Hardware protection

Information security – Prevention of unauthorized use of data including prevention...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S027000, C726S034000

Reexamination Certificate

active

07631360

ABSTRACT:
Tampering with pieces of software is inhibited. Hardware protection prevents hackers from forcing various pieces of software from running on unauthorized pieces of hardware. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided. Image verification ensures the originality of the pieces of software to be installed.

REFERENCES:
patent: 5748739 (1998-05-01), Press
patent: 5794232 (1998-08-01), Mahlum et al.
patent: 5802368 (1998-09-01), Grigsby et al.
patent: 5845129 (1998-12-01), Wendorf et al.
patent: 5915019 (1999-06-01), Ginter et al.
patent: 6006328 (1999-12-01), Drake
patent: 6236971 (2001-05-01), Stefik et al.
patent: 6731756 (2004-05-01), Pizano et al.
patent: 6978303 (2005-12-01), McCreesh et al.
patent: 7000100 (2006-02-01), Lacombe et al.
patent: 7146505 (2006-12-01), Harada et al.
patent: 7281271 (2007-10-01), Szor
patent: 7424615 (2008-09-01), Jalbert et al.
patent: 2001/0027383 (2001-10-01), Maliszewski
patent: 2002/0002678 (2002-01-01), Chow et al.
patent: 2002/0062451 (2002-05-01), Scheidt et al.
patent: 2003/0097577 (2003-05-01), Sotoodeh et al.
patent: 2003/0208562 (2003-11-01), Hauck et al.
patent: 2004/0107368 (2004-06-01), Colvin
patent: 2004/0158708 (2004-08-01), Peyravian et al.
patent: 2004/0260953 (2004-12-01), Jamieson et al.
patent: WO 99/01815 (1999-01-01), None
patent: WO 03/007571 (2003-02-01), None
Sorting It all Out, including a section on Julie Bennett, printed out in 2008.
Unicode Directors, listing Julie Bennett, printed out in 2008.
Code Integrity (ci.dll) Security Policy, printed out in 2008.
Description of El-Gammal, one of the inventors.
Collberg et al., Watermarking, Tamper-Proofing, and Obfuscation—Tools for Software Protection, IEEE Transactions on Software Engineering, vol. 28, Aug. 2002, pp. 735-746.
Library Support for Hierarchical Multi-Processor Tasks; Rauber, T.; Runger, G.; Supercomputing, ACM/IEEE 2002 Conference Nov. 16-22, 2002 pp. 45-45.
Building a parallel pipelined external memory algorithm library; Beckmann, A.; Dementiev, R.; Singler, J.; Parallel & Distributed Processing, 2009. IPDPS 2009. IEEE International Symposium on May 23-29, 2009 pp. 1-10.
A Data-Re-Distribution Library for Multi-Processor Task Programming; Rauber, T.; Runger, G.; Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE International Apr. 4-8, 2005 pp. 205a-205a.
Labir, E., “Unpacking by Code Injection,”The CodeBreakers Journal 1(2):1-16, 2004.
PCT/US05/20638, International Search Report and Written Opinion, Jan. 18, 2006.
“Library (computing),”Wikipedia, http://en.wikipedia.org/wiki/library—(computing) printed out in 2008 (pp. 1-8).
“List of Unicode Directors,”Unicode Consortium, http://unicode.org/consortium/directors.html, printed out in 2008, which includes Julie Bennett of Microsoft (pp. 1-9).
Baldi et al. “The TrustedFlow™ Protocol Idiosyncratic Signatures for Authenticated Execution” copyright 2002, presented in Jun. 2003 at West Point, New York (15 pages).
Eyers etal., “Compile-Time Enforcement of Dynamic Security Policies,”IEEE Workshop, pp. 119-126 (2008).
Jochen et al., “Towards the Safe Use of Dynamically Transformed Itinerant Software,”Univ. of Delaware(printed 2008) 7 pages.
Kaplan, Michael, “Lunch with Julie Bennett,”MSDN Blogs—Sorting it all Out, http://blogs.msdn.com/michkap/archive/2005/02/12/371650.aspx, printed out in 2008 (pp. 1-7) (see pp. 2 and 3).
Madou et al. “Software Protection Through Dynamic Code Mutation” In Information Security Applications, (2005) 371-385.
Memon et al., “Preventing Reverse Engineering Threat in Java Using Byte Code Obfuscation Techniques,”IEEE-ICET, pp. 689-694 (2006).
Microsoft, Creating and Using Dynamic Library, http://msdn.microsoft.com/en-us/library/ms235636(VS.80).aspx, printed out in 2008 (pp. 1-6).
Petkac et al., “Security Agility for Dynamic Execution Environments,”DARPA contract(printed 2008).
Preda et al., “Control Code Obfuscation by Abstract Interpretation,”IEEE, 10 pages (2005).
Udupa et al., Deobfuscation Reverse Engineering Obfuscated Code,IEEE, 10 pages (2005).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Hardware protection does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Hardware protection, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Hardware protection will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4094948

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.