Software self-defense systems and methods

Data processing: software development – installation – and managem – Software program development tool – Testing or debugging

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C717S126000, C713S187000, C713S188000, C713S189000, C713S190000

Reexamination Certificate

active

07823135

ABSTRACT:
Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.

REFERENCES:
patent: 4827508 (1989-05-01), Shear
patent: 4977594 (1990-12-01), Shear
patent: 5050213 (1991-09-01), Shear
patent: 5249294 (1993-09-01), Griffin, III et al.
patent: 5410598 (1995-04-01), Shear
patent: 5530235 (1996-06-01), Stefik et al.
patent: 5534975 (1996-07-01), Stefik et al.
patent: 5629980 (1997-05-01), Stefik et al.
patent: 5634012 (1997-05-01), Stefik et al.
patent: 5638443 (1997-06-01), Stefik et al.
patent: 5715403 (1998-02-01), Stefik
patent: 5892899 (1999-04-01), Aucsmith et al.
patent: 5892900 (1999-04-01), Ginter et al.
patent: 5910987 (1999-06-01), Ginter et al.
patent: 5915019 (1999-06-01), Ginter et al.
patent: 5917912 (1999-06-01), Ginter et al.
patent: 5920861 (1999-07-01), Hall et al.
patent: 5933498 (1999-08-01), Schneck et al.
patent: 5940504 (1999-08-01), Griswold
patent: 5943422 (1999-08-01), Van Wie et al.
patent: 5949876 (1999-09-01), Ginter et al.
patent: 5982891 (1999-11-01), Ginter et al.
patent: 5999949 (1999-12-01), Crandall
patent: 6088452 (2000-07-01), Johnson et al.
patent: 6101605 (2000-08-01), Buer
patent: 6112181 (2000-08-01), Shear et al.
patent: 6138119 (2000-10-01), Hall et al.
patent: 6157721 (2000-12-01), Shear et al.
patent: 6185683 (2001-02-01), Ginter et al.
patent: 6192475 (2001-02-01), Wallace
patent: 6237786 (2001-05-01), Ginter et al.
patent: 6240185 (2001-05-01), Van Wie et al.
patent: 6253193 (2001-06-01), Ginter et al.
patent: 6292569 (2001-09-01), Shear et al.
patent: 6363486 (2002-03-01), Knapton, III
patent: 6363488 (2002-03-01), Ginter et al.
patent: 6389402 (2002-05-01), Ginter et al.
patent: 6427140 (2002-07-01), Ginter et al.
patent: 6449367 (2002-09-01), Van Wie et al.
patent: 6513118 (2003-01-01), Iwamura
patent: 6553497 (2003-04-01), Challener et al.
patent: 6594761 (2003-07-01), Chow et al.
patent: 6618484 (2003-09-01), Van Wie et al.
patent: 6640304 (2003-10-01), Ginter et al.
patent: 6658568 (2003-12-01), Ginter et al.
patent: 6668325 (2003-12-01), Collberg et al.
patent: 6779114 (2004-08-01), Chow et al.
patent: 6785815 (2004-08-01), Serret-Avila et al.
patent: 6832316 (2004-12-01), Sibert
patent: 6874087 (2005-03-01), Fetkovich et al.
patent: 6880149 (2005-04-01), Cronce
patent: 6938021 (2005-08-01), Shear et al.
patent: 6948070 (2005-09-01), Ginter et al.
patent: 6950867 (2005-09-01), Strohwig et al.
patent: 6959384 (2005-10-01), Serret-Avila
patent: 6961854 (2005-11-01), Serret-Avila et al.
patent: 7263722 (2007-08-01), Luo et al.
patent: 7353499 (2008-04-01), de Jong
patent: 7424620 (2008-09-01), de Jong
patent: 7430670 (2008-09-01), Horning et al.
patent: 2001/0042043 (2001-11-01), Shear et al.
patent: 2002/0023214 (2002-02-01), Shear et al.
patent: 2002/0048369 (2002-04-01), Ginter et al.
patent: 2002/0087859 (2002-07-01), Weeks et al.
patent: 2002/0112171 (2002-08-01), Ginter et al.
patent: 2002/0152173 (2002-10-01), Rudd
patent: 2003/0023856 (2003-01-01), Horne et al.
patent: 2003/0041239 (2003-02-01), Shear et al.
patent: 2003/0046244 (2003-03-01), Shear et al.
patent: 2003/0069748 (2003-04-01), Shear et al.
patent: 2003/0069749 (2003-04-01), Shear et al.
patent: 2003/0084003 (2003-05-01), Pinkas et al.
patent: 2003/0105721 (2003-06-01), Ginter et al.
patent: 2003/0163431 (2003-08-01), Ginter et al.
patent: 2004/0054630 (2004-03-01), Ginter et al.
patent: 2004/0059951 (2004-03-01), Pinkas et al.
patent: 2004/0073813 (2004-04-01), Pinkas et al.
patent: 2004/0103305 (2004-05-01), Ginter et al.
patent: 2004/0107356 (2004-06-01), Shamoon et al.
patent: 2004/0123129 (2004-06-01), Ginter et al.
patent: 2004/0133793 (2004-07-01), Ginter et al.
patent: 2005/0027871 (2005-02-01), Bradley et al.
patent: 2005/0050332 (2005-03-01), Serret-Avila et al.
patent: 2005/0060560 (2005-03-01), Sibert
patent: 2005/0060584 (2005-03-01), Ginter et al.
patent: 2005/0071653 (2005-03-01), de Jong
patent: 2005/0108555 (2005-05-01), Sibert
patent: 2005/0183072 (2005-08-01), Horning et al.
patent: 2005/0204348 (2005-09-01), Horning et al.
patent: 2005/0210275 (2005-09-01), Homing et al.
patent: 2007/0234070 (2007-10-01), Horning et al.
patent: 2009/0010423 (2009-01-01), Sibert
patent: 0 715 247 (1996-06-01), None
patent: WO 96/27155 (1996-09-01), None
patent: WO 97/43761 (1997-11-01), None
patent: WO 98/09209 (1998-03-01), None
patent: WO 98/10381 (1998-03-01), None
patent: WO 98/37481 (1998-08-01), None
patent: WO 99/01815 (1999-01-01), None
patent: WO 99/24928 (1999-05-01), None
patent: WO 99/48296 (1999-09-01), None
patent: WO 99/64973 (1999-12-01), None
patent: WO 00/75925 (2000-12-01), None
patent: WO 01/06374 (2001-01-01), None
patent: WO 01/09702 (2001-02-01), None
patent: WO 01/10076 (2001-02-01), None
Madou et al., “Software Protection through Dynamic Code Mutation”; In Proceedings of the 6th International Workshop on Information Security Applications, 2005.
Anckaert et al,“A Model for Self-Modifying Code”; Lecture Notes in Computer Science, Springer Berlin/Heidelberg, vol. 4437/2007; Sep. 14, 2007.
Sibert, O. et al., “Digibox: A Self-Protecting Container for Information Commerce,” Proceedings of the First USENIX Workshop on Electronic Commerce, Jul. 1995, 13 pages, New York, NY.
Sibert, O. et al., “Securing the Content, Not the Wire, for Information Commerce,” 1996, 12 pages, InterTrust Technologies Corporation.
Stefik, M., “Introduction to Knowledge Systems, Chapter 7: Classification,” 1995, pp. 543-607, Morgan Kaufmann Publishers, Inc., San Francisco, CA.
Stefik, M., “Letting Loose the Light: Igniting Commerce in Electronic Publication,” 1994-1995, 35 pages, Xerox PARC, Palo Alto, CA.
Stefik, M., “Letting Loose the Light: Igniting Commerce in Electronic Publication,” Internet Dreams: Archetypes, Myths, and Metaphors, 1996, pp. 219-253, Massachusetts Institute of Technology.
Stefik, M., “Trusted Systems,” Scientific American, Mar. 1997, pp. 78-81.
Office Action mailed Dec. 29, 2005, for U.S. Appl. No. 09/629,546, filed Jul. 31, 2000.
Office Action mailed Apr. 27, 2006, for U.S. Appl. No. 09/629,546, filed Jul. 31, 2000.
Advisory Action mailed Aug. 7, 2006, for U.S. Appl. No. 09/629,546, filed Jul. 31, 2000.
Office Action mailed Dec. 21, 2006, for U.S. Appl. No. 09/629,546, filed Jul. 31, 2000.
Office Action mailed May 18, 2007, for U.S. Appl. No. 09/629,546, filed Jul. 31, 2000.
Office Action mailed Dec. 31, 2007, for U.S. Appl. No. 09/629,546, filed Jul. 31, 2000.
Notice of Allowance mailed Apr. 17, 2008, for U.S. Appl. No. 09/629,546, filed Jul. 31, 2000.
Office Action mailed Jun. 29, 2009, for U.S. Appl. No. 11/128,097, filed May 11, 2005.
Collberg et al., “A Taxonomy of Obfuscating Transformations,” Jul. 1997, Technical Report #148, The University of Aukland; pp. 1-36.
O'Neill, “Teach Yourself JAVA,” Oct. 19, 1998; McGraw-Hill Companies, Inc., Chapter 9.
Sander et al., “Protecting Mobile Agents Against Malicious Hosts,” 1998, Lecture Notes in Computer Science vol. 1419.
Anckaert et al., “A Model for Self-Modifying Code,” Lecture Notes in Computer Science, Springer Berlin/Heidelberg, vol. 4437/2007 (Sep. 14, 2007).
Office Action mailed Oct. 27, 2009 for U.S. Appl.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Software self-defense systems and methods does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Software self-defense systems and methods, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Software self-defense systems and methods will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4218256

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.