Authenticating executable code and executions thereof

Image analysis – Applications

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C382S232000, C713S168000, C713S187000, C713S188000, C713S189000, C717S171000, C717S176000, C726S022000, C726S026000, C380S277000

Reexamination Certificate

active

10019827

ABSTRACT:
The techniques for authenticating executable code employs keys (609) to modify the code (611). In static watermarking, the code is watermarked by using the key to determine positions in the executable code that will specify digits of a watermark value (607). Instructions are inserted at those positions as required to express the value. The inserted instructions do not affect the outputs from the code when the code is executed. The watermarked code is authenticated by using the key (609) to read the value and determining whether it is the proper value for that code. In dynamic watermarking, the code is watermarked using the key (607) to modify the program to produce execution state for an execution of the code that has properties that are determined by the key. Authentication is done by executing the code and comparing (621) the execution state that would have been produced if the program had been watermarked with the key.

REFERENCES:
patent: 5231668 (1993-07-01), Kravitz
patent: 5287407 (1994-02-01), Holmes
patent: 5287408 (1994-02-01), Samson
patent: 5343527 (1994-08-01), Moore
patent: 5559884 (1996-09-01), Davidson et al.
patent: 5606609 (1997-02-01), Houser et al.
patent: 5664018 (1997-09-01), Leighton
patent: 5745569 (1998-04-01), Moskowitz et al.
patent: 5751595 (1998-05-01), Beatty et al.
patent: 5757914 (1998-05-01), McManis
patent: 5822432 (1998-10-01), Moskowitz et al.
patent: 5892904 (1999-04-01), Atkinson et al.
patent: 5905800 (1999-05-01), Moskowitz et al.
patent: 6002772 (1999-12-01), Saito
patent: 6006328 (1999-12-01), Drake
patent: 6141756 (2000-10-01), Bright et al.
patent: 6209092 (2001-03-01), Linnartz
patent: 6298445 (2001-10-01), Shostack et al.
Collberg et al, Ataxonomy of Obfuscating Transformations, Jul. 1997, Technical Report #148, Department of Computer Science, The University of Aucland, pp. 1-36.
DIGIMARC Corporation, “Digimarc Watermarking Guide”, Digimarc Watermarking Guide, (c) Digimarc Corporation, 2004.
http:/www.byte,com/art/9701/sec18/art1.htm printed May 20, 2005.
E. Koch & J. Zhao, “Towards Robust and Hidden Image Copyright Labeling”, Procedures of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, Greece, 1995.
Christian Collberg and Clark Thomborson, “Software Watermarking: Models and Dynamic Embeddings”, Dept of Computer Science, The Univ. of Auckland, Jan. 1999.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Authenticating executable code and executions thereof does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Authenticating executable code and executions thereof, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authenticating executable code and executions thereof will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3836111

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.