VALIDY has a total of 126 patent applications. Its first patent ever was published in 2000. It filed its patents most often in EPO (European Patent Office), Canada and Mexico. Its main competitors in its focus markets computer technology, digital networks and it methods for management are CONCURIX CORP, SIGMA COMPUTING INC and WIBU SYSTEMS AG.
# | Country | Total Patents | |
---|---|---|---|
#1 | EPO (European Patent Office) | 10 | |
#2 | Canada | 8 | |
#3 | Mexico | 8 | |
#4 | China | 7 | |
#5 | Hong Kong | 7 | |
#6 | WIPO (World Intellectual Property Organization) | 7 | |
#7 | Brazil | 6 | |
#8 | France | 6 | |
#9 | Croatia | 6 | |
#10 | Hungary | 6 | |
#11 | Israel | 6 | |
#12 | Morocco | 6 | |
#13 | Poland | 6 | |
#14 | Tunisia | 6 | |
#15 | South Africa | 6 | |
#16 | Yugoslavia (Serbia and Montenegro) | 5 | |
#17 | Australia | 3 | |
#18 | United States | 3 | |
#19 | African Regional Industrial Property Organization | 2 | |
#20 | EAPO (Eurasian Patent Organization) | 2 | |
#21 | Ecuador | 2 | |
#22 | Georgia | 2 | |
#23 | African Intellectual Property Organization | 2 | |
#24 | Colombia | 1 | |
#25 | Costa Rica | 1 | |
#26 | Iceland | 1 | |
#27 | Serbia | 1 |
# | Industry | |
---|---|---|
#1 | Computer technology | |
#2 | Digital networks | |
#3 | IT methods for management | |
#4 | Control |
# | Technology | |
---|---|---|
#1 | Electric digital data processing | |
#2 | Digital information transmission | |
#3 | Data processing systems | |
#4 | Coin-freed |
# | Name | Total Patents |
---|---|---|
#1 | Sgro Gilles | 97 |
#2 | Cuenod Jean-Christophe | 84 |
#3 | Gilles Sgro | 16 |
#4 | Cuenod Jean Christophe | 11 |
#5 | Jean Christophe Cuenod | 7 |
#6 | Sgro Jean-Christophe Cuenod Gi | 3 |
#7 | Cuendod Jean-Christophe | 2 |
#8 | Sgro Jean-Christophe Cuenod Gl | 1 |
#9 | Gilles Cuenod Jean-Christophe | 1 |
#10 | Jean-Christophe Cuenod | 1 |
Publication | Filing date | Title |
---|---|---|
CN1483272A | Method of restricting access, for the benefit of authorised users, to resources belonging to interactive services with at least one package of services | |
FR2828305A1 | Method for protecting software using a principle said "variable" against its unauthorized use | |
FR2828302A1 | Method for protecting software using a principle said "conditional connection" against its unauthorized use | |
FR2828300A1 | Method for protecting software using a principle of "elementary functions" against its unauthorized use | |
FR2828303A1 | Method for protecting software using a principle of "renaming" against its unauthorized use | |
FR2828301A1 | Method for protecting software using a principle of "detection and coercition" against its unauthorized use | |
FR2828304A1 | Method for protecting software using a principle of "time dissociation" against its unauthorized use | |
US7096361B2 | Method and system for limiting the possibility of transforming data designed to constitute, in particular pre-payment tokens | |
EP1185913A1 | Method for securing the use of software from a central processing unit and secret storage unit and system therefor | |
US7174464B1 | Method of making a user piece of software secure by means of a processing and secret memorizing unit, and a system constituting an application thereof |