Data processing: software development – installation – and managem – Software program development tool – Translation of code
Reexamination Certificate
2006-09-19
2006-09-19
Zhen, Wei (Department: 2191)
Data processing: software development, installation, and managem
Software program development tool
Translation of code
C726S021000, C726S030000, C713S189000
Reexamination Certificate
active
07111285
ABSTRACT:
An application module is rewritten by overwriting executable code at identified authorization points with control transfers to a managed challenge system such that a rewritten application module results. The managed challenge system is constructed to include the overwritten executable code, and performs an authorization check upon acquiring control from an authorization point. The managed challenge system is linked to the rewritten application module.
REFERENCES:
patent: 5421015 (1995-05-01), Khoyi et al.
patent: 5485600 (1996-01-01), Joseph et al.
patent: 5805800 (1998-09-01), Kotani et al.
patent: 5925100 (1999-07-01), Drewry et al.
patent: 5953534 (1999-09-01), Romer et al.
patent: 5995969 (1999-11-01), Lee et al.
patent: 6006328 (1999-12-01), Drake
patent: 6141698 (2000-10-01), Krishnan et al.
patent: 6158049 (2000-12-01), Goodwin et al.
patent: 6173283 (2001-01-01), Kasso et al.
patent: 6247127 (2001-06-01), Vandergeest
patent: 6263491 (2001-07-01), Hunt
patent: 6301660 (2001-10-01), Benson
patent: 6317868 (2001-11-01), Grimm et al.
patent: 6330691 (2001-12-01), Buzbee et al.
patent: 6381735 (2002-04-01), Hunt
patent: 6389402 (2002-05-01), Ginter et al.
patent: 6405316 (2002-06-01), Krishnan et al.
patent: 6427140 (2002-07-01), Ginter et al.
patent: 6430561 (2002-08-01), Austel et al.
patent: 6487646 (2002-11-01), Adams et al.
patent: 6499137 (2002-12-01), Hunt
patent: 6519700 (2003-02-01), Ram et al.
patent: 6615350 (2003-09-01), Schell et al.
patent: 6629123 (2003-09-01), Hunt
patent: 6658658 (2003-12-01), Jones et al.
patent: 6668325 (2003-12-01), Collberg et al.
patent: 6681212 (2004-01-01), Zeng
patent: 6681331 (2004-01-01), Munson et al.
patent: 6711687 (2004-03-01), Sekiguchi
patent: 6775655 (2004-08-01), Peinado et al.
patent: 6779154 (2004-08-01), Nussbaum et al.
patent: 6801999 (2004-10-01), Venkatesan et al.
patent: 6802006 (2004-10-01), Bodrov
patent: 6874139 (2005-03-01), Krueger et al.
patent: 6885748 (2005-04-01), Wang
patent: 6895444 (2005-05-01), Weisshaar et al.
patent: 6920567 (2005-07-01), Doherty et al.
patent: 6952800 (2005-10-01), Danner et al.
patent: 6957422 (2005-10-01), Hunt
patent: 6965996 (2005-11-01), Hirano et al.
patent: 6976249 (2005-12-01), Stattenfield
patent: 6988271 (2006-01-01), Hunt
patent: 2001/0010046 (2001-07-01), Muyres et al.
patent: 2002/0016918 (2002-02-01), Tucker et al.
patent: 2002/0049603 (2002-04-01), Mehra et al.
patent: 2002/0065849 (2002-05-01), Ferguson et al.
patent: 2002/0069399 (2002-06-01), Miloushey et al.
patent: 2002/0083318 (2002-06-01), Larose
patent: 2002/0120924 (2002-08-01), Miloushev et al.
patent: 2002/0129054 (2002-09-01), Ferguson et al.
patent: 2002/0141582 (2002-10-01), Kocher et al.
patent: 2002/0141584 (2002-10-01), Razdan et al.
patent: 2002/0161996 (2002-10-01), Koved et al.
patent: 2002/0178244 (2002-11-01), Brittenham et al.
patent: 2002/0178254 (2002-11-01), Brittenham et al.
patent: 2003/0056205 (2003-03-01), Miloushev et al.
patent: 2003/0061566 (2003-03-01), Rubstein et al.
patent: 2003/0135850 (2003-07-01), Miloushev et al.
patent: 2004/0044779 (2004-03-01), Lambert
patent: 2004/0205690 (2004-10-01), Pieper
patent: 2004/0205720 (2004-10-01), Hundt
patent: 0 803 789 (1997-10-01), None
patent: 0 895 148 (1999-02-01), None
patent: WO99/01815 (1999-01-01), None
Collberg, C., et al., “A Taxonomy of Obfuscating Transformations,” (Report No. 148). Department of Computer Science, The University of Auckland: Auckland, New Zealand, Jul. 1997.
Kessler, P., “Fast Breakpoints: Design and Implementation.” Paper presented at the ACM SIGPLAN '90 Conference on Programming Language Design and Implementation, White Plains, NY (Jun. 20-22, 1990).
“Intel Architecture Software Developer's Manual” (vol. 2: Instruction Set Reference) [online], 1997. Retrieved from the Internet <URL: http://developer.intel.com/design/pentium/manuals/24319101.pdf>.
Bala Vasanth
Smith Michael D.
Chow Chih-Ching
Hamilton Brook Smith & Reynolds P.C.
Liquid Machines, Inc.
Zhen Wei
LandOfFree
Method and system for protecting software applications... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for protecting software applications..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for protecting software applications... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3572791