Digital data protection arrangement

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S021000, C726S027000

Reexamination Certificate

active

09905571

ABSTRACT:
When software is initially loaded to RAM20, an engine30A is installed at the beginning of an otherwise empty area of RAM20. When the protected application is called, the engine first creates a series of steps (FIG.3D), including a CALL command to a protection block38. On reaching the call36, the protection block38is executed, to complete various security checks. If these are successful, step2is created and written over the call36so that execution of steps2and3can continue as normal. Consequently, the protected software (steps1, 2and3) is not exposed to scrutiny unless the security checks have successfully been completed.

REFERENCES:
patent: 4120030 (1978-10-01), Johnstone
patent: 4525599 (1985-06-01), Curran et al.
patent: 4633388 (1986-12-01), Chiu
patent: 4634807 (1987-01-01), Chorley et al.
patent: 4847902 (1989-07-01), Hampson
patent: 4888802 (1989-12-01), Cooney
patent: 5081675 (1992-01-01), Kittirutsunetorn
patent: 5224166 (1993-06-01), Hartman, Jr.
patent: 5666411 (1997-09-01), McCarty
patent: 5982887 (1999-11-01), Hirotani
patent: 5995623 (1999-11-01), Kawano et al.
patent: 6006328 (1999-12-01), Drake
patent: 6052780 (2000-04-01), Glover
patent: 6185686 (2001-02-01), Glover
patent: 0 191 162 (1993-02-01), None
patent: 0 727 746 (1996-08-01), None
patent: 0 768 601 (1997-04-01), None
patent: 0 706 118 (2000-03-01), None
patent: 2 140 592 (1984-11-01), None
patent: 2330 932 (1999-05-01), None
patent: 00/26791 (2000-05-01), None
patent: 01/08345 (2001-02-01), None
e-NeXSh: achieving an effectively non-executable stack and heap via system-call policing Kc, G.S.; Keromytis, A.D.; Computer Security Applications Conference, 21st Annual Dec. 5-9, 2005 pp. 15.
Managing system and active-content integrity Michener, J.R.; Acar, T.; Computer vol. 33, Issue 7, Jul. 2000 pp. 108-110.
A method for detecting obfuscated calls in malicious binaries Arun Lakhotia; Eric Uday Kumar; Venable, M.; Software Engineering, IEEE Transactions on vol. 31, Issue 11, Nov. 2005 pp. 955-968.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Digital data protection arrangement does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Digital data protection arrangement, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Digital data protection arrangement will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3760267

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.