Electrical computers and digital processing systems: support – Data processing protection using cryptography
Reexamination Certificate
2006-12-12
2006-12-12
Barrón, Jr., Gilberto (Department: 2132)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
C713S187000, C713S194000, C717S124000, C717S129000, C726S022000, C726S026000
Reexamination Certificate
active
07149900
ABSTRACT:
Deterring an attack on a tamper-resistant application program may be accomplished by loading a plurality of agents and starting a plurality of processing threads, each thread executing one of the agents, concurrently executing each agent substantially in parallel to produce a processing result for each agent for an iteration of a stage of protocol processing, storing each processing result in an entry in a buffer associated with each agent, and repeating the executing and storing actions for multiple iterations of the protocol processing. When one of the agents stores a processing result in a last entry of the agent's buffer, the processing results from the first entries in the buffers are combined to produce a combined result, and if the combined result indicates an error, failure semantics may be executed.
REFERENCES:
patent: 5892899 (1999-04-01), Aucsmith et al.
patent: 5892900 (1999-04-01), Ginter et al.
patent: 6105137 (2000-08-01), Graunke et al.
patent: 6178509 (2001-01-01), Nardone et al.
patent: 6205550 (2001-03-01), Nardone et al.
patent: 6330670 (2001-12-01), England et al.
patent: 6795845 (2004-09-01), Kalafatis et al.
patent: 2002/0042884 (2002-04-01), Wu et al.
patent: 2002/0049909 (2002-04-01), Jackson et al.
patent: 2002/0166085 (2002-11-01), Peikari
patent: WO 99/01815 (1999-01-01), None
S. I Hyder, et al., “A Unified Model for Concurrent Debugging,” International Conference on Parallel Processing, 1993, pp. II-58-II-67, USA.
Peter A. Buhr, et al., “KDB: A Multi-Threaded Debugger for Multi-Threaded Applications,” SPDT '96, pp. 80-87, Philadelphia, Pa, USA.
Michael B. Jones, et al., “CPU Reservations and Time Constraints: Efficient, Predictable Scheduling of Independent Activities,” SOSP-16, Oct. 1997, pp. 198-211 Saint-Malo, France.
Partha Pal, et al., “Survival by Defense-Enabling,” NSPW'01, Sep. 10-13th, 2002 pp. 71-78, Cloudcroft, New Mexico, USA.
Barrón Jr. Gilberto
Herring Virgil
Skabrat Steven P.
LandOfFree
Method of defending software from debugger attacks does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method of defending software from debugger attacks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of defending software from debugger attacks will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3688482