Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2011-08-16
2011-08-16
Arani, Taghi T (Department: 2438)
Information security
Monitoring or scanning of software or data including attack...
C726S023000, C726S024000, C726S025000, C726S026000, C726S027000, C726S028000, C726S029000, C726S030000, C726S031000, C726S032000, C726S033000, C713S189000, C713S193000
Reexamination Certificate
active
08001596
ABSTRACT:
A method to apply a protection mechanism to a binary object includes using operating system resources to load a binary object from a storage medium along with a manifest and a digital signature. Authentication of the binary object is performed using the digital signature and the manifest is read to determine a category of protection for the binary object. The operating system selects a protection mechanism corresponding to the protection category and injects protection mechanism code, along with the binary object into a binary image on computer RAM. When the binary image is accessed, the protection mechanism executes and either allows full access and functionality to the binary object or prevents proper access and operation of the binary object. The protection mechanisms may be updated independently from the information on the storage medium.
REFERENCES:
patent: 5056009 (1991-10-01), Mizuta
patent: 5359659 (1994-10-01), Rosenthal
patent: 6023763 (2000-02-01), Grumstrup et al.
patent: 6044469 (2000-03-01), Horstmann
patent: 6463538 (2002-10-01), Elteto
patent: 6523119 (2003-02-01), Pavlin et al.
patent: 7093132 (2006-08-01), Aho et al.
patent: 2003/0217280 (2003-11-01), Keaton et al.
patent: 2003/0233564 (2003-12-01), LaRose et al.
patent: 2005/0198516 (2005-09-01), Marr
patent: 2007/0266434 (2007-11-01), Reifer
patent: 0 191 162 (1986-08-01), None
Handbook of Applied Cryptography by Menezes et al; Year: 1997; Publisher: CRC Press.
Erlingsson, U. et al., “XFI:Software Guards for System Address Spaces”, http://research.microsoft.com/users/mbudiu/osdi06.pdf, 14 pages.
Nanda, S. et al., “Foreign Code Detection on the Windows/X86 Platform”, http://www.acsac.org/2006/papers/86.pdf, 10 pages.
Hu, W. et al., “Secure and Practical Defense Against Code-Injection Attacks using Software Dynamic Translation”,VEE, 2006, http://www.cs.virginia.edu/papers/p2-hu.pdf, 2-12.
Bostanci Hakki Tunc
Goldsmid Aaron
McDowell John Richard
Wollnik Matthias
Zvi Nir Ben
Arani Taghi T
Herzog Madhuri
Microsoft Corporation
Woodcock & Washburn LLP
LandOfFree
Software protection injection at load time does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Software protection injection at load time, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Software protection injection at load time will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2789467