Protecting software from unauthorized use by converting...

Information security – Prevention of unauthorized use of data including prevention...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S189000, C717S136000, C717S139000

Reexamination Certificate

active

07730542

ABSTRACT:
A method for anti-piracy protection of a software application by obfuscation of the execution of portions of the applications code is described. The method includes providing a language specification and library to implement the functions of the language, providing a compiler to translate the language into byte codes, and providing an interpreter to execute the byte codes using the library. The method further includes providing the language specifications, library, compiler, interpreter, and instructions to a software publisher, where the software publisher embeds the library and interpreter in the application to be protected, and selects and prepares application code segments for processing into byte codes by the compiler. The application is then executed using the embedded library and interpreter, where the execution of the application is obfuscated by the use of byte codes.

REFERENCES:
patent: 5768596 (1998-06-01), Chow et al.
patent: 6282698 (2001-08-01), Baker et al.
patent: 6374402 (2002-04-01), Schmeidler et al.
patent: 6467052 (2002-10-01), Kaler et al.
patent: 6594761 (2003-07-01), Chow et al.
patent: 6609201 (2003-08-01), Folmsbee
patent: 6657961 (2003-12-01), Lauffenburger et al.
patent: 6704871 (2004-03-01), Kaplan et al.
patent: 6708273 (2004-03-01), Ober et al.
patent: 6742177 (2004-05-01), Dorak et al.
patent: 6763370 (2004-07-01), Schmeidler et al.
patent: 6862683 (2005-03-01), Wille et al.
patent: 6922782 (2005-07-01), Spyker et al.
Automatic Reverse Engineering of Malware Emulators; Sharif, M.; Lanzi, A.; Giffin, J.; Wenke Lee; Security and Privacy, 2009 30th IEEE Symposium on May 17-20, 2009 pp. 94-109.
An Inter-Classes Obfuscation Method for Java Program; Xuesong Zhang; Fengling He; Wanli Zuo; Information Security and Assurance, 2008. ISA 2008. International Conference on Apr. 24-26, 2008 pp. 360-365.
A study of the cache and branch performance issues with running Java on current hardware platforms; Hsieh, C.-H.A.; Conte, M.T.; Johnson, T.L.; Gyllenhaal, J.C.; Hwu, W.-M.W.; Compcon '97. Proceedings, IEEE Feb. 23-26, 1997 pp. 211-216.
Information Disclosure Statement Under 37 C.F.R. 1.97, filed in U.S. Appl. No. 10/177,499, on Sep. 5, 2002; Document executed by Paul A. Cronce on Aug. 30, 2002 (pp. 1-4).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Protecting software from unauthorized use by converting... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Protecting software from unauthorized use by converting..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Protecting software from unauthorized use by converting... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4175844

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.