Source code transformation based on program operators

Electrical computers and digital processing systems: support – Data processing protection using cryptography – Computer instruction/address encryption

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C717S147000

Reexamination Certificate

active

07366914

ABSTRACT:
In one embodiment, the present invention may perform a transformation based on existing program operations or operators which may provide encrypting compiler-generated code for compilation with original source code, securing distributable content in hostile environments. As an example, use of compiler analysis and heuristics for pairing variables and identifying encryption/decryption points may protect distributable software, such as the compiled code from automated attacks. In one embodiment, pre-compiler software may dynamically obtain one or more program operators from the source code for applying data transformation based on custom ciphers to encrypt/decrypt data in between references to data variables in a particular portion of the source code, providing encrypting compiler-generated code for mixing with the source code prior to compilation into tamper-resistant object code.

REFERENCES:
patent: 4642764 (1987-02-01), Auslander et al.
patent: 5280613 (1994-01-01), Chan et al.
patent: 5339419 (1994-08-01), Chan et al.
patent: 6041122 (2000-03-01), Graunke et al.
patent: 6205550 (2001-03-01), Nardone et al.
patent: 6256577 (2001-07-01), Graunke
patent: 6477252 (2002-11-01), Faber et al.
patent: 6931634 (2005-08-01), Croix
patent: 2004/0115860 (2004-06-01), Johnson et al.
patent: 2005/0050355 (2005-03-01), Graunke
U.S. Appl. No. 10/355,967, filed Jan. 31, 2003, Graunke.
Ripley, Michael, et al. “Interoperable Home Infrastructure: Content Protection in the Digital Home”. Intel Technology Journal, vol. 6, Issue 04. pp. 49-56 Nov. 15, 2002.
Collberg, Christian S. “Watermarking, Tamper-Proofing, and Obfuscation—Tools for Software Protection”. IEEE Transactions on Software Engineering, vol. 28, No. 6. Jun. 2002.
Gaissarian, “Preliminary Report on Optimizing Compilers and Code Transformations”. pp. 1-38. Jun. 1, 2000.
Jacobson, “Planning Content Protection for PC DTV”. Intel Developer Magazine. pp. 1-6. Nov. 2001.
Intel Corporation, “Intel Renewable Authentication Agent System 1.2 Developer's Guide”. pp. 1-47. Apr. 1999.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Source code transformation based on program operators does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Source code transformation based on program operators, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Source code transformation based on program operators will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2784176

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.