Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2005-02-17
2009-06-23
Jung, David Y (Department: 2434)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C719S330000, C719S331000
Reexamination Certificate
active
07552337
ABSTRACT:
Tampering with pieces of software is inhibited. Service protection inhibits tampering by allowing various unauthorized services to execute. Profiles are stored in a central hierarchical database and such profiles are protected from tampering. The obfuscation of a software image so as to becloud the comprehension of hackers in reverse engineering pieces of software comprising the software image is provided.
REFERENCES:
patent: 5748739 (1998-05-01), Press
patent: 5794232 (1998-08-01), Mahlum et al.
patent: 5802368 (1998-09-01), Grigsby et al.
patent: 5845129 (1998-12-01), Wendorf et al.
patent: 5915019 (1999-06-01), Ginter et al.
patent: 6006328 (1999-12-01), Drake
patent: 6236971 (2001-05-01), Stefik et al.
patent: 6731756 (2004-05-01), Pizano et al.
patent: 6978303 (2005-12-01), McCreesh et al.
patent: 7000100 (2006-02-01), Lacombe et al.
patent: 7146505 (2006-12-01), Harada et al.
patent: 7281271 (2007-10-01), Szor
patent: 7424615 (2008-09-01), Jalbert et al.
patent: 2001/0027383 (2001-10-01), Maliszewski
patent: 2002/0002678 (2002-01-01), Chow et al.
patent: 2002/0062451 (2002-05-01), Scheidt et al.
patent: 2003/0097577 (2003-05-01), Sotoodeh et al.
patent: 2003/0208562 (2003-11-01), Hauck et al.
patent: 2004/0107368 (2004-06-01), Colvin
patent: 2004/0158708 (2004-08-01), Peyravian et al.
patent: 2004/0260953 (2004-12-01), Jamieson et al.
patent: WO 99/01815 (1999-01-01), None
patent: WO 03/007571 (2003-01-01), None
Microsoft, Creating and Using Dynamic Link Library, printed year 2008.
Towards the safe use of dynamically itinerant software Jochen, M.; Anteneh, A.A.; Pollock, L.L.; Marvel, L.M.; Military Communications Conference, 2005. MILCOM 2005. IEEE Oct. 17-20, 2005 pp. 272-278 vol. 1.
Compile-Time Enforcement of Dynamic Security Policies Eyers, D.M.; Srinivasan, S.; Moody, K.; Bacon, J.; Policies for Distributed Systems and Networks, 2008. Policy 2008. IEEE Workshop on Jun. 2-4, 2008 pp. 119-126.
Security agility for dynamic execution environments Petkac, M.; Badger, L.; Morrison, W.; DARPA Information Survivability Conference and Exposition, 2000. DISCEX '00. Proceedings vol. 1, Jan. 25-27, 2000 pp. 377-390 vol. 1.
Labir, E., “Unpacking by Code Injection,”The CodeBreakers Journal 1(2): Jan. 16, 2004
PCT/US05/20638, International Search Report and Written Opinion, Jan. 18, 2006.
“Code Integrity (ci.dll) Security Policy,” http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp890.pdf, printed out in 2008 (pp. 1-6).
“Description of El-Gammal (one of the inventors),” http://www.linkedin.com/pub/5/985/36, printed out in 2008 (pp. 1-2).
“Library (computing),”Wikipedia, http://en.wikipedia.org/wiki/library—(computing) pritned out in 2008 (pp. 1-8).
“List of Unicode Directors,”Unicode Consortium, http://unicode.org/consortium/directors.html, printed out in 2008, which includes Julie Bennett of Microsoft (pp. 1-9).
“Sorting it all Out,”MSDN Blogs, http://blogs.msdn.com/michkap/archive/2005/02/12/371650.aspx, including a section in Julie Bennett, printed out in 2008 (7 pages).
“Unicode Directors,”Unicode Consortium, http://unicode.org/consortium/directors.html, listing Julie Bennett, printed out in 2008 (pp. 1-9).
Baldi et al. “The TrustedFlow™ Protocol Idiosyncratic Signatures for Authenticated Execution” copyright 2002, presented in Jun. 2003 at West Point, New York (2 pages).
Kaplan, Michael, “Lunch with Julie Bennett,”MSDN Blogs—Sorting it all Out, http://blogs.msdn.com/michkap/archive/2005/02/12/371650.aspx, printed out in 2008 (pp. 1-7) (see pp. 2 and 3).
Madou et al. “Software Protection Through Dynamic Code Mutation” In Information Security Applications, (2005) (15 pages).
Memon et al., “Preventing Reverse Engineering Threat in Java Using Byte Code Obfuscation Techniques,”IEEE-ICET, pp. 689-694 (2006).
Preda et al., “Control Code Obfuscation by Abstract Interpretation,”IEEE, 10 pages (2005).
Udupa et al., Deobfuscation Reverse Engineering Obfuscated Code,IEEE, 10 pages (2006).
Bennett Julie D
Chu Frank Nian-Tzu
Earnshaw Simon D
El-Gammal Mohammed
Wu Wei
Jung David Y
Microsoft Corporation
Wolf Greenfield & Sacks P.C.
LandOfFree
Service protection does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Service protection, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Service protection will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4139967