Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection
Reexamination Certificate
2008-03-25
2008-03-25
Sheikh, Ayaz (Department: 2131)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
By stored data protection
C713S189000, C713S190000, C713S194000, C713S165000, C713S155000, C711S202000, C711S203000, C711S216000
Reexamination Certificate
active
07350085
ABSTRACT:
Mass data (the contents of arrays, large data structures, linked data structures and similar data structures stored in memory) are common targets for attack. The invention presents a method and system of protecting mass data by mapping virtual addresses onto randomly or pseudo-randomly selected actual addresses. This mapping distributes data values throughout the memory so an attacker cannot locate the data he is seeking, or identify patterns which might allow him to obtain information about his target (such as how the software operates, encryption keys, biometric data or passwords stored therein, or algorithms it uses). Additional layers of protection are described, as well as efficient techniques for generating the necessary transforms to perform the invention.
REFERENCES:
patent: 4064558 (1977-12-01), Hughes et al.
patent: 4135240 (1979-01-01), Ritchie
patent: 4215402 (1980-07-01), Mitchell et al.
patent: 4812981 (1989-03-01), Chan et al.
patent: 5081675 (1992-01-01), Kittirutsunetorn
patent: 5095525 (1992-03-01), Almgren et al.
patent: 5123045 (1992-06-01), Ostrovsky et al.
patent: 5129074 (1992-07-01), Kikuchi et al.
patent: 5530958 (1996-06-01), Agarwal et al.
patent: 5899994 (1999-05-01), Mohamed et al.
patent: 6115802 (2000-09-01), Tock et al.
patent: 6167392 (2000-12-01), Ostrovsky et al.
patent: 6192475 (2001-02-01), Wallace
patent: 6779114 (2004-08-01), Chow et al.
patent: 7003673 (2006-02-01), Diener et al.
patent: 0908810 (1999-04-01), None
patent: WO 99/01815 (1999-01-01), None
patent: WO 01/79969 (2001-10-01), None
IBM Corp., “Data Security Method for Storage Device”,IBM Technical Disclosure Bulletin, (May 1995), vol. 38, No. 5, p. 23, Armonk, NY, USA.
Hewlett Packard website, “IA-64 Instruction Set Architecture Guide IA-64 Addressing and Protection, Section 7.1 Virtual Addressing”, found at www.devresource.hprce/docs/refs/IA641SA/addr—protect2.html, pp. 1-28, no date.
Peter J. Cameron, “Axioms For Polar Spaces”, Chapter 7 from “Projective and Polar Spaces”, found at www.maths.qmw.ac.uk/˜pjc/pps, Sep. 14, 2002, pp. 97-114.
Course notes, “Math 551-Algebra-Fall 2000”, found at www.math.rutgers.edu/courses/551/551-F00/groups1.pdf, fall, 2000, pp. 1-8.
Frank W. Miller, “Simple Memory Protection For Embedded & Real-Time Operating System Kernels”, 9 pages, no date.
Bruce Jacob et al., “Virtual Memory: Issues of Implementation”, IEEE Computer Magazine, Jun. 1998, pp. 33-43, Jun. 1998.
Oded Goldreich, “Towards a Theory of Software Protection and Simulation by Oblivious RAMs,” Computer Science Department, published ACM, 1987, pp. 182-194.
C. Severance et al.,, “Distributed Linear Hashing and Parallel Projection in Main Memory Databases,” 16thBLDB Conference, Brisbane, Australia, 1990, pp. 674-682.
Oded Goldreich et al., “Software Protection and Simulation on Oblivious RAMs”, published in ACM, 1996, pp. 431-473.
“Topic 16-Virtual Addressing” CA 452 Principles of Operating Systems, no date.
Bennett et al; Predictable and Efficient Virtual Addressing for Safety-Critical Real-Time Systems; pp. 1-8, York, UK, no date.
Miller; Simple Memory Protection for Embedded & Real-Time Operating System Kernels; pp. 1-9, Baltimore, US, no date.
Jacob et al; Virtual Memory; Issues of Implementation; IEEE, Jun. 1998, pp. 33-43, US.
Goldreich; Towards a Theory of Software Protection and Stimulation of Oblivious RAM; Commputer Science Department; 1987, pp. 182, Israel.
Severance et al; Distributed Linnear Hashing and Parallel Projection in Main Memory Databases; 16th VLDB Conference, 1990, pp. 674-682, Australia.
Goldreich; Software and Simulation on Oblivious RAMs; Journal of ACM, vol. 43, No. 3, May 1996, pp. 431-473.
Chow Stanley T.
Gu Yuan X.
Johnson Harold J.
Besrour Saoussen
Cassan Lynn S.
Cloakware Corporation
Sheikh Ayaz
LandOfFree
Tamper resistant software-mass data encoding does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Tamper resistant software-mass data encoding, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Tamper resistant software-mass data encoding will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2808719