Electrical computers and digital processing systems: support – Computer program modification detection by cryptography
Reexamination Certificate
2011-01-25
2011-01-25
Vu, Kimyen (Department: 2435)
Electrical computers and digital processing systems: support
Computer program modification detection by cryptography
C713S176000
Reexamination Certificate
active
07877613
ABSTRACT:
Techniques for using a class loader to protect mobile code against a malicious host. The techniques include using the class loader to extend a class used by the mobile code such that a method is added to the code which authenticates the mobile code. When executed, the method provides a dynamic watermark that authenticates the code. The method may be encrypted until it is added to the code. One such method uses a static watermark in the code to determine whether the code has been modified. The techniques also include using a class loader to extend the class such that obfuscated symbolic names in the program that correspond to symbolic names defined by the class can be resolved. A way of doing this is to include a first association between the obfuscated symbolic names and encrypted forms of the corresponding symbolic names in the program and to make a second association between the encrypted forms of the corresponding symbolic names and information used to resolve the symbolic names defined in the class. The loader then uses the first and second associations to resolve the obfuscated names.
REFERENCES:
patent: 4764959 (1988-08-01), Watanabe et al.
patent: 5287407 (1994-02-01), Holmes
patent: 5287408 (1994-02-01), Samson
patent: 5530752 (1996-06-01), Rubin
patent: 5559884 (1996-09-01), Davidson et al.
patent: 5613004 (1997-03-01), Cooperman et al.
patent: 5692047 (1997-11-01), McManis
patent: 5745569 (1998-04-01), Moskowitz et al.
patent: 5892899 (1999-04-01), Aucsmith et al.
patent: 6006328 (1999-12-01), Drake
patent: 6102966 (2000-08-01), Tyma
patent: 6591415 (2003-07-01), Torrubia-Saez
patent: 6647495 (2003-11-01), Takeuchi et al.
patent: 6668325 (2003-12-01), Collberg et al.
patent: 6820200 (2004-11-01), Takeuchi et al.
patent: 7305704 (2007-12-01), Ofek et al.
patent: 7343619 (2008-03-01), Ofek et al.
patent: 7590863 (2009-09-01), Lambert
patent: 2002/0055910 (2002-05-01), Durbin
patent: 2003/0074563 (2003-04-01), Spacey
patent: 2003/0177374 (2003-09-01), Yung et al.
patent: 2003/0177381 (2003-09-01), Ofek et al.
patent: 2003/0177391 (2003-09-01), Ofek et al.
patent: 875814 (1998-11-01), None
patent: 875815 (1998-11-01), None
patent: WO 97/04394 (1997-02-01), None
patent: WO 99/01815 (1999-01-01), None
patent: WO 99/13613 (1999-03-01), None
patent: WO 00/72112 (2000-11-01), None
patent: WO00/721112 (2000-11-01), None
E. Valdez and M. Yung. “Software DisEngineering: Program Hiding Architecture and Experiments” © 2000 Springer-Verlag Berlin Heidelberg. http://www.springerlink.com/content/m1267868I57h772w/fulltext.pdf.
J. Nagra et al. “A Functional Taxonomy for Software Watermarking” © 2001 Australian Computer Society.
“How to Write Doc Comments for the Javadoc Tool” Published Aug. 5, 2002 verified by the Internet Archive http://web.archive.org/web/20020805011049/http://java.sun.com/j2se/javadoc/writingdoccomments/.
Mahmoud, Qusay. “Java Tlp 22: Protect Your Bytecodes from Reverse Engineering/Decompilation” Published Jan. 1, 1997. http://www.javaworld.com/javatips/jw-javatip22.html.
Oaks, Scott. “Java Security” © 1998 O'Reilly Media Inc. Excerpt from chapter 3 (pp. 31-60).
Collberg & Thomborson, “Software Watermarking: Models and Dynamic Embeddings”, Department of Computer Science The Univ. of Auckland, Private Bag 92019, Auckland, NZ.
Collberg, Thomborson & Low, “A Taxonomy of Obfuscating Transformations”, Technical Report #148, Department of Computer Science The Univ. of Auckland, Private 92019, Auckland, NZ.
A, Monden, H. Iida, K. Matsumoto, K. Inoue, and K. Torii, “A Practical Method for Watermarking Java Programs”, In compsac2000, pp. 194-195.
A Monden, H. Iida, K. Matusmoto, K Inoue, and K. Torii, “Watermarking Java Programs,” in Proc. 4th International Symposium on Future Software Technology (ISFST'99), pp. 119-124.
Java Class Loading: The Basics—Developer.com.pdf http://www.developer.com/java/other/article.php/10936—22483—1/Java-Class—loading—The-Basics.htm [downloaded Oct. 5, 2009].
Cracking Java byte-code enryption, by Vladimir Roubtsov, JavaWorld.com, May 9, 2003 http://www.favaworld.com/javaworld/javaqa/2003-0509-jcrypt.html [downloaded Oct. 5, 2009].
Java Classloaders—Wikipedia, The Free Encyclpedia.pdf http://en.wikipedia.org/wiki/Java—classloaders [downloaded Oct. 5, 2009].
Palsberg, J. et al.; “Experience with software watermarking”; Dec. 11-15, 2000; Computer Security Applications 2000. ACSAC '00, 16th Annual Conf., New Orleans, LA, USA; IEEE Computer Society, Dec. 11, 2000, Los Alamitos, CA, USA pp. 308-316, XP010529828, ISBN 978-0-7695-0859-7.
Supplementary European Search Report for parallel application No. EP03794614, PCT/US0327693, said report mailed on Jun. 22, 2010, 4 pages.
A, Monden, H. !Ilda, K. Matsumoto, K. Inoue, and K. Torii, “A Practical Method for Watermarking Java Programs”, In compsac2000, pp. 194-195 (c) 2000 IEEE.
Fraunhofer-Gesellschaft zur Foerderung der angewandten Forschung
Glenn Michael A.
Glenn Patent Group
Gyorfi Thomas
Vu Kimyen
LandOfFree
Protecting mobile code against malicious hosts does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Protecting mobile code against malicious hosts, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Protecting mobile code against malicious hosts will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2666345