Method and system for protecting software applications...

Data processing: software development – installation – and managem – Software program development tool – Translation of code

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S021000, C726S030000, C713S189000

Reexamination Certificate

active

07111285

ABSTRACT:
An application module is rewritten by overwriting executable code at identified authorization points with control transfers to a managed challenge system such that a rewritten application module results. The managed challenge system is constructed to include the overwritten executable code, and performs an authorization check upon acquiring control from an authorization point. The managed challenge system is linked to the rewritten application module.

REFERENCES:
patent: 5421015 (1995-05-01), Khoyi et al.
patent: 5485600 (1996-01-01), Joseph et al.
patent: 5805800 (1998-09-01), Kotani et al.
patent: 5925100 (1999-07-01), Drewry et al.
patent: 5953534 (1999-09-01), Romer et al.
patent: 5995969 (1999-11-01), Lee et al.
patent: 6006328 (1999-12-01), Drake
patent: 6141698 (2000-10-01), Krishnan et al.
patent: 6158049 (2000-12-01), Goodwin et al.
patent: 6173283 (2001-01-01), Kasso et al.
patent: 6247127 (2001-06-01), Vandergeest
patent: 6263491 (2001-07-01), Hunt
patent: 6301660 (2001-10-01), Benson
patent: 6317868 (2001-11-01), Grimm et al.
patent: 6330691 (2001-12-01), Buzbee et al.
patent: 6381735 (2002-04-01), Hunt
patent: 6389402 (2002-05-01), Ginter et al.
patent: 6405316 (2002-06-01), Krishnan et al.
patent: 6427140 (2002-07-01), Ginter et al.
patent: 6430561 (2002-08-01), Austel et al.
patent: 6487646 (2002-11-01), Adams et al.
patent: 6499137 (2002-12-01), Hunt
patent: 6519700 (2003-02-01), Ram et al.
patent: 6615350 (2003-09-01), Schell et al.
patent: 6629123 (2003-09-01), Hunt
patent: 6658658 (2003-12-01), Jones et al.
patent: 6668325 (2003-12-01), Collberg et al.
patent: 6681212 (2004-01-01), Zeng
patent: 6681331 (2004-01-01), Munson et al.
patent: 6711687 (2004-03-01), Sekiguchi
patent: 6775655 (2004-08-01), Peinado et al.
patent: 6779154 (2004-08-01), Nussbaum et al.
patent: 6801999 (2004-10-01), Venkatesan et al.
patent: 6802006 (2004-10-01), Bodrov
patent: 6874139 (2005-03-01), Krueger et al.
patent: 6885748 (2005-04-01), Wang
patent: 6895444 (2005-05-01), Weisshaar et al.
patent: 6920567 (2005-07-01), Doherty et al.
patent: 6952800 (2005-10-01), Danner et al.
patent: 6957422 (2005-10-01), Hunt
patent: 6965996 (2005-11-01), Hirano et al.
patent: 6976249 (2005-12-01), Stattenfield
patent: 6988271 (2006-01-01), Hunt
patent: 2001/0010046 (2001-07-01), Muyres et al.
patent: 2002/0016918 (2002-02-01), Tucker et al.
patent: 2002/0049603 (2002-04-01), Mehra et al.
patent: 2002/0065849 (2002-05-01), Ferguson et al.
patent: 2002/0069399 (2002-06-01), Miloushey et al.
patent: 2002/0083318 (2002-06-01), Larose
patent: 2002/0120924 (2002-08-01), Miloushev et al.
patent: 2002/0129054 (2002-09-01), Ferguson et al.
patent: 2002/0141582 (2002-10-01), Kocher et al.
patent: 2002/0141584 (2002-10-01), Razdan et al.
patent: 2002/0161996 (2002-10-01), Koved et al.
patent: 2002/0178244 (2002-11-01), Brittenham et al.
patent: 2002/0178254 (2002-11-01), Brittenham et al.
patent: 2003/0056205 (2003-03-01), Miloushev et al.
patent: 2003/0061566 (2003-03-01), Rubstein et al.
patent: 2003/0135850 (2003-07-01), Miloushev et al.
patent: 2004/0044779 (2004-03-01), Lambert
patent: 2004/0205690 (2004-10-01), Pieper
patent: 2004/0205720 (2004-10-01), Hundt
patent: 0 803 789 (1997-10-01), None
patent: 0 895 148 (1999-02-01), None
patent: WO99/01815 (1999-01-01), None
Collberg, C., et al., “A Taxonomy of Obfuscating Transformations,” (Report No. 148). Department of Computer Science, The University of Auckland: Auckland, New Zealand, Jul. 1997.
Kessler, P., “Fast Breakpoints: Design and Implementation.” Paper presented at the ACM SIGPLAN '90 Conference on Programming Language Design and Implementation, White Plains, NY (Jun. 20-22, 1990).
“Intel Architecture Software Developer's Manual” (vol. 2: Instruction Set Reference) [online], 1997. Retrieved from the Internet <URL: http://developer.intel.com/design/pentium/manuals/24319101.pdf>.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for protecting software applications... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for protecting software applications..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for protecting software applications... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3572791

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.