Tamper resistant software encoding

Electrical computers and digital processing systems: support – Data processing protection using cryptography – Computer instruction/address encryption

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S189000, C713S194000, C713S152000, C713S152000, C713S165000, C713S166000, C713S187000

Reexamination Certificate

active

06842862

ABSTRACT:
The present invention relates generally to computer software, and more specifically, to a method and system of making computer software resistant to tampering and reverse-engineering. “Tampering” occurs when an attacker makes unauthorized changes to a computer software program such as overcoming password access, copy protection or timeout algorithms. Broadly speaking, the method of the invention is to increase the tamper-resistance and obscurity of computer software code by transforming the data flow of the computer software so that the observable operation is dissociated from the intent of the original software code. This way, the attacker can not understand and decode the data flow by observing the execution of the code. A number of techniques for performing the invention are given, including encoding software arguments using polynomials, prime number residues, converting variables to new sets of boolean variables, and defining variables on a new n-dimensional vector space.

REFERENCES:
patent: 5123045 (1992-06-01), Ostrovsky et al.
patent: 5509070 (1996-04-01), Schull
patent: 5659754 (1997-08-01), Grove et al.
patent: 5666411 (1997-09-01), McCarty
patent: 5748741 (1998-05-01), Johnson et al.
patent: 5768596 (1998-06-01), Chow et al.
patent: 0774714 (1997-05-01), None
patent: 0774714 (1999-06-01), None
patent: WO 9704394 (1997-02-01), None
patent: WO 9833296 (1998-07-01), None
patent: WO 9901815 (1999-01-01), None
Frederick B. Cohen, “Operating System Protection Through Program Evolution”, 1993, Elsevier Science Publishers Ltd., pp. 565-584.
Christian Collberg, et al., “Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs”, Department of Computer Science, The University of Auckland, Auckland, New Zeland.
David Aucsmith, et al., Intel Architecture Labs, “Tamper Resistant Software: An Implementation”, Proceedings of the First Internatiional Workshop on Information Hiding, 1996, Cambridge, U.K., pp. 1-10.
Vega Technologies, Inc., “JZipper—a better way to jar Java classes,” Jul. 9, 1999, pp. 1-3.
“A Java bytecode obfuscator”, promotional materials, (www.monmouth.com/˜neil/Obfuscate.html), Jun. 2, 1998, pp. 1-4.
Eastridge Technology, “Jshrink: Java Shrinker and Obfuscator”, promotional materials, (www.e-t.com/jshrinkdoc.html), Jun. 2. 1998, pp. 1-4.
Zelix KlassMaster, “It's a 2ndGeneration Java Obfuscator”, promotional materials, (www.zelix.com/klassmaster/feature3.html), pp. 1-4.
The art of obfuscation, promotional materials (www.cwi.nl/˜tromp/maze/html), Jun. 2, 1998, pp. 1-5.
True Obfuscation, promotional materials (www.preemptive.com/DashO/obfuscate.html), Jun. 2, 1998, pp. 1-3.
Obfuscator, “tech tools. *;//free tools for java”, promotional materials (www.sbktech.org/hashjava_old.html), Jun. 2, 1998, pp. 1-9.
“Number-Theoretic Algorithms”, Chapter 33, pp. 801-830.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Tamper resistant software encoding does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Tamper resistant software encoding, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Tamper resistant software encoding will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3418373

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.