WO1983004356A1 - Software protection methods and apparatus - Google Patents
Software protection methods and apparatus Download PDFInfo
- Publication number
- WO1983004356A1 WO1983004356A1 PCT/US1983/000786 US8300786W WO8304356A1 WO 1983004356 A1 WO1983004356 A1 WO 1983004356A1 US 8300786 W US8300786 W US 8300786W WO 8304356 A1 WO8304356 A1 WO 8304356A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- encryption
- address
- program
- decryption
- operating mode
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 19
- 238000001514 detection method Methods 0.000 claims abstract description 25
- 230000002401 inhibitory effect Effects 0.000 claims abstract description 6
- 230000004044 response Effects 0.000 claims description 14
- 230000006872 improvement Effects 0.000 claims description 7
- 238000012544 monitoring process Methods 0.000 claims description 7
- 230000006870 function Effects 0.000 claims description 5
- 230000008878 coupling Effects 0.000 claims description 4
- 238000010168 coupling process Methods 0.000 claims description 4
- 238000005859 coupling reaction Methods 0.000 claims description 4
- 238000004590 computer program Methods 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 5
- 239000004020 conductor Substances 0.000 description 4
- 238000010276 construction Methods 0.000 description 4
- 230000007257 malfunction Effects 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 239000000470 constituent Substances 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000011888 foil Substances 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP58502259A JPS59501130A (en) | 1982-05-21 | 1983-05-23 | Software protection methods and devices |
GB08401229A GB2129986A (en) | 1982-05-21 | 1983-05-23 | Software protection methods and apparatus |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US06/380,771 US4525599A (en) | 1982-05-21 | 1982-05-21 | Software protection methods and apparatus |
US380,771 | 1982-05-21 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1983004356A1 true WO1983004356A1 (en) | 1983-12-08 |
Family
ID=23502378
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1983/000786 WO1983004356A1 (en) | 1982-05-21 | 1983-05-23 | Software protection methods and apparatus |
Country Status (5)
Country | Link |
---|---|
US (1) | US4525599A (en) |
EP (1) | EP0112367A1 (en) |
DE (1) | DE3390018T1 (en) |
GB (1) | GB2129986A (en) |
WO (1) | WO1983004356A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2158622A (en) * | 1983-12-21 | 1985-11-13 | Goran Anders Henrik Hemdal | Computer controlled systems |
EP0213118A2 (en) * | 1985-08-22 | 1987-03-04 | Novo-Invest Casino Development Aktiengesellschaft | Method and apparatus for software protection |
US4757468A (en) * | 1982-09-22 | 1988-07-12 | Intel Corporation | Authenticated read-only memory |
GB2248702A (en) * | 1990-10-11 | 1992-04-15 | Viserge Limited | Protection of software in ROM |
GB2222899B (en) * | 1988-08-31 | 1993-04-14 | Anthony Morris Rose | Securing a computer against undesired write operations or from a mass storage device |
GB2288893A (en) * | 1994-04-28 | 1995-11-01 | Nec Corp | Protecting a software program in a microprocessor-based controller |
GB2330932A (en) * | 1997-10-15 | 1999-05-05 | Dell Usa Lp | Method and system for preventing unauthorized access to a computer program |
Families Citing this family (152)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3686910A (en) * | 1968-03-20 | 1972-08-29 | Western Electric Co | Methods of and apparatus for hydrostatic forming |
EP0137995B1 (en) * | 1983-10-14 | 1990-10-17 | Kabushiki Kaisha Toshiba | Single-chip microcomputer with encryptable function on program memory |
US4716586A (en) * | 1983-12-07 | 1987-12-29 | American Microsystems, Inc. | State sequence dependent read only memory |
US4633388A (en) * | 1984-01-18 | 1986-12-30 | Siemens Corporate Research & Support, Inc. | On-chip microprocessor instruction decoder having hardware for selectively bypassing on-chip circuitry used to decipher encrypted instruction codes |
US4847902A (en) * | 1984-02-10 | 1989-07-11 | Prime Computer, Inc. | Digital computer system for executing encrypted programs |
US4646234A (en) * | 1984-02-29 | 1987-02-24 | Brigham Young University | Anti-piracy system using separate storage and alternate execution of selected proprietary and public portions of computer programs |
DE3671119D1 (en) * | 1985-07-03 | 1990-06-13 | Siemens Ag | INTEGRATED CIRCUIT AND METHOD FOR SECURING SECRET CODE DATA. |
US4719566A (en) * | 1985-10-23 | 1988-01-12 | International Business Machines Corporation | Method for entrapping unauthorized computer access |
US4864494A (en) * | 1986-03-21 | 1989-09-05 | Computerized Data Ssytems For Mfg., Inc. | Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software |
US5014234A (en) * | 1986-08-25 | 1991-05-07 | Ncr Corporation | System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software |
US4817140A (en) * | 1986-11-05 | 1989-03-28 | International Business Machines Corp. | Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor |
US5146575A (en) * | 1986-11-05 | 1992-09-08 | International Business Machines Corp. | Implementing privilege on microprocessor systems for use in software asset protection |
KR890702127A (en) * | 1987-06-03 | 1989-12-22 | 원본미기재 | Safety system with optional software program lock utilizing removable PLA key for hardware safety lock update |
US4999806A (en) * | 1987-09-04 | 1991-03-12 | Fred Chernow | Software distribution system |
US4914697A (en) * | 1988-02-01 | 1990-04-03 | Motorola, Inc. | Cryptographic method and apparatus with electronically redefinable algorithm |
JPH0752388B2 (en) * | 1988-08-03 | 1995-06-05 | 三菱電機株式会社 | IC memory card |
US5095525A (en) * | 1989-06-26 | 1992-03-10 | Rockwell International Corporation | Memory transformation apparatus and method |
US5136713A (en) * | 1989-08-25 | 1992-08-04 | International Business Machines Corporation | Apparatus and method for decreasing the memory requirements for bios in a personal computer system |
GB9012949D0 (en) * | 1989-08-25 | 1990-08-01 | Ibm | An apparatus and method for loading bios from a diskette in a personal computer system |
US5210875A (en) * | 1989-08-25 | 1993-05-11 | International Business Machines Corporation | Initial bios load for a personal computer system |
US5022077A (en) * | 1989-08-25 | 1991-06-04 | International Business Machines Corp. | Apparatus and method for preventing unauthorized access to BIOS in a personal computer system |
US5081675A (en) * | 1989-11-13 | 1992-01-14 | Kitti Kittirutsunetorn | System for protection of software in memory against unauthorized use |
US5463778A (en) * | 1989-11-16 | 1995-10-31 | Texas Instruments Incorporated | User controlled trap handler |
US5230052A (en) * | 1990-10-01 | 1993-07-20 | International Business Machines Corp. | Apparatus and method for loading bios into a computer system from a remote storage location |
DE4115152C2 (en) * | 1991-05-08 | 2003-04-24 | Gao Ges Automation Org | Card-shaped data carrier with a data-protecting microprocessor circuit |
US5251909A (en) * | 1991-05-28 | 1993-10-12 | Reed Michael J | Secured high throughput data channel for public broadcast system |
US5610981A (en) * | 1992-06-04 | 1997-03-11 | Integrated Technologies Of America, Inc. | Preboot protection for a data security system with anti-intrusion capability |
JP2953267B2 (en) * | 1992-10-13 | 1999-09-27 | コナミ株式会社 | External memory control device in image creation device |
US5530752A (en) * | 1994-02-22 | 1996-06-25 | Convex Computer Corporation | Systems and methods for protecting software from unlicensed copying and use |
US5881287A (en) * | 1994-08-12 | 1999-03-09 | Mast; Michael B. | Method and apparatus for copy protection of images in a computer system |
US5599231A (en) * | 1994-10-31 | 1997-02-04 | Nintendo Co., Ltd. | Security systems and methods for a videographics and authentication game/program fabricating device |
US6115036A (en) * | 1994-10-31 | 2000-09-05 | Nintendo Co., Ltd. | Video game/videographics program editing apparatus with program halt and data transfer features |
US5680533A (en) * | 1994-10-31 | 1997-10-21 | Nintendo Co., Ltd. | Videographics program/video game fabricating system and method |
US5680534A (en) * | 1994-10-31 | 1997-10-21 | Nintendo Co., Ltd. | Video game/videographics program fabricating system and method with superimpose control |
US5592609A (en) * | 1994-10-31 | 1997-01-07 | Nintendo Co., Ltd. | Video game/videographics program fabricating system and method with unit based program processing |
US7133845B1 (en) | 1995-02-13 | 2006-11-07 | Intertrust Technologies Corp. | System and methods for secure transaction management and electronic rights protection |
US7143290B1 (en) | 1995-02-13 | 2006-11-28 | Intertrust Technologies Corporation | Trusted and secure techniques, systems and methods for item delivery and execution |
US7133846B1 (en) | 1995-02-13 | 2006-11-07 | Intertrust Technologies Corp. | Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management |
US7095854B1 (en) | 1995-02-13 | 2006-08-22 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5892900A (en) | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6658568B1 (en) | 1995-02-13 | 2003-12-02 | Intertrust Technologies Corporation | Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management |
US6948070B1 (en) | 1995-02-13 | 2005-09-20 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US5943422A (en) | 1996-08-12 | 1999-08-24 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US6157721A (en) | 1996-08-12 | 2000-12-05 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
DE69638018D1 (en) | 1995-02-13 | 2009-10-15 | Intertrust Tech Corp | Systems and procedures for managing secure transactions and protecting electronic rights |
US7165174B1 (en) | 1995-02-13 | 2007-01-16 | Intertrust Technologies Corp. | Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management |
US7069451B1 (en) | 1995-02-13 | 2006-06-27 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US7124302B2 (en) | 1995-02-13 | 2006-10-17 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
USRE39369E1 (en) | 1995-06-29 | 2006-10-31 | Igt | Electronic casino gaming system with improved play capacity, authentication and security |
US7063615B2 (en) * | 1995-06-29 | 2006-06-20 | Igt | Electronic gaming apparatus with authentication |
US5643086A (en) | 1995-06-29 | 1997-07-01 | Silicon Gaming, Inc. | Electronic casino gaming apparatus with improved play capacity, authentication and security |
US6047103A (en) * | 1995-10-09 | 2000-04-04 | Matsushita Electric Industrial Co., Ltd. | Data transmitter, data transmitting method, data receiver, information processor, and information recording medium |
US6088452A (en) * | 1996-03-07 | 2000-07-11 | Northern Telecom Limited | Encoding technique for software and hardware |
DE69729495T2 (en) * | 1996-03-08 | 2004-10-28 | Matsushita Electric Industrial Co., Ltd., Kadoma | Image information processing system and microprocessor for the protected reproduction of audiovisual data |
US5754647A (en) * | 1996-03-27 | 1998-05-19 | United Microelectronics Corporation | Software protection apparatus and the method of protection utilizing read-write memory means having inconsistent input and output data |
US5784459A (en) * | 1996-08-15 | 1998-07-21 | International Business Machines Corporation | Method and apparatus for secure, remote swapping of memory resident active entities |
US20050021477A1 (en) * | 1997-01-29 | 2005-01-27 | Ganapathy Krishnan | Method and system for securely incorporating electronic information into an online purchasing application |
US7062500B1 (en) | 1997-02-25 | 2006-06-13 | Intertrust Technologies Corp. | Techniques for defining, using and manipulating rights management data structures |
JP3277139B2 (en) * | 1997-03-13 | 2002-04-22 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Input bit string encryption apparatus and method |
US6272637B1 (en) * | 1997-04-14 | 2001-08-07 | Dallas Semiconductor Corporation | Systems and methods for protecting access to encrypted information |
US20020025852A1 (en) * | 2000-09-29 | 2002-02-28 | Alcorn Allan E. | Gaming apparatus with portrait-mode display |
US7092914B1 (en) | 1997-11-06 | 2006-08-15 | Intertrust Technologies Corporation | Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
JPH11176091A (en) * | 1997-12-15 | 1999-07-02 | Hitachi Ltd | Digital information input output device, receiving device, recording device, and reproducing device |
US6473861B1 (en) * | 1998-12-03 | 2002-10-29 | Joseph Forte | Magnetic optical encryption/decryption disk drive arrangement |
US6408387B1 (en) * | 1999-01-22 | 2002-06-18 | Intel Corporation | Preventing unauthorized updates to a non-volatile memory |
US6681212B1 (en) | 1999-04-23 | 2004-01-20 | Nianning Zeng | Internet-based automated system and a method for software copyright protection and sales |
US7430670B1 (en) | 1999-07-29 | 2008-09-30 | Intertrust Technologies Corp. | Software self-defense systems and methods |
GB9930145D0 (en) * | 1999-12-22 | 2000-02-09 | Kean Thomas A | Method and apparatus for secure configuration of a field programmable gate array |
US20070288765A1 (en) * | 1999-12-22 | 2007-12-13 | Kean Thomas A | Method and Apparatus for Secure Configuration of a Field Programmable Gate Array |
US20010034838A1 (en) * | 2000-01-14 | 2001-10-25 | Motoshi Ito | Control program, device including the control program, method for creating the control program, and method for operating the control program |
US7240218B2 (en) * | 2000-02-08 | 2007-07-03 | Algotronix, Ltd. | Method of using a mask programmed key to securely configure a field programmable gate array |
US7043641B1 (en) | 2000-03-08 | 2006-05-09 | Igt | Encryption in a secure computerized gaming system |
US7988559B2 (en) | 2001-03-08 | 2011-08-02 | Igt | Computerized gaming system, method and apparatus |
CA2402389A1 (en) * | 2000-03-08 | 2002-09-19 | Shuffle Master, Inc. | Computerized gaming system, method and apparatus |
US6990387B1 (en) * | 2000-05-18 | 2006-01-24 | Intel Corporation | Test system for identification and sorting of integrated circuit devices |
JP4683442B2 (en) * | 2000-07-13 | 2011-05-18 | 富士通フロンテック株式会社 | Processing apparatus and integrated circuit |
JP4892167B2 (en) * | 2000-07-18 | 2012-03-07 | シンプレックス メジャー センドリアン ベルハッド | Digital data protection configuration |
US7051211B1 (en) | 2000-08-21 | 2006-05-23 | International Business Machines Corporation | Secure software distribution and installation |
CA2420290C (en) * | 2000-08-21 | 2009-04-21 | Igt | Method and apparatus for software authentication |
US7350083B2 (en) | 2000-12-29 | 2008-03-25 | Intel Corporation | Integrated circuit chip having firmware and hardware security primitive device(s) |
AU2002245226A1 (en) | 2001-01-09 | 2002-07-24 | Topcoder, Inc. | Systems and methods for coding competitions |
US20020095382A1 (en) * | 2001-01-10 | 2002-07-18 | Hiroki Taoka | Content decryption device |
US7203841B2 (en) * | 2001-03-08 | 2007-04-10 | Igt | Encryption in a secure computerized gaming system |
DE10124139A1 (en) * | 2001-05-17 | 2002-11-21 | Philips Corp Intellectual Pty | Method for securing data transfer between a CPU and ROM memory, used in a chip card or similar, has an additional individual encryption code so that if a first code is known the memory remains secure |
GB0114317D0 (en) * | 2001-06-13 | 2001-08-01 | Kean Thomas A | Method of protecting intellectual property cores on field programmable gate array |
US7162036B2 (en) | 2001-08-06 | 2007-01-09 | Igt | Digital identification of unique game characteristics |
US6685567B2 (en) * | 2001-08-08 | 2004-02-03 | Igt | Process verification |
DE10142537A1 (en) * | 2001-08-30 | 2003-03-20 | Adp Gauselmann Gmbh | Method for activating a control unit arranged in a housing, which is protected against spying on data |
US7618317B2 (en) | 2001-09-10 | 2009-11-17 | Jackson Mark D | Method for developing gaming programs compatible with a computerized gaming operating system and apparatus |
US7853803B2 (en) | 2001-09-28 | 2010-12-14 | Verizon Corporate Services Group Inc. | System and method for thwarting buffer overflow attacks using encrypted process pointers |
US6902481B2 (en) | 2001-09-28 | 2005-06-07 | Igt | Decoupling of the graphical presentation of a game from the presentation logic |
US7931533B2 (en) | 2001-09-28 | 2011-04-26 | Igt | Game development architecture that decouples the game logic from the graphics logics |
US8708828B2 (en) | 2001-09-28 | 2014-04-29 | Igt | Pluggable modular gaming modifiers and configuration templates for gaming environments |
EP1463569A4 (en) * | 2001-11-26 | 2010-06-02 | Igt Reno Nev | Pass-through live validation device and method |
US20030120938A1 (en) * | 2001-11-27 | 2003-06-26 | Miki Mullor | Method of securing software against reverse engineering |
US7130911B2 (en) * | 2002-02-11 | 2006-10-31 | Intel Corporation | Method for monitoring unauthorized access to data stored in memory buffers |
US7292990B2 (en) * | 2002-04-08 | 2007-11-06 | Topcoder, Inc. | System and method for software development |
US20060248504A1 (en) * | 2002-04-08 | 2006-11-02 | Hughes John M | Systems and methods for software development |
US7778866B2 (en) * | 2002-04-08 | 2010-08-17 | Topcoder, Inc. | Systems and methods for software development |
US8776042B2 (en) * | 2002-04-08 | 2014-07-08 | Topcoder, Inc. | Systems and methods for software support |
US6962530B2 (en) | 2002-04-25 | 2005-11-08 | Igt | Authentication in a secure computerized gaming system |
US20040015709A1 (en) * | 2002-07-18 | 2004-01-22 | Bei-Chuan Chen | Software delivery device and method for providing software copy protection |
KR100474526B1 (en) * | 2002-07-19 | 2005-03-10 | 매그나칩 반도체 유한회사 | Control system with protective ability for external program code |
US7926113B1 (en) | 2003-06-09 | 2011-04-12 | Tenable Network Security, Inc. | System and method for managing network vulnerability analysis systems |
US7533370B2 (en) * | 2003-10-28 | 2009-05-12 | Exent Technologies, Ltd. | Security features in on-line and off-line delivery of applications |
US7802095B2 (en) * | 2004-02-03 | 2010-09-21 | Music Public Broadcasting, Inc. | Method and system for preventing unauthorized recording of media content on a Macintosh operating system |
US7761918B2 (en) * | 2004-04-13 | 2010-07-20 | Tenable Network Security, Inc. | System and method for scanning a network |
US7770027B2 (en) * | 2004-11-15 | 2010-08-03 | Nintendo Co., Ltd. | Semiconductor memory device |
JP4119881B2 (en) * | 2004-11-15 | 2008-07-16 | 株式会社メガチップス | Semiconductor memory device |
JP4630643B2 (en) * | 2004-11-18 | 2011-02-09 | 株式会社メガチップス | Semiconductor memory and test method for semiconductor memory |
US20060136746A1 (en) * | 2004-12-18 | 2006-06-22 | Al-Khateeb Osama O M | Security system for preventing unauthorized copying of digital data |
US7805709B2 (en) * | 2005-05-27 | 2010-09-28 | Delphi Technologies, Inc. | System and method for bypassing execution of an algorithm |
US7865423B2 (en) * | 2005-08-16 | 2011-01-04 | Bridgetech Capital, Inc. | Systems and methods for providing investment opportunities |
US9313027B2 (en) * | 2005-12-29 | 2016-04-12 | Proton World International N.V. | Protection of a calculation performed by an integrated circuit |
EP1999662A4 (en) * | 2006-01-20 | 2010-10-13 | Topcoder Inc | System and method for design development |
FR2898704B1 (en) * | 2006-03-14 | 2008-06-06 | Proton World Internatinal Nv | PROTECTION OF A PROGRAM AGAINST A DISRUPTION |
US20070220479A1 (en) * | 2006-03-14 | 2007-09-20 | Hughes John M | Systems and methods for software development |
US20070250378A1 (en) * | 2006-04-24 | 2007-10-25 | Hughes John M | Systems and methods for conducting production competitions |
US20080052146A1 (en) * | 2006-05-01 | 2008-02-28 | David Messinger | Project management system |
US10783458B2 (en) * | 2006-05-01 | 2020-09-22 | Topcoder, Inc. | Systems and methods for screening submissions in production competitions |
US20080167960A1 (en) * | 2007-01-08 | 2008-07-10 | Topcoder, Inc. | System and Method for Collective Response Aggregation |
US20080196000A1 (en) * | 2007-02-14 | 2008-08-14 | Fernandez-Lvern Javier | System and method for software development |
US20080222055A1 (en) * | 2007-03-07 | 2008-09-11 | Hughes John M | System and Method for Creating Musical Works |
US8073792B2 (en) * | 2007-03-13 | 2011-12-06 | Topcoder, Inc. | System and method for content development |
WO2009062033A1 (en) * | 2007-11-09 | 2009-05-14 | Topcoder, Inc. | System and method for software development |
WO2009089447A1 (en) * | 2008-01-11 | 2009-07-16 | Topcoder, Inc. | System and method for conducting competitions |
US20100119068A1 (en) * | 2008-11-11 | 2010-05-13 | Harris Scott C | Digital File Anti pirating |
US8438270B2 (en) * | 2010-01-26 | 2013-05-07 | Tenable Network Security, Inc. | System and method for correlating network identities and addresses |
US8302198B2 (en) | 2010-01-28 | 2012-10-30 | Tenable Network Security, Inc. | System and method for enabling remote registry service security audits |
US8707440B2 (en) * | 2010-03-22 | 2014-04-22 | Tenable Network Security, Inc. | System and method for passively identifying encrypted and interactive network sessions |
US8549650B2 (en) | 2010-05-06 | 2013-10-01 | Tenable Network Security, Inc. | System and method for three-dimensional visualization of vulnerability and asset data |
US9575903B2 (en) | 2011-08-04 | 2017-02-21 | Elwha Llc | Security perimeter |
US9465657B2 (en) | 2011-07-19 | 2016-10-11 | Elwha Llc | Entitlement vector for library usage in managing resource allocation and scheduling based on usage and priority |
US9098608B2 (en) | 2011-10-28 | 2015-08-04 | Elwha Llc | Processor configured to allocate resources using an entitlement vector |
US8930714B2 (en) * | 2011-07-19 | 2015-01-06 | Elwha Llc | Encrypted memory |
US9471373B2 (en) | 2011-09-24 | 2016-10-18 | Elwha Llc | Entitlement vector for library usage in managing resource allocation and scheduling based on usage and priority |
US9298918B2 (en) | 2011-11-30 | 2016-03-29 | Elwha Llc | Taint injection and tracking |
US8813085B2 (en) | 2011-07-19 | 2014-08-19 | Elwha Llc | Scheduling threads based on priority utilizing entitlement vectors, weight and usage level |
US9170843B2 (en) | 2011-09-24 | 2015-10-27 | Elwha Llc | Data handling apparatus adapted for scheduling operations according to resource allocation based on entitlement |
US8955111B2 (en) | 2011-09-24 | 2015-02-10 | Elwha Llc | Instruction set adapted for security risk monitoring |
US9798873B2 (en) | 2011-08-04 | 2017-10-24 | Elwha Llc | Processor operable to ensure code integrity |
US9558034B2 (en) | 2011-07-19 | 2017-01-31 | Elwha Llc | Entitlement vector for managing resource allocation |
US9443085B2 (en) | 2011-07-19 | 2016-09-13 | Elwha Llc | Intrusion detection using taint accumulation |
US9460290B2 (en) | 2011-07-19 | 2016-10-04 | Elwha Llc | Conditional security response using taint vector monitoring |
US9367707B2 (en) | 2012-02-23 | 2016-06-14 | Tenable Network Security, Inc. | System and method for using file hashes to track data leakage and document propagation in a network |
US8627097B2 (en) | 2012-03-27 | 2014-01-07 | Igt | System and method enabling parallel processing of hash functions using authentication checkpoint hashes |
US9043920B2 (en) | 2012-06-27 | 2015-05-26 | Tenable Network Security, Inc. | System and method for identifying exploitable weak points in a network |
US9088606B2 (en) | 2012-07-05 | 2015-07-21 | Tenable Network Security, Inc. | System and method for strategic anti-malware monitoring |
US9467464B2 (en) | 2013-03-15 | 2016-10-11 | Tenable Network Security, Inc. | System and method for correlating log data to discover network vulnerabilities and assets |
CN103838995B (en) * | 2014-03-19 | 2018-04-27 | 北京深思数盾科技股份有限公司 | It can customize the information safety devices of setting |
US9904485B2 (en) * | 2016-03-31 | 2018-02-27 | Intel Corporation | Secure memory controller |
FR3069935A1 (en) * | 2017-08-01 | 2019-02-08 | Maxim Integrated Products, Inc. | DEVICES AND METHODS FOR INTELLECTUAL PROPERTY PROTECTION OF SOFTWARE FOR INTEGRATED PLATFORMS |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US399449A (en) * | 1889-03-12 | Handle for umbrellas | ||
US4120030A (en) * | 1977-03-11 | 1978-10-10 | Kearney & Trecker Corporation | Computer software security system |
US4168396A (en) * | 1977-10-31 | 1979-09-18 | Best Robert M | Microprocessor for executing enciphered programs |
US4183085A (en) * | 1976-11-18 | 1980-01-08 | International Business Machines Corporation | Protection of data processing system against unauthorized programs |
US4278837A (en) * | 1977-10-31 | 1981-07-14 | Best Robert M | Crypto microprocessor for executing enciphered programs |
US4306289A (en) * | 1980-02-04 | 1981-12-15 | Western Electric Company, Inc. | Digital computer having code conversion apparatus for an encrypted program |
US4319079A (en) * | 1979-09-13 | 1982-03-09 | Best Robert M | Crypto microprocessor using block cipher |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3996449A (en) * | 1975-08-25 | 1976-12-07 | International Business Machines Corporation | Operating system authenticator |
US4246638A (en) * | 1978-09-14 | 1981-01-20 | Thomas William J | Method and apparatus for controlling usage of a programmable computing machine |
US4446519A (en) * | 1981-05-26 | 1984-05-01 | Corban International, Ltd. | Method and apparatus for providing security for computer software |
-
1982
- 1982-05-21 US US06/380,771 patent/US4525599A/en not_active Expired - Lifetime
-
1983
- 1983-05-23 DE DE19833390018 patent/DE3390018T1/en not_active Withdrawn
- 1983-05-23 EP EP83902161A patent/EP0112367A1/en not_active Withdrawn
- 1983-05-23 GB GB08401229A patent/GB2129986A/en not_active Withdrawn
- 1983-05-23 WO PCT/US1983/000786 patent/WO1983004356A1/en not_active Application Discontinuation
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US399449A (en) * | 1889-03-12 | Handle for umbrellas | ||
US4183085A (en) * | 1976-11-18 | 1980-01-08 | International Business Machines Corporation | Protection of data processing system against unauthorized programs |
US4120030A (en) * | 1977-03-11 | 1978-10-10 | Kearney & Trecker Corporation | Computer software security system |
US4168396A (en) * | 1977-10-31 | 1979-09-18 | Best Robert M | Microprocessor for executing enciphered programs |
US4278837A (en) * | 1977-10-31 | 1981-07-14 | Best Robert M | Crypto microprocessor for executing enciphered programs |
US4319079A (en) * | 1979-09-13 | 1982-03-09 | Best Robert M | Crypto microprocessor using block cipher |
US4306289A (en) * | 1980-02-04 | 1981-12-15 | Western Electric Company, Inc. | Digital computer having code conversion apparatus for an encrypted program |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4757468A (en) * | 1982-09-22 | 1988-07-12 | Intel Corporation | Authenticated read-only memory |
GB2158622A (en) * | 1983-12-21 | 1985-11-13 | Goran Anders Henrik Hemdal | Computer controlled systems |
EP0213118A2 (en) * | 1985-08-22 | 1987-03-04 | Novo-Invest Casino Development Aktiengesellschaft | Method and apparatus for software protection |
EP0213118A3 (en) * | 1985-08-22 | 1989-09-06 | Novo-Invest Casino Development Aktiengesellschaft | Method and apparatus for software protection |
GB2222899B (en) * | 1988-08-31 | 1993-04-14 | Anthony Morris Rose | Securing a computer against undesired write operations or from a mass storage device |
GB2248702B (en) * | 1990-10-11 | 1994-11-02 | Viserge Limited | Data-processing apparatus |
GB2248702A (en) * | 1990-10-11 | 1992-04-15 | Viserge Limited | Protection of software in ROM |
GB2288893A (en) * | 1994-04-28 | 1995-11-01 | Nec Corp | Protecting a software program in a microprocessor-based controller |
US5671275A (en) * | 1994-04-28 | 1997-09-23 | Nec Corporation | Protection of software programs stored in read-only memory from unauthorized access |
GB2288893B (en) * | 1994-04-28 | 1998-11-18 | Nec Corp | Method for protecting a software program, control method and controller |
GB2330932A (en) * | 1997-10-15 | 1999-05-05 | Dell Usa Lp | Method and system for preventing unauthorized access to a computer program |
AU736077B2 (en) * | 1997-10-15 | 2001-07-26 | Dell Usa L.P. | Method and system for preventing unauthorized access to a computer program |
GB2330932B (en) * | 1997-10-15 | 2002-06-26 | Dell Usa Lp | Method and system for preventing unauthorized access to a computer program |
Also Published As
Publication number | Publication date |
---|---|
DE3390018T1 (en) | 1985-05-30 |
GB8401229D0 (en) | 1984-02-22 |
GB2129986A (en) | 1984-05-23 |
US4525599A (en) | 1985-06-25 |
EP0112367A1 (en) | 1984-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US4525599A (en) | Software protection methods and apparatus | |
KR101863143B1 (en) | Memory integrity | |
US4593353A (en) | Software protection method and apparatus | |
US4523271A (en) | Software protection method and apparatus | |
EP0787328B1 (en) | Method for verifying the configuration of a computer system | |
US4583196A (en) | Secure read only memory | |
WO1981002351A1 (en) | Digital computer | |
TW583554B (en) | Safety-data-processing unit and its method | |
EP0436365B1 (en) | Method and system for securing terminals | |
JPH08249U (en) | Encoding / decoding circuit | |
JP3683031B2 (en) | Program protector | |
US6962294B2 (en) | Integrated circuit having an active shield | |
US9418251B2 (en) | Mesh grid protection system | |
CN107466400A (en) | Method for the shared memory between at least two functional entitys | |
EP3907633B1 (en) | System and method for obfuscating opcode commands in a semiconductor device | |
JP4559623B2 (en) | Security device, key device, program protection system, and method | |
WO2007059701A1 (en) | A system encrypting method adopting a multiple use supplementary single-chip microcomputer | |
CA1194609A (en) | Software protection methods and apparatus | |
KR100406228B1 (en) | Tamper resistance with pseudo-random binary sequence program interlocks | |
KR101287480B1 (en) | Electronic board provided with security functions and method for ensuring electronic board security | |
CN108345803A (en) | A kind of data access method and device of trusted storage device | |
JP2002182984A (en) | Data processor | |
CN117216813B (en) | Method, device and security chip for reading and writing data | |
KR100204382B1 (en) | Method and apparatus for securing excutable programs against copying | |
US11157619B2 (en) | Method and system for selection of location for placement of trojans, triggers and instruments within integrated circuits and electronic systems using contributory operation analysis |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Designated state(s): DE GB JP |
|
AL | Designated countries for regional patents |
Designated state(s): FR |
|
CFP | Corrected version of a pamphlet front page | ||
CR1 | Correction of entry in section i |
Free format text: IN PAT.BUL.28/83 UNDER "DESIGNATED STATES"INSERT"FR(EUROPEAN PATENT)"BETWEEN"DE"AND"GB" |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1983902161 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1983902161 Country of ref document: EP |
|
RET | De translation (de og part 6b) |
Ref document number: 3390018 Country of ref document: DE Date of ref document: 19850530 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 3390018 Country of ref document: DE |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1983902161 Country of ref document: EP |