Electrical computers and digital processing systems: support – Computer program modification detection by cryptography
Reexamination Certificate
2007-10-23
2007-10-23
Barrón, Jr., Gilberto (Department: 2132)
Electrical computers and digital processing systems: support
Computer program modification detection by cryptography
C713S176000, C713S189000, C713S194000
Reexamination Certificate
active
10620534
ABSTRACT:
A method of protecting a software program from unauthorized modification, and a system for practicing the method. The method utilizes self-protecting software code. Armed internally with self-defensive mechanisms, a self-protecting software program is tamper-resistant. Whenever its integrity is compromised, a self-protecting software program may become unusable due to software program crashes or other errors, or may generate subtle errors that do not immediately result render the program unusable but still result in incorrect software program execution. A self-protecting software program also may be able to repair itself to restore the integrity of its damaged code. The system comprises a computer program for automatically adding self-protection features to a software program.
REFERENCES:
patent: 4120030 (1978-10-01), Johnstone
patent: 4465901 (1984-08-01), Best
patent: 5493649 (1996-02-01), Slivka et al.
patent: 5666411 (1997-09-01), McCarty
patent: 5684875 (1997-11-01), Ellenberger
patent: 5687191 (1997-11-01), Lee et al.
patent: 5737416 (1998-04-01), Cooper et al.
patent: 5745573 (1998-04-01), Lipner et al.
patent: 5748741 (1998-05-01), Johnson et al.
patent: 5822360 (1998-10-01), Lee et al.
patent: 5822517 (1998-10-01), Dotan
patent: 5892899 (1999-04-01), Aucsmith et al.
patent: 5892900 (1999-04-01), Gintner et al.
patent: 5933498 (1999-08-01), Schneck et al.
patent: 6006328 (1999-12-01), Drake
patent: 6044469 (2000-03-01), Horstmann
patent: 6052780 (2000-04-01), Glover
patent: 6055503 (2000-04-01), Horstmann
patent: 6061449 (2000-05-01), Candelore et al.
patent: 6088452 (2000-07-01), Johnson et al.
patent: 6119108 (2000-09-01), Holmes et al.
patent: 6134659 (2000-10-01), Sprong et al.
patent: 6138119 (2000-10-01), Hall et al.
patent: 6175925 (2001-01-01), Nardone et al.
patent: 6178509 (2001-01-01), Nardone et al.
patent: 6185683 (2001-02-01), Gintner et al.
patent: 6192475 (2001-02-01), Wallace
patent: 6205550 (2001-03-01), Nardone et al.
patent: 6237786 (2001-05-01), Gintner et al.
patent: 6334189 (2001-12-01), Granger et al.
patent: 6438432 (2002-08-01), Zimmermann et al.
patent: 6463538 (2002-10-01), Elteto
patent: 6480959 (2002-11-01), Granger et al.
patent: 6594761 (2003-07-01), Chow et al.
patent: 6668325 (2003-12-01), Collberg et al.
patent: 6779114 (2004-08-01), Chow et al.
patent: 6842862 (2005-01-01), Chow et al.
patent: 7054443 (2006-05-01), Jakubowski et al.
patent: 2005/0210275 (2005-09-01), Homing et al.
patent: WO97/15051 (1997-04-01), None
patent: WO99/01815 (1999-01-01), None
patent: WO99/64973 (1999-12-01), None
patent: WO 00/67095 (2000-11-01), None
patent: WO 00/77596 (2000-12-01), None
patent: WO 01/14953 (2001-03-01), None
Collberg et al. ;“A Taxonomy of Obfuscating Transformations”; Jul. 1997; Department of Computer Science, The University of Auckland; pp. 1-36.
Copy Protection Methods; http://www.erasmataz.com/library/JCGD—Volume—6/Copy—Protection.html; pp. 1-6; Author unknown, Dec. 27, 1997.
Cifuentes, Cristina, Structuring Decompiled Graphs, Proceedings of the International Conference on Computer Construction, pp. 91-105, Linkoping, Sweden, 1996.
Joepgen, Hans-Georg, and Krau—, Stefan, Rundum-Schutz durch Fertig-Programmbausteine, Elektronik 17/1993, pp. 52-56.
Larus, James, Whole Program Paths, SIGPLAN PLDI, May 1999.
Schulman, Andrew, Examining the Windows AARD Detection Code, Dr. Dobb's Journal, vol. 18, No. 19, Sep. 1993, pp. 42, 44-48, 89.
White, Steve R., and Comerford, Liam, ABYSS: An Architecture for Software Protection, IEEE Transactions on Software Engineering, vol. 16, No. 6, Jun. 1990, pp. 619-629.
Collberg, Thomborson and Low, A Taxonomy of Obfuscating Transformations, Technical Report 148, pp. 1-36, Jul. 1997.
Aucsmith, Tamper Resistant Software: An Implementation from Lecture Notes in Computer Science 1174, 1996, pp. 317-333.
Millen, Kernel Isolation for the PDP-11/70 from Proceedings of the 1982 Symposium on Security and Privacy, 1982, pp. 57-65.
Dwork, Lotspiech and Naor, Digital Signets: Self-Enforcing Protection of Digital Information (Preliminary Version), 1996, pp. 489-498.
Wood and Seidler, Security Modules: Potent Information Security System Components from Computers & Security, 1985, pp. 114-121.
Necula and Lee, Research on Proof-Carrying Code for Untrusted-Code Security from 1997 IEEE Symposium on Security and Privacy, 1997, p. 204.
Sander and Tschudin, Protecting Mobil Agents Against Malicious Hosts from Lecture Notes in Computer Science 1419, Mobile Agents and Security, 1998, pp. 44-60.
Mambo, Murayama and Okamoto, A Tentative Approach to Constructing Tamper-Resistant Software from New Security Paradigms Workshop, 1997, pp. 23-33.
Kahng, Mantik, Markov, Potkonjak, Tucker, Wang and Wolfe, Robust IP Watermarking Methodologies for Physical Design from Design Automation Conference, 1998, pp. 782-787.
Carolina, Software Protection Technology Legal Aspects of Software Protection Devices from the Computer Law and Security Report, 1995, pp. 188-193.
Larus and Schnarr, EEL: Machine-Independent Executable Editing, 1995, pp. 1-10.
Collberg, Thomborson and Low, Breaking Abstractions and Unstructuring Data Structures, pp. 1-11, 1998.
Collberg and Thomborson, Software Watermarking: Models and Dynamic Embeddings, pp. 1-14, 1999.
Bashar, Krisnan, Kuhn, Spafford and Wagstaff, Low-Threat Security Patches and Tools, pp. 1-8, Oct. 1997.
Collberg, Thomborson and Low, Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs, 1998, pp. 184-196.
Atallah, Mikhail J.; Pantazopolous, Konstatinos N.; and Spafford, Eugene H.; Secure Outsourcing of Some Computations; pp. 1-23, 1996.
Atallah Mikhail J.
Chang Hoi
Rice John R.
Barrón Jr. Gilberto
Bose McKinney & Evans LLP
Kim Jung
Purdue Research Foundation
LandOfFree
Guards for application in software tamperproofing does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Guards for application in software tamperproofing, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Guards for application in software tamperproofing will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3870591