Interleaved data and instruction streams for application...

Electrical computers and digital processing systems: support – Data processing protection using cryptography – Computer instruction/address encryption

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S189000, C713S194000

Reexamination Certificate

active

07424620

ABSTRACT:
Executing an obfuscated application program comprises receiving an application program comprising application program instructions and application program data, determining an application program instruction location permutation to apply to a current instruction counter value, determining an application program data location permutation to apply to a current data location counter value, receiving the current instruction counter value, and applying the application program instruction location permutation to the current instruction counter value to obtain a reference to an application program instruction in an instruction stream to execute. If the application program instruction references application program data, the application program data location permutation is applied to data referenced by the application program instruction to obtain a reference to data to access. The data to access is interleaved with application program instructions in the instruction stream. The application program instruction is then executed.

REFERENCES:
patent: 4434436 (1984-02-01), Kleykamp et al.
patent: 5057997 (1991-10-01), Chang et al.
patent: 5136705 (1992-08-01), Stubbs et al.
patent: 5367687 (1994-11-01), Tarsy et al.
patent: 5463746 (1995-10-01), Brodnax et al.
patent: 5524256 (1996-06-01), Turkowski
patent: 5636352 (1997-06-01), Bealkowski et al.
patent: 5659754 (1997-08-01), Grove et al.
patent: 5819117 (1998-10-01), Hansen
patent: 5828853 (1998-10-01), Regal
patent: 5887161 (1999-03-01), Cheong et al.
patent: 5905876 (1999-05-01), Pawlowski et al.
patent: 5913064 (1999-06-01), Chen
patent: 5968164 (1999-10-01), Loen et al.
patent: 5999732 (1999-12-01), Bak et al.
patent: 6006328 (1999-12-01), Drake
patent: 6081665 (2000-06-01), Nilsen et al.
patent: 6098056 (2000-08-01), Rusnak et al.
patent: 6101606 (2000-08-01), Diersch et al.
patent: 6175925 (2001-01-01), Nardone et al.
patent: 6178509 (2001-01-01), Nardone et al.
patent: 6205550 (2001-03-01), Nardone et al.
patent: 6266416 (2001-07-01), Sigbjornsen et al.
patent: 6272616 (2001-08-01), Fernando et al.
patent: 6289455 (2001-09-01), Kocher et al.
patent: 6308256 (2001-10-01), Folmsbee
patent: 6334189 (2001-12-01), Granger et al.
patent: 6374402 (2002-04-01), Schmeidler et al.
patent: 6449721 (2002-09-01), Pensak et al.
patent: 6480959 (2002-11-01), Granger et al.
patent: 6594761 (2003-07-01), Chow et al.
patent: 6598166 (2003-07-01), Folmsbee
patent: 6609201 (2003-08-01), Folmsbee
patent: 6615350 (2003-09-01), Schell et al.
patent: 6640305 (2003-10-01), Kocher et al.
patent: 6643775 (2003-11-01), Granger et al.
patent: 6665796 (2003-12-01), Folmsbee
patent: 6668325 (2003-12-01), Collberg et al.
patent: 6668375 (2003-12-01), Leovac
patent: 6675298 (2004-01-01), Folmsbee
patent: 6694435 (2004-02-01), Kiddy
patent: 6757831 (2004-06-01), Folmsbee
patent: 6779114 (2004-08-01), Chow et al.
patent: 6789177 (2004-09-01), Okada
patent: 6842862 (2005-01-01), Chow et al.
patent: 6862683 (2005-03-01), Wille et al.
patent: 6871298 (2005-03-01), Cavanaugh et al.
patent: 6966002 (2005-11-01), Torrubia-Saez
patent: 6981217 (2005-12-01), Knauft et al.
patent: 7017188 (2006-03-01), Schmeidler et al.
patent: 7054443 (2006-05-01), Jakubowski et al.
patent: 7065652 (2006-06-01), Xu et al.
patent: 7073713 (2006-07-01), Silverbrook et al.
patent: 7080039 (2006-07-01), Marsh
patent: 7089594 (2006-08-01), Lal et al.
patent: 7111285 (2006-09-01), Smith et al.
patent: 7124445 (2006-10-01), Cronce et al.
patent: 7127712 (2006-10-01), Noble et al.
patent: 7150003 (2006-12-01), Naumovich et al.
patent: 7170999 (2007-01-01), Kessler et al.
patent: 7193482 (2007-03-01), Silverbrook
patent: 7201319 (2007-04-01), Silverbrook et al.
patent: 7322045 (2008-01-01), Kiddy
patent: 2002/0120854 (2002-08-01), LeVine et al.
patent: 2002/0184618 (2002-12-01), Bala et al.
patent: 2003/0018906 (2003-01-01), Smith et al.
patent: 2003/0093685 (2003-05-01), Tobin
patent: 2003/0123664 (2003-07-01), Pedlow et al.
patent: 2003/0172270 (2003-09-01), Newcombe et al.
patent: 2003/0177391 (2003-09-01), Ofek et al.
patent: 2003/0188187 (2003-10-01), Uchida
patent: 2003/0191938 (2003-10-01), Woods et al.
patent: 2003/0233542 (2003-12-01), Benaloh
patent: 2004/0003264 (2004-01-01), Zeman et al.
patent: 2004/0003278 (2004-01-01), Chen et al.
patent: 2004/0039932 (2004-02-01), Elazar et al.
patent: 2004/0103404 (2004-05-01), Naumovich et al.
patent: 2004/0151306 (2004-08-01), Kiddy
patent: 2004/0260933 (2004-12-01), Lee
patent: 2005/0002053 (2005-01-01), Meador et al.
patent: 2005/0015454 (2005-01-01), Goodman et al.
patent: 2005/0021995 (2005-01-01), Lal et al.
patent: 2005/0044359 (2005-02-01), Eriksson et al.
patent: 2005/0055564 (2005-03-01), Haselden et al.
patent: 2005/0102264 (2005-05-01), Nason et al.
patent: 2006/0026430 (2006-02-01), Luo
patent: 2006/0048228 (2006-03-01), Takemori et al.
patent: 2006/0218539 (2006-09-01), Stiemens et al.
patent: 2006/0271921 (2006-11-01), Cronce et al.
patent: 0 605 872 (1993-12-01), None
patent: 0 751 458 (1996-05-01), None
patent: 0 821 305 (1997-07-01), None
patent: 1 063 585 (2000-06-01), None
patent: WO 97/45817 (1996-05-01), None
patent: WO 98/59292 (1997-06-01), None
patent: WO 99/08188 (1997-08-01), None
patent: WO 99/08191 (1997-08-01), None
patent: WO 00/75760 (2000-12-01), None
patent: WO 01/79972 (2001-10-01), None
patent: WO 02/079955 (2002-10-01), None
patent: WO 2004/027678 (2004-04-01), None
Sun Microsystems Inc., Zhiqun Chen, “Java Card™ Technology for Smart Cards”, Jun. 2000, pp. 11-16.
Chi-Keung Luk et al., “Compiler-Based Prefetching for Recursive Data Structures”, Department of Computer Science, 1996, pp. 222-233.
Borislav Deianov, “Authentication-Lamport hash and biometrics”, printed from http://www.cs.cornell.edu/html/cs513-sp99/NL12.html, Mar. 4, 1999, pp. 1-3.
Oded Goldreich, “The Foundations of Modern Crytography”, Version Nr. 3.1, Department of Computer Science and Applied Mathematics, May 2, 1998, pp. 0-41.
Moni Naor et al., “Universal One-Way Hash Functions and their Cryptographic Applications”, Mar. 13, 1995, pp. 1-14.
George C. Necula et al., “Proof-Carrying Code”, School of Computer Science, Nov. 1996, pp. 1-60.
R. Rivest, “The MD4 Message-Digest Algorithm”, Request for Comments (RFC) 1320 MIT Laboratory for Computer Science and RSA Data Security , Inc., Apr. 1992, pp. 1-20.
R. Rivest, “The MD5 Message-Digest Algorithm”, Request for Comments (RFC) 1321 MIT Laboratory for Computer Science and RSA Data Security, Inc., Apr. 1992.
“Secure Hash Standard”, Federal Information Processing Standard Publication 180-1, Apr. 17, 1995.
“Smart Card Stage I Description”, Version 1.1, CDMA Development Group- Smart Card Team Document, May 22, 1996.
“Digital Cellular Telecommunications Systems(Phase 2+);AT Command Set for GSM Mobile Equipment(ME)”, ETSI TS 100 916 V7.4.0, 1998.
“Wireless Identity Module Pert: Security”, Version 12, Wireless Application Protocol WAP-260-WIM-20010712-a, Jul. 2001.
“3rdGeneration Partnership Project; Technical Specification Group Terminals; USIM and IC Card Requirements(Release 4)”, 3GPP TS 21.111 V4.0.0, 2001.
“3rdGeneration Partnership Project 2: Removable User Identity Module for Spread Spectum Systems”, 3GPP2 C.S0023-A, Version 1.0, Sep. 13, 2002, pp. 1-1-5-2, A1-A4.
Dean, Jeffrey, “ProfileMe: Hardware Support for Instruction-Level Profiling on Out-of-Order Processors”, IEEE 1072-4451/97 (SUN-P4929).
Collberg et al., “Breaking Abstractions and Unstructuring Data Structures”, IEEE 2005, pp. 1-12 [Online]. Retrieved on Sep. 13, 2005 from the Internet: URL:<http://ieeexplore.ieee.org/xpl/absprintf.jsp?arnumber=674154>.
Collberg et al., “A Taxonomy of Obfuscating Transformations”, 1997, pp. 1-36.
Mambo et al., “A Tentative Approach to Constructing Tamper-Resistant Software”, ACM 1998, pp. 23-33.
Low, “Protecting Java Code via Code Obfus

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Interleaved data and instruction streams for application... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Interleaved data and instruction streams for application..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Interleaved data and instruction streams for application... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3990753

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.