Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate
2006-06-30
2010-06-01
Jung, David Y (Department: 2434)
Information security
Prevention of unauthorized use of data including prevention...
C713S189000, C717S136000, C717S139000
Reexamination Certificate
active
07730542
ABSTRACT:
A method for anti-piracy protection of a software application by obfuscation of the execution of portions of the applications code is described. The method includes providing a language specification and library to implement the functions of the language, providing a compiler to translate the language into byte codes, and providing an interpreter to execute the byte codes using the library. The method further includes providing the language specifications, library, compiler, interpreter, and instructions to a software publisher, where the software publisher embeds the library and interpreter in the application to be protected, and selects and prepares application code segments for processing into byte codes by the compiler. The application is then executed using the embedded library and interpreter, where the execution of the application is obfuscated by the use of byte codes.
REFERENCES:
patent: 5768596 (1998-06-01), Chow et al.
patent: 6282698 (2001-08-01), Baker et al.
patent: 6374402 (2002-04-01), Schmeidler et al.
patent: 6467052 (2002-10-01), Kaler et al.
patent: 6594761 (2003-07-01), Chow et al.
patent: 6609201 (2003-08-01), Folmsbee
patent: 6657961 (2003-12-01), Lauffenburger et al.
patent: 6704871 (2004-03-01), Kaplan et al.
patent: 6708273 (2004-03-01), Ober et al.
patent: 6742177 (2004-05-01), Dorak et al.
patent: 6763370 (2004-07-01), Schmeidler et al.
patent: 6862683 (2005-03-01), Wille et al.
patent: 6922782 (2005-07-01), Spyker et al.
Automatic Reverse Engineering of Malware Emulators; Sharif, M.; Lanzi, A.; Giffin, J.; Wenke Lee; Security and Privacy, 2009 30th IEEE Symposium on May 17-20, 2009 pp. 94-109.
An Inter-Classes Obfuscation Method for Java Program; Xuesong Zhang; Fengling He; Wanli Zuo; Information Security and Assurance, 2008. ISA 2008. International Conference on Apr. 24-26, 2008 pp. 360-365.
A study of the cache and branch performance issues with running Java on current hardware platforms; Hsieh, C.-H.A.; Conte, M.T.; Johnson, T.L.; Gyllenhaal, J.C.; Hwu, W.-M.W.; Compcon '97. Proceedings, IEEE Feb. 23-26, 1997 pp. 211-216.
Information Disclosure Statement Under 37 C.F.R. 1.97, filed in U.S. Appl. No. 10/177,499, on Sep. 5, 2002; Document executed by Paul A. Cronce on Aug. 30, 2002 (pp. 1-4).
Anderson Eric C.
Cronce Paul A.
Fontana Joseph M.
Convergent Law Group LLP
Jung David Y
Pace Anti-Piracy
LandOfFree
Protecting software from unauthorized use by converting... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Protecting software from unauthorized use by converting..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Protecting software from unauthorized use by converting... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4175844