Tamper resistant software-mass data encoding

Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S189000, C713S190000, C713S194000, C713S165000, C713S155000, C711S202000, C711S203000, C711S216000

Reexamination Certificate

active

07350085

ABSTRACT:
Mass data (the contents of arrays, large data structures, linked data structures and similar data structures stored in memory) are common targets for attack. The invention presents a method and system of protecting mass data by mapping virtual addresses onto randomly or pseudo-randomly selected actual addresses. This mapping distributes data values throughout the memory so an attacker cannot locate the data he is seeking, or identify patterns which might allow him to obtain information about his target (such as how the software operates, encryption keys, biometric data or passwords stored therein, or algorithms it uses). Additional layers of protection are described, as well as efficient techniques for generating the necessary transforms to perform the invention.

REFERENCES:
patent: 4064558 (1977-12-01), Hughes et al.
patent: 4135240 (1979-01-01), Ritchie
patent: 4215402 (1980-07-01), Mitchell et al.
patent: 4812981 (1989-03-01), Chan et al.
patent: 5081675 (1992-01-01), Kittirutsunetorn
patent: 5095525 (1992-03-01), Almgren et al.
patent: 5123045 (1992-06-01), Ostrovsky et al.
patent: 5129074 (1992-07-01), Kikuchi et al.
patent: 5530958 (1996-06-01), Agarwal et al.
patent: 5899994 (1999-05-01), Mohamed et al.
patent: 6115802 (2000-09-01), Tock et al.
patent: 6167392 (2000-12-01), Ostrovsky et al.
patent: 6192475 (2001-02-01), Wallace
patent: 6779114 (2004-08-01), Chow et al.
patent: 7003673 (2006-02-01), Diener et al.
patent: 0908810 (1999-04-01), None
patent: WO 99/01815 (1999-01-01), None
patent: WO 01/79969 (2001-10-01), None
IBM Corp., “Data Security Method for Storage Device”,IBM Technical Disclosure Bulletin, (May 1995), vol. 38, No. 5, p. 23, Armonk, NY, USA.
Hewlett Packard website, “IA-64 Instruction Set Architecture Guide IA-64 Addressing and Protection, Section 7.1 Virtual Addressing”, found at www.devresource.hprce/docs/refs/IA641SA/addr—protect2.html, pp. 1-28, no date.
Peter J. Cameron, “Axioms For Polar Spaces”, Chapter 7 from “Projective and Polar Spaces”, found at www.maths.qmw.ac.uk/˜pjc/pps, Sep. 14, 2002, pp. 97-114.
Course notes, “Math 551-Algebra-Fall 2000”, found at www.math.rutgers.edu/courses/551/551-F00/groups1.pdf, fall, 2000, pp. 1-8.
Frank W. Miller, “Simple Memory Protection For Embedded & Real-Time Operating System Kernels”, 9 pages, no date.
Bruce Jacob et al., “Virtual Memory: Issues of Implementation”, IEEE Computer Magazine, Jun. 1998, pp. 33-43, Jun. 1998.
Oded Goldreich, “Towards a Theory of Software Protection and Simulation by Oblivious RAMs,” Computer Science Department, published ACM, 1987, pp. 182-194.
C. Severance et al.,, “Distributed Linear Hashing and Parallel Projection in Main Memory Databases,” 16thBLDB Conference, Brisbane, Australia, 1990, pp. 674-682.
Oded Goldreich et al., “Software Protection and Simulation on Oblivious RAMs”, published in ACM, 1996, pp. 431-473.
“Topic 16-Virtual Addressing” CA 452 Principles of Operating Systems, no date.
Bennett et al; Predictable and Efficient Virtual Addressing for Safety-Critical Real-Time Systems; pp. 1-8, York, UK, no date.
Miller; Simple Memory Protection for Embedded & Real-Time Operating System Kernels; pp. 1-9, Baltimore, US, no date.
Jacob et al; Virtual Memory; Issues of Implementation; IEEE, Jun. 1998, pp. 33-43, US.
Goldreich; Towards a Theory of Software Protection and Stimulation of Oblivious RAM; Commputer Science Department; 1987, pp. 182, Israel.
Severance et al; Distributed Linnear Hashing and Parallel Projection in Main Memory Databases; 16th VLDB Conference, 1990, pp. 674-682, Australia.
Goldreich; Software and Simulation on Oblivious RAMs; Journal of ACM, vol. 43, No. 3, May 1996, pp. 431-473.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Tamper resistant software-mass data encoding does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Tamper resistant software-mass data encoding, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Tamper resistant software-mass data encoding will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2808719

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.