WO2005125081A3 - Securing software - Google Patents
Securing software Download PDFInfo
- Publication number
- WO2005125081A3 WO2005125081A3 PCT/US2005/020638 US2005020638W WO2005125081A3 WO 2005125081 A3 WO2005125081 A3 WO 2005125081A3 US 2005020638 W US2005020638 W US 2005020638W WO 2005125081 A3 WO2005125081 A3 WO 2005125081A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- software
- pieces
- various
- tampering
- hardware
- Prior art date
Links
- 238000009434 installation Methods 0.000 abstract 2
- 230000002401 inhibitory effect Effects 0.000 abstract 1
- 238000000034 method Methods 0.000 abstract 1
- 230000001681 protective effect Effects 0.000 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
Abstract
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2005800192176A CN1969500B (en) | 2004-06-12 | 2005-06-10 | Securing software |
JP2007527785A JP4729575B2 (en) | 2004-06-12 | 2005-06-10 | Ensuring software security |
KR1020117021880A KR101187554B1 (en) | 2004-06-12 | 2005-06-10 | Securing software |
KR1020117021881A KR101187521B1 (en) | 2004-06-12 | 2005-06-10 | Securing software |
KR1020077000788A KR101203245B1 (en) | 2004-06-12 | 2005-06-10 | Securing software |
EP05773235.6A EP1757008B1 (en) | 2004-06-12 | 2005-06-10 | Securing software |
KR1020117021882A KR101159487B1 (en) | 2004-06-12 | 2005-06-10 | Securing software |
Applications Claiming Priority (20)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US57893704P | 2004-06-12 | 2004-06-12 | |
US60/578,937 | 2004-06-12 | ||
US11/061,411 | 2005-02-17 | ||
US11/061,280 | 2005-02-17 | ||
US11/062,238 | 2005-02-17 | ||
US11/061,484 US7640592B2 (en) | 2004-06-12 | 2005-02-17 | Installation setup |
US11/061,280 US7891008B2 (en) | 2004-06-12 | 2005-02-17 | Profile protection |
US11/061,792 US7577997B2 (en) | 2004-06-12 | 2005-02-17 | Image verification |
US11/062,238 US7526805B2 (en) | 2004-06-12 | 2005-02-17 | Thread protection |
US11/061,399 US7721340B2 (en) | 2004-06-12 | 2005-02-17 | Registry protection |
US11/062,237 | 2005-02-17 | ||
US11/061,411 US7631360B2 (en) | 2004-06-12 | 2005-02-17 | Hardware protection |
US11/061,399 | 2005-02-17 | ||
US11/061,790 US7559091B2 (en) | 2004-06-12 | 2005-02-17 | Software obfuscation |
US11/061,792 | 2005-02-17 | ||
US11/061,484 | 2005-02-17 | ||
US11/062,237 US7552337B2 (en) | 2004-06-12 | 2005-02-17 | Service protection |
US11/061,791 | 2005-02-17 | ||
US11/061,790 | 2005-02-17 | ||
US11/061,791 US7584509B2 (en) | 2004-06-12 | 2005-02-17 | Inhibiting software tampering |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2005125081A2 WO2005125081A2 (en) | 2005-12-29 |
WO2005125081A3 true WO2005125081A3 (en) | 2006-03-23 |
Family
ID=35510448
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2005/020638 WO2005125081A2 (en) | 2004-06-12 | 2005-06-10 | Securing software |
Country Status (5)
Country | Link |
---|---|
US (8) | US7631360B2 (en) |
EP (1) | EP1757008B1 (en) |
JP (1) | JP4729575B2 (en) |
KR (3) | KR101187521B1 (en) |
WO (1) | WO2005125081A2 (en) |
Families Citing this family (114)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US2778053A (en) * | 1954-09-13 | 1957-01-22 | Duro Metal Products Co | Separable hinged mounting for motors or the like |
US7565697B2 (en) * | 2000-09-22 | 2009-07-21 | Ecd Systems, Inc. | Systems and methods for preventing unauthorized use of digital content |
US7788496B2 (en) | 2003-10-08 | 2010-08-31 | Microsoft Corporation | First computer process and second computer process proxy-executing code on behalf thereof |
US8271803B2 (en) * | 2003-10-08 | 2012-09-18 | Microsoft Corporation | Anti-debugging protection of binaries with proxy code execution |
US7979911B2 (en) | 2003-10-08 | 2011-07-12 | Microsoft Corporation | First computer process and second computer process proxy-executing code from third computer process on behalf of first process |
US8103592B2 (en) * | 2003-10-08 | 2012-01-24 | Microsoft Corporation | First computer process and second computer process proxy-executing code on behalf of first process |
US7860239B2 (en) * | 2004-07-07 | 2010-12-28 | International Business Machines Corporation | Method and apparatus for metering usage of software products using multiple signatures |
US7841009B1 (en) * | 2004-07-09 | 2010-11-23 | Angel Secure Networks | System and method for defending against reverse engineering of software, firmware and hardware |
US20060021066A1 (en) * | 2004-07-26 | 2006-01-26 | Ray Clayton | Data encryption system and method |
US20060259903A1 (en) * | 2005-05-12 | 2006-11-16 | Xerox Corporation | Method for creating unique identification for copies of executable code and management thereof |
US20060259900A1 (en) * | 2005-05-12 | 2006-11-16 | Xerox Corporation | Method for creating unique identification for copies of executable code and management thereof |
GB0516471D0 (en) * | 2005-08-10 | 2005-09-14 | Symbian Software Ltd | Protected software identifiers for improving security in a computing device |
US8214296B2 (en) * | 2006-02-14 | 2012-07-03 | Microsoft Corporation | Disaggregated secure execution environment |
US20070192824A1 (en) * | 2006-02-14 | 2007-08-16 | Microsoft Corporation | Computer hosting multiple secure execution environments |
US8020001B2 (en) * | 2006-02-23 | 2011-09-13 | Qualcomm Incorporated | Trusted code groups |
US8010947B2 (en) | 2006-05-23 | 2011-08-30 | International Business Machines Corporation | Discovering multi-component software products based on weighted scores |
US7814544B1 (en) * | 2006-06-22 | 2010-10-12 | Symantec Corporation | API-profile guided unpacking |
US7805289B2 (en) * | 2006-07-10 | 2010-09-28 | Microsoft Corporation | Aligning hierarchal and sequential document trees to identify parallel data |
US8700915B2 (en) * | 2006-07-12 | 2014-04-15 | Irdeto Corporate B.V. | Method and system for verifying authenticity of at least part of an execution environment for executing a computer module |
US8392996B2 (en) * | 2006-08-08 | 2013-03-05 | Symantec Corporation | Malicious software detection |
US20080099141A1 (en) * | 2006-10-26 | 2008-05-01 | Ashland Inc. | Method of producing flexible laminates |
US8584109B2 (en) * | 2006-10-27 | 2013-11-12 | Microsoft Corporation | Virtualization for diversified tamper resistance |
US8286138B2 (en) * | 2007-01-30 | 2012-10-09 | Microsoft Corporation | Multi-threaded detection of a game software debugger |
US8356356B2 (en) * | 2007-01-30 | 2013-01-15 | Microsoft Corporation | Anti-debugger comprising spatially and temporally separate detection and response portions |
JP4903071B2 (en) * | 2007-03-15 | 2012-03-21 | 株式会社リコー | Information processing apparatus, software update method, and image processing apparatus |
US20080229115A1 (en) * | 2007-03-16 | 2008-09-18 | Microsoft Corporation | Provision of functionality via obfuscated software |
US20080263366A1 (en) * | 2007-04-19 | 2008-10-23 | Microsoft Corporation | Self-verifying software to prevent reverse engineering and piracy |
US8336107B2 (en) * | 2007-04-27 | 2012-12-18 | Angel Secure Networks, Inc. | System and methods for defending against root |
US8176473B2 (en) * | 2007-05-14 | 2012-05-08 | Microsoft Corporation | Transformations for software obfuscation and individualization |
US9545258B2 (en) | 2007-05-17 | 2017-01-17 | Boston Scientific Scimed, Inc. | Tissue aperture securing and sealing apparatuses and related methods of use |
KR100938672B1 (en) * | 2007-11-20 | 2010-01-25 | 한국전자통신연구원 | The method and apparatus for detecting dll inserted by malicious code |
US10552701B2 (en) * | 2008-02-01 | 2020-02-04 | Oath Inc. | System and method for detecting the source of media content with application to business rules |
US8856500B2 (en) | 2008-02-06 | 2014-10-07 | Nxp B.V. | Obfuscating program by scattering sequential instructions into memory regions such that jumps occur with steps of both signs in equal frequency |
EP2243098A2 (en) | 2008-02-11 | 2010-10-27 | Nxp B.V. | Method of program obfuscation and processing device for executing obfuscated programs |
US8208900B2 (en) * | 2008-03-04 | 2012-06-26 | Apple Inc. | Secure device configuration profiles |
US8176337B2 (en) * | 2008-03-12 | 2012-05-08 | Apple Inc. | Computer object code obfuscation using boot installation |
JP5230797B2 (en) * | 2008-04-02 | 2013-07-10 | ヒューレット−パッカード デベロップメント カンパニー エル.ピー. | Disk drive data encryption |
US8752185B2 (en) * | 2008-05-01 | 2014-06-10 | Yahoo! Inc. | Method for media fingerprinting |
EP2234031A1 (en) * | 2009-03-24 | 2010-09-29 | SafeNet, Inc. | Obfuscation |
US8474052B2 (en) * | 2009-12-09 | 2013-06-25 | Microsoft Corporation | User-administered license state verification |
US20110225649A1 (en) * | 2010-03-11 | 2011-09-15 | International Business Machines Corporation | Protecting Computer Systems From Malicious Software |
EP2438511B1 (en) | 2010-03-22 | 2019-07-03 | LRDC Systems, LLC | A method of identifying and protecting the integrity of a set of source data |
WO2011118034A1 (en) | 2010-03-26 | 2011-09-29 | 株式会社 東芝 | Information recording device |
US11297045B2 (en) | 2010-03-26 | 2022-04-05 | Kioxia Corporation | Information recording apparatus with shadow boot program for authentication with a server |
JP5585257B2 (en) * | 2010-07-16 | 2014-09-10 | 株式会社リコー | Image forming apparatus, device system, program management method, program |
WO2012017059A1 (en) * | 2010-08-05 | 2012-02-09 | Gemalto Sa | System and method for securely using multiple subscriber profiles with a security component and a mobile telecommunications device |
TWI420339B (en) | 2010-11-10 | 2013-12-21 | Ind Tech Res Inst | Software authorization system and method |
US8499173B2 (en) * | 2010-11-23 | 2013-07-30 | Lockheed Martin Corporation | Apparatus and method for protection of circuit boards from tampering |
US8683452B1 (en) * | 2010-12-21 | 2014-03-25 | Emc Corporation | Dynamically obfuscated javascript |
JP5932837B2 (en) | 2011-01-19 | 2016-06-08 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | Method and system for updating and authenticating code, method and system for testing program integrity |
US8930717B2 (en) | 2011-03-01 | 2015-01-06 | Angel Secure Networks, Inc. | Secure processing module and method for making the same |
US9058482B2 (en) | 2011-03-01 | 2015-06-16 | Angel Secure Networks, Inc. | Controlling user access to electronic resources without password |
JP2014515858A (en) * | 2011-04-29 | 2014-07-03 | 北京中天安泰信息科技有限公司 | Method and apparatus for recombining executing instructions |
US8516273B2 (en) * | 2011-05-31 | 2013-08-20 | Asobe Systems Incorporated | Porting digital rights management service to multiple computing platforms |
US8181035B1 (en) | 2011-06-22 | 2012-05-15 | Media Patents, S.L. | Methods, apparatus and systems to improve security in computer systems |
US8261085B1 (en) * | 2011-06-22 | 2012-09-04 | Media Patents, S.L. | Methods, apparatus and systems to improve security in computer systems |
US8595510B2 (en) | 2011-06-22 | 2013-11-26 | Media Patents, S.L. | Methods, apparatus and systems to improve security in computer systems |
US9111072B1 (en) * | 2011-08-23 | 2015-08-18 | Tectonic Labs, LLC | Anti-reverse engineering unified process |
US9519648B2 (en) * | 2011-09-27 | 2016-12-13 | International Business Machines Corporation | Software detection |
US9215225B2 (en) | 2013-03-29 | 2015-12-15 | Citrix Systems, Inc. | Mobile device locking with context |
US20140032733A1 (en) | 2011-10-11 | 2014-01-30 | Citrix Systems, Inc. | Policy-Based Application Management |
US9529996B2 (en) | 2011-10-11 | 2016-12-27 | Citrix Systems, Inc. | Controlling mobile device access to enterprise resources |
US9280377B2 (en) | 2013-03-29 | 2016-03-08 | Citrix Systems, Inc. | Application with multiple operation modes |
US8640242B2 (en) * | 2011-12-01 | 2014-01-28 | Mcafee, Inc. | Preventing and detecting print-provider startup malware |
US9052824B2 (en) * | 2012-01-26 | 2015-06-09 | Upthere, Inc. | Content addressable stores based on sibling groups |
US9608881B2 (en) * | 2012-04-13 | 2017-03-28 | International Business Machines Corporation | Service compliance enforcement using user activity monitoring and work request verification |
US10409984B1 (en) | 2012-06-15 | 2019-09-10 | Square, Inc. | Hierarchical data security measures for a mobile device |
CN102799815B (en) * | 2012-06-29 | 2015-07-29 | 安科智慧城市技术(中国)有限公司 | A kind of method and apparatus of safe loading procedure storehouse |
CN104408333B (en) * | 2012-09-24 | 2017-06-13 | 江苏理工学院 | A kind of software protecting equipment based on on-chip system multi-core integration |
US9774658B2 (en) | 2012-10-12 | 2017-09-26 | Citrix Systems, Inc. | Orchestration framework for connected devices |
US8745755B2 (en) | 2012-10-12 | 2014-06-03 | Citrix Systems, Inc. | Controlling device access to enterprise resources in an orchestration framework for connected devices |
US9516022B2 (en) | 2012-10-14 | 2016-12-06 | Getgo, Inc. | Automated meeting room |
US8910239B2 (en) | 2012-10-15 | 2014-12-09 | Citrix Systems, Inc. | Providing virtualized private network tunnels |
US20140109176A1 (en) | 2012-10-15 | 2014-04-17 | Citrix Systems, Inc. | Configuring and providing profiles that manage execution of mobile applications |
CN104854561B (en) | 2012-10-16 | 2018-05-11 | 思杰系统有限公司 | Application program for application management framework encapsulates |
US9606774B2 (en) | 2012-10-16 | 2017-03-28 | Citrix Systems, Inc. | Wrapping an application with field-programmable business logic |
US20140108793A1 (en) | 2012-10-16 | 2014-04-17 | Citrix Systems, Inc. | Controlling mobile device access to secure data |
US9971585B2 (en) | 2012-10-16 | 2018-05-15 | Citrix Systems, Inc. | Wrapping unmanaged applications on a mobile device |
GB2505531B (en) * | 2012-11-16 | 2015-01-07 | F Secure Corp | Methods, systems and apparatus for managing data entries on a database |
US9270660B2 (en) | 2012-11-25 | 2016-02-23 | Angel Secure Networks, Inc. | System and method for using a separate device to facilitate authentication |
JP6191619B2 (en) * | 2012-12-12 | 2017-09-06 | 日本ゼオン株式会社 | Vinyl chloride resin composition for powder molding, vinyl chloride resin molded body and laminate |
CN104969232B (en) * | 2013-03-13 | 2018-01-12 | 英特尔公司 | Management equipment driver transannular accesses |
US8875247B2 (en) * | 2013-03-14 | 2014-10-28 | Facebook, Inc. | Instant personalization security |
US10284627B2 (en) | 2013-03-29 | 2019-05-07 | Citrix Systems, Inc. | Data management for an application with multiple operation modes |
US9413736B2 (en) | 2013-03-29 | 2016-08-09 | Citrix Systems, Inc. | Providing an enterprise application store |
US9355223B2 (en) | 2013-03-29 | 2016-05-31 | Citrix Systems, Inc. | Providing a managed browser |
US9985850B2 (en) | 2013-03-29 | 2018-05-29 | Citrix Systems, Inc. | Providing mobile device management functionalities |
US9455886B2 (en) | 2013-03-29 | 2016-09-27 | Citrix Systems, Inc. | Providing mobile device management functionalities |
US8943592B1 (en) * | 2013-07-15 | 2015-01-27 | Eset, Spol. S.R.O. | Methods of detection of software exploitation |
KR101471589B1 (en) * | 2013-08-22 | 2014-12-10 | (주)잉카엔트웍스 | Method for Providing Security for Common Intermediate Language Program |
KR101503785B1 (en) * | 2013-10-10 | 2015-03-18 | (주)잉카엔트웍스 | Method And Apparatus For Protecting Dynamic Library |
DE102014204417A1 (en) | 2014-03-11 | 2015-09-17 | Siemens Aktiengesellschaft | Apparatus and method for detecting a manipulation of a program code |
US9639673B2 (en) | 2014-06-17 | 2017-05-02 | Apple Inc. | Protecting software through a fake cryptographic layer |
CN104217137B (en) * | 2014-08-29 | 2017-09-29 | 广东欧珀移动通信有限公司 | The method and device whether a kind of identification intelligent terminal system is modified |
ES2681292T3 (en) * | 2014-09-24 | 2018-09-12 | Evonik Röhm Gmbh | Molding mass equipped with impact toughness with improved property profile |
US9483381B2 (en) * | 2014-12-15 | 2016-11-01 | Dell Products L.P. | Obfuscating debugging filenames |
US10733594B1 (en) | 2015-05-11 | 2020-08-04 | Square, Inc. | Data security measures for mobile devices |
CN104933332B (en) * | 2015-06-10 | 2018-07-13 | 北京北信源软件股份有限公司 | A kind of method and device for preventing software from illegally being unloaded |
KR20170010574A (en) | 2015-07-20 | 2017-02-01 | 삼성전자주식회사 | Information processing apparatus, image processsing apparatus and control methods thereof |
WO2017146721A1 (en) | 2016-02-26 | 2017-08-31 | Hewlett Packard Enterprise Development Lp | Fault isolation in transaction logs |
US10594731B2 (en) * | 2016-03-24 | 2020-03-17 | Snowflake Inc. | Systems, methods, and devices for securely managing network connections |
US10373167B2 (en) | 2016-06-30 | 2019-08-06 | Square, Inc. | Logical validation of devices against fraud |
US10546302B2 (en) | 2016-06-30 | 2020-01-28 | Square, Inc. | Logical validation of devices against fraud and tampering |
US10474446B2 (en) * | 2016-09-16 | 2019-11-12 | Bank Of America Corporation | Installation tool for adhering to enterprise requirements |
US10404667B2 (en) * | 2016-11-17 | 2019-09-03 | Bank Of America Corporation | Secure, autonomous file encryption and decryption |
US10496993B1 (en) | 2017-02-15 | 2019-12-03 | Square, Inc. | DNS-based device geolocation |
US10552308B1 (en) | 2017-06-23 | 2020-02-04 | Square, Inc. | Analyzing attributes of memory mappings to identify processes running on a device |
US10715536B2 (en) | 2017-12-29 | 2020-07-14 | Square, Inc. | Logical validation of devices against fraud and tampering |
US11005971B2 (en) * | 2018-08-02 | 2021-05-11 | Paul Swengler | System and method for user device authentication or identity validation without passwords or matching tokens |
US11494762B1 (en) | 2018-09-26 | 2022-11-08 | Block, Inc. | Device driver for contactless payments |
US11507958B1 (en) | 2018-09-26 | 2022-11-22 | Block, Inc. | Trust-based security for transaction payments |
JP7084273B2 (en) * | 2018-10-10 | 2022-06-14 | 株式会社Nttドコモ | Obfuscation judgment device |
WO2021021949A1 (en) | 2019-07-29 | 2021-02-04 | Intertrust Technologies Corporation | Systems and methods for managing state |
US11610004B2 (en) * | 2021-04-14 | 2023-03-21 | Bank Of America Corporation | System for implementing enhanced file encryption technique |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5748739A (en) * | 1994-11-05 | 1998-05-05 | International Computers Limited | Access control for sensitive functions |
WO1999001815A1 (en) * | 1997-06-09 | 1999-01-14 | Intertrust, Incorporated | Obfuscation techniques for enhancing software security |
US5915019A (en) * | 1995-02-13 | 1999-06-22 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6236971B1 (en) * | 1994-11-23 | 2001-05-22 | Contentguard Holdings, Inc. | System for controlling the distribution and use of digital works using digital tickets |
WO2003007571A1 (en) * | 2001-07-09 | 2003-01-23 | Koninklijke Kpn N.V. | Method and system for a service process to provide a service to a client |
US20040107368A1 (en) * | 1998-06-04 | 2004-06-03 | Z4 Technologies, Inc. | Method for digital rights management including self activating/self authentication software |
Family Cites Families (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH04107631A (en) * | 1990-08-28 | 1992-04-09 | Seiko Epson Corp | Information processor |
JPH06242957A (en) * | 1993-02-16 | 1994-09-02 | Fujitsu Ltd | Program execution controller |
US6006328A (en) * | 1995-07-14 | 1999-12-21 | Christopher N. Drake | Computer software authentication, protection, and security system |
US5802368A (en) * | 1995-09-29 | 1998-09-01 | Informix Software, Inc. | Dynamic Library Task Switching |
US5794232A (en) * | 1996-03-15 | 1998-08-11 | Novell, Inc. | Catalog services for distributed directories |
US5845129A (en) | 1996-03-22 | 1998-12-01 | Philips Electronics North America Corporation | Protection domains in a single address space |
US20020002678A1 (en) * | 1998-08-14 | 2002-01-03 | Stanley T. Chow | Internet authentication technology |
US20020062451A1 (en) * | 1998-09-01 | 2002-05-23 | Scheidt Edward M. | System and method of providing communication security |
US7140005B2 (en) * | 1998-12-21 | 2006-11-21 | Intel Corporation | Method and apparatus to test an instruction sequence |
WO2000039987A1 (en) * | 1998-12-29 | 2000-07-06 | Swisscom Ag | Method and system for making objects available to users of a telecommunications network |
US6421768B1 (en) * | 1999-05-04 | 2002-07-16 | First Data Corporation | Method and system for authentication and single sign on using cryptographically assured cookies in a distributed computer environment |
US7146505B1 (en) | 1999-06-01 | 2006-12-05 | America Online, Inc. | Secure data exchange between date processing systems |
US6731756B1 (en) * | 1999-06-21 | 2004-05-04 | Elisar Software Corporation, Inc. | Method for securing video images |
WO2001008345A1 (en) | 1999-07-22 | 2001-02-01 | Open Security Solutions, Llc | A computer system and process for accessing an encrypted and self-decrypting digital information product |
US6978303B1 (en) * | 1999-10-26 | 2005-12-20 | Iontal Limited | Monitoring of computer usage |
US6898707B1 (en) * | 1999-11-30 | 2005-05-24 | Accela, Inc. | Integrating a digital signature service into a database |
EP1410658A2 (en) * | 1999-12-03 | 2004-04-21 | First Hop Oy | A method and a system for obtaining services using a cellular telecommunication system |
US7539875B1 (en) | 2000-06-27 | 2009-05-26 | Microsoft Corporation | Secure repository with layers of tamper resistance and system and method for providing same |
BRPI0017287B1 (en) * | 2000-07-25 | 2016-11-01 | Mediadna Inc | system and method of determining the authenticity of an executable image |
US7181017B1 (en) * | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
US7000100B2 (en) | 2001-05-31 | 2006-02-14 | Hewlett-Packard Development Company, L.P. | Application-level software watchdog timer |
US7424615B1 (en) * | 2001-07-30 | 2008-09-09 | Apple Inc. | Mutually authenticated secure key exchange (MASKE) |
US20040054952A1 (en) * | 2002-09-13 | 2004-03-18 | Morrow James W. | Device verification system and method |
US7320075B2 (en) | 2001-11-20 | 2008-01-15 | Safenet, Inc. | Software protection method utilizing hidden application code in a protection dynamic link library object |
US7249262B2 (en) | 2002-05-06 | 2007-07-24 | Browserkey, Inc. | Method for restricting access to a web site by remote users |
WO2003100610A1 (en) * | 2002-05-28 | 2003-12-04 | Toshiba Corporation | System update protocol and bootable cd controller |
JP2004013608A (en) * | 2002-06-07 | 2004-01-15 | Hitachi Ltd | Control for execution and transfer of program |
US7318235B2 (en) * | 2002-12-16 | 2008-01-08 | Intel Corporation | Attestation using both fixed token and portable token |
US7607009B2 (en) | 2003-02-10 | 2009-10-20 | International Business Machines Corporation | Method for distributing and authenticating public keys using time ordered exchanges |
US7251732B2 (en) | 2003-06-18 | 2007-07-31 | Microsoft Corporation | Password synchronization in a sign-on management system |
US7281271B1 (en) * | 2003-09-25 | 2007-10-09 | Symantec Corporation | Exception handling validation system and method |
US7478146B2 (en) * | 2003-11-03 | 2009-01-13 | Nokia Corporation | System, apparatus, and method for communicating capabilities of a mobile device |
US7555568B2 (en) * | 2004-02-28 | 2009-06-30 | Huang Evan S | Method and apparatus for operating a host computer from a portable apparatus |
-
2005
- 2005-02-17 US US11/061,411 patent/US7631360B2/en not_active Expired - Fee Related
- 2005-02-17 US US11/062,237 patent/US7552337B2/en not_active Expired - Fee Related
- 2005-02-17 US US11/061,791 patent/US7584509B2/en not_active Expired - Fee Related
- 2005-02-17 US US11/061,280 patent/US7891008B2/en not_active Expired - Fee Related
- 2005-02-17 US US11/062,238 patent/US7526805B2/en not_active Expired - Fee Related
- 2005-02-17 US US11/061,792 patent/US7577997B2/en not_active Expired - Fee Related
- 2005-02-17 US US11/061,484 patent/US7640592B2/en not_active Expired - Fee Related
- 2005-02-17 US US11/061,790 patent/US7559091B2/en not_active Expired - Fee Related
- 2005-06-10 EP EP05773235.6A patent/EP1757008B1/en not_active Not-in-force
- 2005-06-10 KR KR1020117021881A patent/KR101187521B1/en active IP Right Grant
- 2005-06-10 KR KR1020117021880A patent/KR101187554B1/en active IP Right Grant
- 2005-06-10 KR KR1020117021882A patent/KR101159487B1/en active IP Right Grant
- 2005-06-10 WO PCT/US2005/020638 patent/WO2005125081A2/en active Application Filing
- 2005-06-10 JP JP2007527785A patent/JP4729575B2/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5748739A (en) * | 1994-11-05 | 1998-05-05 | International Computers Limited | Access control for sensitive functions |
US6236971B1 (en) * | 1994-11-23 | 2001-05-22 | Contentguard Holdings, Inc. | System for controlling the distribution and use of digital works using digital tickets |
US5915019A (en) * | 1995-02-13 | 1999-06-22 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
WO1999001815A1 (en) * | 1997-06-09 | 1999-01-14 | Intertrust, Incorporated | Obfuscation techniques for enhancing software security |
US20040107368A1 (en) * | 1998-06-04 | 2004-06-03 | Z4 Technologies, Inc. | Method for digital rights management including self activating/self authentication software |
WO2003007571A1 (en) * | 2001-07-09 | 2003-01-23 | Koninklijke Kpn N.V. | Method and system for a service process to provide a service to a client |
Non-Patent Citations (1)
Title |
---|
LIBAR: "Unpacking by Code Injection", THE CODEBREAKERS-JOURNAL, vol. 1, no. 2, 2004, XP008113772, Retrieved from the Internet <URL:http://www.codebreakers-journal.com/include/getdoc.php?id=92> * |
Also Published As
Publication number | Publication date |
---|---|
JP2008503014A (en) | 2008-01-31 |
KR20110119809A (en) | 2011-11-02 |
US7631360B2 (en) | 2009-12-08 |
JP4729575B2 (en) | 2011-07-20 |
EP1757008A4 (en) | 2012-11-21 |
KR101187554B1 (en) | 2012-10-02 |
WO2005125081A2 (en) | 2005-12-29 |
EP1757008B1 (en) | 2018-09-26 |
US20060005249A1 (en) | 2006-01-05 |
US20060005250A1 (en) | 2006-01-05 |
US7559091B2 (en) | 2009-07-07 |
US20060005251A1 (en) | 2006-01-05 |
EP1757008A2 (en) | 2007-02-28 |
US7577997B2 (en) | 2009-08-18 |
KR101159487B1 (en) | 2012-06-22 |
US20050278535A1 (en) | 2005-12-15 |
US7640592B2 (en) | 2009-12-29 |
US7552337B2 (en) | 2009-06-23 |
US20060005252A1 (en) | 2006-01-05 |
US7891008B2 (en) | 2011-02-15 |
US20050278782A1 (en) | 2005-12-15 |
US7526805B2 (en) | 2009-04-28 |
US20050278791A1 (en) | 2005-12-15 |
KR101187521B1 (en) | 2012-10-02 |
KR20110110866A (en) | 2011-10-07 |
KR20110119808A (en) | 2011-11-02 |
US7584509B2 (en) | 2009-09-01 |
US20050278553A1 (en) | 2005-12-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2005125081A3 (en) | Securing software | |
WO2007061671A3 (en) | Systems and methods for detecting and disabling malicious script code | |
US8458785B2 (en) | Information security protection host | |
WO2004107177A3 (en) | Methods and apparatus for stride profiling a software application | |
MY149495A (en) | Authenticating an application | |
CN106462508B (en) | Access control and code scheduling | |
US20130139262A1 (en) | Taint injection and tracking | |
WO2006074294A3 (en) | Methods and apparatus providing security to computer systems and networks | |
EP1850265A3 (en) | Computer architecture for an electronic device providing SLS access to MLS file system with trusted loading and protection of program execution memory | |
WO2007130354A3 (en) | Methods and apparatus providing computer and network security for polymorphic attacks | |
WO2014070134A3 (en) | Quorum-based virtual machine security | |
GB2365554B (en) | Virtual machine support for multiple aplications | |
WO2001063405A3 (en) | System and method for minimizing inter-application interference among static synchronized methods | |
WO2009023629A3 (en) | Memory device and method having on-board address protection system for facilitating interface with multiple processors, and computer system using same | |
GB2437888A (en) | System for restricted cache access during data transfers and method thereof | |
DK2060117T3 (en) | Security processor and method of recording and medium for configuring the behavior of this processor | |
WO2008151339A3 (en) | Method and architecture for securing real-time data | |
CN104778423B (en) | The webpage integrity assurance of watermark contrast based on file driving | |
SG135132A1 (en) | Global switch resource manager | |
Wang et al. | A shared memory based cross-VM side channel attacks in IaaS cloud | |
TW200513949A (en) | Information processing device and information processing terminal | |
DE602005027454D1 (en) | IMPACT DETECTION DURING PROGRAMMING IN A COMPUTER | |
Sabt et al. | The dual-execution-environment approach: Analysis and comparative evaluation | |
HK1041380A1 (en) | Method and system for the prevention of undesirable activities of executable objects. | |
WO2008152023A3 (en) | Access to a resource by means of a security module |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2005773235 Country of ref document: EP Ref document number: 2007527785 Country of ref document: JP Ref document number: 200580019217.6 Country of ref document: CN Ref document number: 7503/DELNP/2006 Country of ref document: IN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020077000788 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 1020077000788 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 2005773235 Country of ref document: EP |