Image analysis – Applications
Reexamination Certificate
2007-06-26
2007-06-26
Mehta, Bhavesh M (Department: 2624)
Image analysis
Applications
C382S232000, C713S168000, C713S187000, C713S188000, C713S189000, C717S171000, C717S176000, C726S022000, C726S026000, C380S277000
Reexamination Certificate
active
10019827
ABSTRACT:
The techniques for authenticating executable code employs keys (609) to modify the code (611). In static watermarking, the code is watermarked by using the key to determine positions in the executable code that will specify digits of a watermark value (607). Instructions are inserted at those positions as required to express the value. The inserted instructions do not affect the outputs from the code when the code is executed. The watermarked code is authenticated by using the key (609) to read the value and determining whether it is the proper value for that code. In dynamic watermarking, the code is watermarked using the key (607) to modify the program to produce execution state for an execution of the code that has properties that are determined by the key. Authentication is done by executing the code and comparing (621) the execution state that would have been produced if the program had been watermarked with the key.
REFERENCES:
patent: 5231668 (1993-07-01), Kravitz
patent: 5287407 (1994-02-01), Holmes
patent: 5287408 (1994-02-01), Samson
patent: 5343527 (1994-08-01), Moore
patent: 5559884 (1996-09-01), Davidson et al.
patent: 5606609 (1997-02-01), Houser et al.
patent: 5664018 (1997-09-01), Leighton
patent: 5745569 (1998-04-01), Moskowitz et al.
patent: 5751595 (1998-05-01), Beatty et al.
patent: 5757914 (1998-05-01), McManis
patent: 5822432 (1998-10-01), Moskowitz et al.
patent: 5892904 (1999-04-01), Atkinson et al.
patent: 5905800 (1999-05-01), Moskowitz et al.
patent: 6002772 (1999-12-01), Saito
patent: 6006328 (1999-12-01), Drake
patent: 6141756 (2000-10-01), Bright et al.
patent: 6209092 (2001-03-01), Linnartz
patent: 6298445 (2001-10-01), Shostack et al.
Collberg et al, Ataxonomy of Obfuscating Transformations, Jul. 1997, Technical Report #148, Department of Computer Science, The University of Aucland, pp. 1-36.
DIGIMARC Corporation, “Digimarc Watermarking Guide”, Digimarc Watermarking Guide, (c) Digimarc Corporation, 2004.
http:/www.byte,com/art/9701/sec18/art1.htm printed May 20, 2005.
E. Koch & J. Zhao, “Towards Robust and Hidden Image Copyright Labeling”, Procedures of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, Greece, 1995.
Christian Collberg and Clark Thomborson, “Software Watermarking: Models and Dynamic Embeddings”, Dept of Computer Science, The Univ. of Auckland, Jan. 1999.
Luo Chenghui
Zhao Jian
Fraunhofer Gesellschaft
Mehta Bhavesh M
Nelson Gordon E.
Seth Manav
LandOfFree
Authenticating executable code and executions thereof does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Authenticating executable code and executions thereof, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authenticating executable code and executions thereof will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3836111