Method and apparatus for watermarking binary computer code...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000

Reexamination Certificate

active

07617396

ABSTRACT:
A system and apparatus for inserting a watermark into a compiled computer program selectively replaces specified optimizations by non-optimized code to encode bit values of the watermark. The watermark is read by decoding the executable code and assigning the decoded bit values, determined by the presence or absence of optimized code, to bit positions in a signature.

REFERENCES:
patent: 4399467 (1983-08-01), Subramaniam
patent: 5265253 (1993-11-01), Yamada
patent: 5559884 (1996-09-01), Davidson et al.
patent: 5636292 (1997-06-01), Rhoads
patent: 6026193 (2000-02-01), Rhoads
patent: 6683546 (2004-01-01), Torrubia-Saez
patent: 6834343 (2004-12-01), Burns
Alan L. Cassel et al, Method for digitak watermarking of images and images produced thereby, (U.S. Appl. No. 10/195,233).
C Collberg, C Thomborson, D Low—Proc. ACM Symp. on Principles of Programming Languages, 1999—cs.arizona.edu, On the limits of software watermarking.
U Holzle, C Chambers, D Ungar—Proceedings of the ACM SIGPLAN, 1992, Debugging optimized code with dynamic deoptimization.
K Ishizaki, M Kawahito, T Yasue, M Takeuchi, T . . . —Java Grande, 1999—portal.acm.org, Design, Implementation, and Evaluation of Optimizations in a Just-in-Time Compiler.
RJ Anderson, FAP Petitcolas—Information Hiding, 1996—ftp.cl.cam.ac.uk, Stretching the Limits of Steganography.
M Franz—Mobile Object Systems, 1996—ics.uci.edu, Adaptive Compression of Syntax Trees and Iterative Dynamic Code Optimization: Two Basic Technologies for Mobile-Object Systems.
D Low—Crossroads, 1998—portal.acm.org, Protecting Java code via code obfuscation, C Collberg, S Jha, D Tomko, H Wang—cs.wisc.edu, Agust 31, 2001, UWStego: a General Architecture for Software Watemarking.
LL Pollock, ML Soffa—POPL 1985—portal.acm.org , Incremental Compilation of Locally Optimized Code.
A Monden, H lida, K Matsumoto, K Inoue, K Toni—Proc IEEE Comput Soc Int Comput Software Appl Conf. pp. 191 . . . -2000—se.aist-nara.ac.jp, A Practical Method for Watermarking Java Programs.
DF Bacon, SL Graham, OJ Sharp—ACM Computing Surveys, 1994, pp. 1 and 368-369—portal.acm.org, Compiler transformations for high-performance computing.
Julien P. Stern et al,Robust Object Watermarking: Application to Code, presented at the 1999 Workshop on Information Hiding; online Mar. 2, 2000, 24 pages; retrieved from the internet on Sep. 3, 2002: <URL:http://www.julienstern.org/files/codemark/>.
John Lach et al,Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware, presented at the 1999 Workshop on Information Hiding; 15 pages; retrieved from the Internet: <URL:http://citeseer.nj.nec.com/236547.html>.
John Lach et al,Robust FPGA Intellectual Properly Protection Through Multiple Small Watermarks; 6 pages; retrieved from the internet: <URL:http://citeseer.nj.nec.com/180592.html>.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for watermarking binary computer code... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for watermarking binary computer code..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for watermarking binary computer code... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4128991

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.