized copying using a compound key |
WO2000029928A1 (en) * | 1998-11-13 | 2000-05-25 | Iomega Corporation | System for keying protected electronic data to particular media using a compound key to prevent unauthorized copying |
GB9916432D0 (en) * | 1999-07-13 | 1999-09-15 | Microgaming Systems Ansalt | Identification of computers |
EP1297405A2 (en) * | 2000-04-28 | 2003-04-02 | Moldflow Corporation | Network enabled application software system and method |
US7039188B2 (en) | 2001-08-31 | 2006-05-02 | Oleg Saliahov | Optical disc authentication method and apparatus |
CA2318310A1 (en) * | 2000-09-01 | 2002-03-01 | Oleg Saliahov | Cd-disk identification through a pattern analysis |
JP3970040B2 (en) * | 2001-01-31 | 2007-09-05 | 株式会社ソニー・コンピュータエンタテインメント | Computer system and method of use thereof |
KR100792289B1 (en) * | 2001-07-13 | 2008-01-07 | 삼성전자주식회사 | Contents downloading system and method thereof |
US8087092B2 (en) | 2005-09-02 | 2011-12-27 | Uniloc Usa, Inc. | Method and apparatus for detection of tampering attacks |
WO2007088384A1 (en) * | 2006-02-03 | 2007-08-09 | British Telecommunications Public Limited Company | Software product authentication |
US8284929B2 (en) | 2006-09-14 | 2012-10-09 | Uniloc Luxembourg S.A. | System of dependant keys across multiple pieces of related scrambled information |
US7908662B2 (en) | 2007-06-21 | 2011-03-15 | Uniloc U.S.A., Inc. | System and method for auditing software usage |
US8160962B2 (en) | 2007-09-20 | 2012-04-17 | Uniloc Luxembourg S.A. | Installing protected software product using unprotected installation image |
US8464059B2 (en) * | 2007-12-05 | 2013-06-11 | Netauthority, Inc. | System and method for device bound public key infrastructure |
EP2260430A2 (en) | 2008-02-22 | 2010-12-15 | Uniloc Usa, Inc. | License auditing for distributed applications |
WO2010093683A2 (en) | 2009-02-10 | 2010-08-19 | Uniloc Usa, Inc. | Web content access using a client device identifier |
US9047458B2 (en) | 2009-06-19 | 2015-06-02 | Deviceauthority, Inc. | Network access protection |
US9047450B2 (en) | 2009-06-19 | 2015-06-02 | Deviceauthority, Inc. | Identification of embedded system devices |
US9633183B2 (en) | 2009-06-19 | 2017-04-25 | Uniloc Luxembourg S.A. | Modular software protection |
US8903653B2 (en) | 2009-06-23 | 2014-12-02 | Uniloc Luxembourg S.A. | System and method for locating network nodes |
US10068282B2 (en) | 2009-06-24 | 2018-09-04 | Uniloc 2017 Llc | System and method for preventing multiple online purchases |
US9075958B2 (en) | 2009-06-24 | 2015-07-07 | Uniloc Luxembourg S.A. | Use of fingerprint with an on-line or networked auction |
US8239852B2 (en) | 2009-06-24 | 2012-08-07 | Uniloc Luxembourg S.A. | Remote update of computers based on physical device recognition |
US9129097B2 (en) | 2009-06-24 | 2015-09-08 | Uniloc Luxembourg S.A. | Systems and methods for auditing software usage using a covert key |
US9141489B2 (en) | 2009-07-09 | 2015-09-22 | Uniloc Luxembourg S.A. | Failover procedure for server system |
US9082128B2 (en) | 2009-10-19 | 2015-07-14 | Uniloc Luxembourg S.A. | System and method for tracking and scoring user activities |
AU2011100168B4 (en) | 2011-02-09 | 2011-06-30 | Device Authority Ltd | Device-bound certificate authentication |
US9998914B2 (en) | 2014-04-16 | 2018-06-12 | Jamf Software, Llc | Using a mobile device to restrict focus and perform operations at another mobile device |
US9647897B2 (en) | 2014-08-20 | 2017-05-09 | Jamf Software, Llc | Dynamic grouping of managed devices |
US11392716B2 (en) | 2017-05-12 | 2022-07-19 | Jamf Software, Llc | Mobile device management at a healthcare facility |
CN110825639B (en) * | 2019-11-08 | 2023-01-31 | 西安雷风电子科技有限公司 | Tamper-resistant time software License verification method |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4796220A (en) * | 1986-12-15 | 1989-01-03 | Pride Software Development Corp. | Method of controlling the copying of software |
US5023907A (en) * | 1988-09-30 | 1991-06-11 | Apollo Computer, Inc. | Network license server |
JPH08504976A (en) * | 1992-09-21 | 1996-05-28 | ユニロック (シンガポール) プライベート リミテッド | Software registration system |
US5337357A (en) * | 1993-06-17 | 1994-08-09 | Software Security, Inc. | Method of software distribution protection |
-
1995
- 1995-06-16 WO PCT/CA1995/000354 patent/WO1995035533A1/en active Search and Examination
- 1995-06-16 AU AU26665/95A patent/AU2666595A/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
WO1995035533A1 (en) | 1995-12-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2666595A (en) | Method for preventing use of software on an unauthorized computer | |
AU9781298A (en) | System and method for computer operating system protection | |
AU4664397A (en) | Computer interface extension system and method | |
AU1829497A (en) | Method for stega-cipher protection of computer code | |
AU4568299A (en) | Method and apparatus for assessing the security of a computer system | |
AU3396395A (en) | Method of operating a computer system | |
AU699633B2 (en) | Data copyright management system | |
AU3415595A (en) | An object-oriented computer environment and related method | |
AU4036195A (en) | Unitary manual and software for computer system | |
AU1999499A (en) | Computer method and apparatus for interacting with a physical system | |
AU4389397A (en) | Method and system for ensuring the security of computer servers of games | |
AU5775898A (en) | Method, system and data structures for computer software application developmentand execution | |
AU1293997A (en) | System and method for accessing distributed data | |
AU1374495A (en) | Method and system for spatial accessing of time-based information | |
AU1936900A (en) | A system and method of obfuscating data | |
AU6103900A (en) | System and method for preventing detection of a selected process running on a computer | |
AU7127496A (en) | Computer system for data management and method for operating said system | |
AU3375997A (en) | Computer system with secured data paths and method of protection | |
AU2012599A (en) | Apparatus and method for initiating hardware priority management by software controlled register access | |
AU3873397A (en) | Method and system for testing computer system software | |
AU3552095A (en) | Self-calibrating data processors and methods for calibrating same | |
AU7375998A (en) | Method and apparatus for a host-based personal computer speakerphone | |
AU8166898A (en) | System and method for performing external procedure calls in heterogeneous computers | |
AU6750896A (en) | Processing apparatus and method and computer software therefor | |
AU4408197A (en) | A browsing system and method for computer information |