Electrical computers and digital processing systems: support – Data processing protection using cryptography – Computer instruction/address encryption
Reexamination Certificate
2008-04-29
2008-04-29
Barron, Jr., Gilberto (Department: 2132)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
Computer instruction/address encryption
C717S147000
Reexamination Certificate
active
07366914
ABSTRACT:
In one embodiment, the present invention may perform a transformation based on existing program operations or operators which may provide encrypting compiler-generated code for compilation with original source code, securing distributable content in hostile environments. As an example, use of compiler analysis and heuristics for pairing variables and identifying encryption/decryption points may protect distributable software, such as the compiled code from automated attacks. In one embodiment, pre-compiler software may dynamically obtain one or more program operators from the source code for applying data transformation based on custom ciphers to encrypt/decrypt data in between references to data variables in a particular portion of the source code, providing encrypting compiler-generated code for mixing with the source code prior to compilation into tamper-resistant object code.
REFERENCES:
patent: 4642764 (1987-02-01), Auslander et al.
patent: 5280613 (1994-01-01), Chan et al.
patent: 5339419 (1994-08-01), Chan et al.
patent: 6041122 (2000-03-01), Graunke et al.
patent: 6205550 (2001-03-01), Nardone et al.
patent: 6256577 (2001-07-01), Graunke
patent: 6477252 (2002-11-01), Faber et al.
patent: 6931634 (2005-08-01), Croix
patent: 2004/0115860 (2004-06-01), Johnson et al.
patent: 2005/0050355 (2005-03-01), Graunke
U.S. Appl. No. 10/355,967, filed Jan. 31, 2003, Graunke.
Ripley, Michael, et al. “Interoperable Home Infrastructure: Content Protection in the Digital Home”. Intel Technology Journal, vol. 6, Issue 04. pp. 49-56 Nov. 15, 2002.
Collberg, Christian S. “Watermarking, Tamper-Proofing, and Obfuscation—Tools for Software Protection”. IEEE Transactions on Software Engineering, vol. 28, No. 6. Jun. 2002.
Gaissarian, “Preliminary Report on Optimizing Compilers and Code Transformations”. pp. 1-38. Jun. 1, 2000.
Jacobson, “Planning Content Protection for PC DTV”. Intel Developer Magazine. pp. 1-6. Nov. 2001.
Intel Corporation, “Intel Renewable Authentication Agent System 1.2 Developer's Guide”. pp. 1-47. Apr. 1999.
Barron Jr. Gilberto
Intel Corporation
Perungavoor Venkat
Trop Pruner & Hu P.C.
LandOfFree
Source code transformation based on program operators does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Source code transformation based on program operators, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Source code transformation based on program operators will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2784176