Information security – Access control or authentication – Network
Reexamination Certificate
2007-01-09
2007-01-09
Jung, David (Department: 2134)
Information security
Access control or authentication
Network
C726S021000, C726S027000
Reexamination Certificate
active
09905571
ABSTRACT:
When software is initially loaded to RAM20, an engine30A is installed at the beginning of an otherwise empty area of RAM20. When the protected application is called, the engine first creates a series of steps (FIG.3D), including a CALL command to a protection block38. On reaching the call36, the protection block38is executed, to complete various security checks. If these are successful, step2is created and written over the call36so that execution of steps2and3can continue as normal. Consequently, the protected software (steps1, 2and3) is not exposed to scrutiny unless the security checks have successfully been completed.
REFERENCES:
patent: 4120030 (1978-10-01), Johnstone
patent: 4525599 (1985-06-01), Curran et al.
patent: 4633388 (1986-12-01), Chiu
patent: 4634807 (1987-01-01), Chorley et al.
patent: 4847902 (1989-07-01), Hampson
patent: 4888802 (1989-12-01), Cooney
patent: 5081675 (1992-01-01), Kittirutsunetorn
patent: 5224166 (1993-06-01), Hartman, Jr.
patent: 5666411 (1997-09-01), McCarty
patent: 5982887 (1999-11-01), Hirotani
patent: 5995623 (1999-11-01), Kawano et al.
patent: 6006328 (1999-12-01), Drake
patent: 6052780 (2000-04-01), Glover
patent: 6185686 (2001-02-01), Glover
patent: 0 191 162 (1993-02-01), None
patent: 0 727 746 (1996-08-01), None
patent: 0 768 601 (1997-04-01), None
patent: 0 706 118 (2000-03-01), None
patent: 2 140 592 (1984-11-01), None
patent: 2330 932 (1999-05-01), None
patent: 00/26791 (2000-05-01), None
patent: 01/08345 (2001-02-01), None
e-NeXSh: achieving an effectively non-executable stack and heap via system-call policing Kc, G.S.; Keromytis, A.D.; Computer Security Applications Conference, 21st Annual Dec. 5-9, 2005 pp. 15.
Managing system and active-content integrity Michener, J.R.; Acar, T.; Computer vol. 33, Issue 7, Jul. 2000 pp. 108-110.
A method for detecting obfuscated calls in malicious binaries Arun Lakhotia; Eric Uday Kumar; Venable, M.; Software Engineering, IEEE Transactions on vol. 31, Issue 11, Nov. 2005 pp. 955-968.
Jung David
Simplex Major SDN.BHD
Smith-Hill and Bedell
LandOfFree
Digital data protection arrangement does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Digital data protection arrangement, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Digital data protection arrangement will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3760267