WO2001079969A3 - Tamper resistant software - Google Patents

Tamper resistant software Download PDF

Info

Publication number
WO2001079969A3
WO2001079969A3 PCT/CA2001/000493 CA0100493W WO0179969A3 WO 2001079969 A3 WO2001079969 A3 WO 2001079969A3 CA 0100493 W CA0100493 W CA 0100493W WO 0179969 A3 WO0179969 A3 WO 0179969A3
Authority
WO
WIPO (PCT)
Prior art keywords
data
data structures
memory
mapping
stored
Prior art date
Application number
PCT/CA2001/000493
Other languages
French (fr)
Other versions
WO2001079969A2 (en
Inventor
Harold J Johnson
Stanley T Chow
Yuan Gu
Original Assignee
Cloakware Corp
Harold J Johnson
Stanley T Chow
Yuan Gu
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cloakware Corp, Harold J Johnson, Stanley T Chow, Yuan Gu filed Critical Cloakware Corp
Priority to EP01921074A priority Critical patent/EP1309905A2/en
Priority to CA002405742A priority patent/CA2405742A1/en
Priority to US10/257,333 priority patent/US7350085B2/en
Priority to AU48189/01A priority patent/AU4818901A/en
Priority to CA002351868A priority patent/CA2351868A1/en
Publication of WO2001079969A2 publication Critical patent/WO2001079969A2/en
Publication of WO2001079969A3 publication Critical patent/WO2001079969A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Abstract

Mass data (the contents of arrays, large data structures, linked data structures and similar data structures stored in memory) are common targets for attack. The invention presents a method and system of protecting mass data by mapping virtual addresses onto randomly or pseudo-randomly selected actual addresses. This mapping distributes data values throughout the memory so an attacker cannot locate the data he is seeking, or identify patterns which might allow him to obtain information about his target (such as how the software operates, encryption keys, biometric data or passwords stored therein, or algorithms it uses). Additional layers of protection are described, as well as efficient techniques for generating the necessary transforms to perform the invention.
PCT/CA2001/000493 2000-04-12 2001-04-12 Tamper resistant software WO2001079969A2 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
EP01921074A EP1309905A2 (en) 2000-04-12 2001-04-12 Tamper resistant software
CA002405742A CA2405742A1 (en) 2000-04-12 2001-04-12 Tamper resistant software - mass data encoding
US10/257,333 US7350085B2 (en) 2000-04-12 2001-04-12 Tamper resistant software-mass data encoding
AU48189/01A AU4818901A (en) 2000-04-12 2001-04-12 Tamper resistant software - mass data encoding
CA002351868A CA2351868A1 (en) 2001-04-12 2001-06-28 Secure method and system for biometric verification

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CA2,305,078 2000-04-12
CA002305078A CA2305078A1 (en) 2000-04-12 2000-04-12 Tamper resistant software - mass data encoding

Publications (2)

Publication Number Publication Date
WO2001079969A2 WO2001079969A2 (en) 2001-10-25
WO2001079969A3 true WO2001079969A3 (en) 2003-03-13

Family

ID=4165877

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CA2001/000493 WO2001079969A2 (en) 2000-04-12 2001-04-12 Tamper resistant software

Country Status (5)

Country Link
US (1) US7350085B2 (en)
EP (1) EP1309905A2 (en)
AU (1) AU4818901A (en)
CA (1) CA2305078A1 (en)
WO (1) WO2001079969A2 (en)

Families Citing this family (131)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6957341B2 (en) 1998-05-14 2005-10-18 Purdue Research Foundation Method and system for secure computational outsourcing and disguise
US7757097B2 (en) 1999-09-03 2010-07-13 Purdue Research Foundation Method and system for tamperproofing software
CA2305078A1 (en) 2000-04-12 2001-10-12 Cloakware Corporation Tamper resistant software - mass data encoding
GB2376775B (en) * 2001-03-28 2005-05-04 Shansun Technology Company Data protection system with address re-mapping mechanism for the protected zone of storage devices or media
EP1410140B1 (en) 2001-03-28 2017-02-15 NDS Limited Digital rights management system and method
CA2363795A1 (en) 2001-11-26 2003-05-26 Cloakware Corporation Computer system protection by communication diversity
US20030167408A1 (en) * 2002-03-01 2003-09-04 Fitzpatrick Gregory P. Randomized bit dispersal of sensitive data sets
US7318163B2 (en) * 2003-01-07 2008-01-08 International Business Machines Corporation System and method for real-time detection of computer system files intrusion
US8510571B1 (en) 2003-03-24 2013-08-13 Hoi Chang System and method for inserting security mechanisms into a software program
US7257718B2 (en) 2003-05-12 2007-08-14 International Business Machines Corporation Cipher message assist instructions
US7900041B2 (en) * 2003-07-22 2011-03-01 Irdeto Canada Corporation Software conditional access system
US8060756B2 (en) * 2003-08-07 2011-11-15 Rao G R Mohan Data security and digital rights management system
GB2405958A (en) 2003-08-20 2005-03-16 Macrovision Europ Ltd Code obfuscation and controlling a processor by emulation
US7114053B2 (en) * 2003-08-21 2006-09-26 Texas Instruments Incorporated Virtual-to-physical address conversion in a secure system
US7454323B1 (en) * 2003-08-22 2008-11-18 Altera Corporation Method for creation of secure simulation models
US8539063B1 (en) 2003-08-29 2013-09-17 Mcafee, Inc. Method and system for containment of networked application client software by explicit human input
US7444396B2 (en) * 2003-08-29 2008-10-28 Sun Microsystems, Inc. Transferring system identities
US7389411B2 (en) * 2003-08-29 2008-06-17 Sun Microsystems, Inc. Secure transfer of host identities
US7447917B2 (en) * 2003-11-12 2008-11-04 Microsoft Corporation Obfuscated state store for rights management system and the like
US8156343B2 (en) 2003-11-26 2012-04-10 Intel Corporation Accessing private data about the state of a data processing machine from storage that is publicly accessible
US7840968B1 (en) 2003-12-17 2010-11-23 Mcafee, Inc. Method and system for containment of usage of language interfaces
GB0402909D0 (en) * 2004-02-10 2004-03-17 Stegostik Ltd Data storage
US7500098B2 (en) * 2004-03-19 2009-03-03 Nokia Corporation Secure mode controlled memory
US20050286719A1 (en) * 2004-06-29 2005-12-29 Canon Kabushiki Kaisha Generating entropy through image capture
US7873955B1 (en) 2004-09-07 2011-01-18 Mcafee, Inc. Solidifying the executable software set of a computer
US20070172053A1 (en) * 2005-02-11 2007-07-26 Jean-Francois Poirier Method and system for microprocessor data security
US20130247027A1 (en) * 2005-02-16 2013-09-19 Solidcore Systems, Inc. Distribution and installation of solidified software on a computer
US20060218201A1 (en) * 2005-03-24 2006-09-28 International Business Machines Corporation System and method for effecting thorough disposition of records
EP1869606A1 (en) * 2005-04-07 2007-12-26 Koninklijke Philips Electronics N.V. Software protection
EP1717723A1 (en) * 2005-04-29 2006-11-02 ST Incard S.r.l. Improved virtual machine or hardware processor for IC-card portable electronic devices
US7856661B1 (en) 2005-07-14 2010-12-21 Mcafee, Inc. Classification of software on networked systems
US20070043829A1 (en) * 2005-08-17 2007-02-22 Robin Dua Method and system for accessing a storage or computing device via the Internet
US7487178B2 (en) * 2005-10-05 2009-02-03 International Business Machines Corporation System and method for providing an object to support data structures in worm storage
US7747661B2 (en) * 2005-10-05 2010-06-29 International Business Machines Corporation System and method for providing a virtual binding for a worm storage system on rewritable media
US7996679B2 (en) 2005-10-05 2011-08-09 International Business Machines Corporation System and method for performing a trust-preserving migration of data objects from a source to a target
US7757269B1 (en) 2006-02-02 2010-07-13 Mcafee, Inc. Enforcing alignment of approved changes and deployed changes in the software change life-cycle
JP4971200B2 (en) * 2006-02-06 2012-07-11 パナソニック株式会社 Program obfuscation device
GB2435531A (en) * 2006-02-27 2007-08-29 Sharp Kk Control Flow Protection Mechanism
US7895573B1 (en) 2006-03-27 2011-02-22 Mcafee, Inc. Execution environment file inventory
US8352930B1 (en) 2006-04-24 2013-01-08 Mcafee, Inc. Software modification by group to minimize breakage
US8555404B1 (en) 2006-05-18 2013-10-08 Mcafee, Inc. Connectivity-based authorization
US8826023B1 (en) * 2006-06-30 2014-09-02 Symantec Operating Corporation System and method for securing access to hash-based storage systems
GB2440170B8 (en) 2006-07-14 2014-07-16 Vodafone Plc Digital rights management
US7519830B2 (en) * 2006-08-03 2009-04-14 Motorola, Inc. Secure storage of data
US20090249492A1 (en) * 2006-09-21 2009-10-01 Hans Martin Boesgaard Sorensen Fabrication of computer executable program files from source code
US9424154B2 (en) 2007-01-10 2016-08-23 Mcafee, Inc. Method of and system for computer system state checks
US8332929B1 (en) 2007-01-10 2012-12-11 Mcafee, Inc. Method and apparatus for process enforced configuration management
US8752032B2 (en) 2007-02-23 2014-06-10 Irdeto Canada Corporation System and method of interlocking to protect software-mediated program and device behaviours
WO2009108245A2 (en) 2007-12-21 2009-09-03 University Of Virginia Patent Foundation System, method and computer program product for protecting software via continuous anti-t ampering and obfuscation transforms
US8515075B1 (en) 2008-01-31 2013-08-20 Mcafee, Inc. Method of and system for malicious software detection using critical address space protection
WO2009098630A1 (en) * 2008-02-06 2009-08-13 Nxp B.V. Data processing device and method for executing obfuscated programs
CN101939749A (en) 2008-02-11 2011-01-05 Nxp股份有限公司 Method of program obfuscation and processing device for executing obfuscated programs
US8615502B2 (en) 2008-04-18 2013-12-24 Mcafee, Inc. Method of and system for reverse mapping vnode pointers
US8544003B1 (en) 2008-12-11 2013-09-24 Mcafee, Inc. System and method for managing virtual machine configurations
US8341627B2 (en) 2009-08-21 2012-12-25 Mcafee, Inc. Method and system for providing user space address protection from writable memory area in a virtual environment
US8381284B2 (en) 2009-08-21 2013-02-19 Mcafee, Inc. System and method for enforcing security policies in a virtual environment
EP2290547B1 (en) * 2009-08-26 2012-12-19 Nxp B.V. Method of obfuscating a code
US9552497B2 (en) 2009-11-10 2017-01-24 Mcafee, Inc. System and method for preventing data loss using virtual machine wrapped applications
CA2774728C (en) 2009-11-13 2019-02-12 Irdeto Canada Corporation System and method to protect java bytecode code against static and dynamic attacks within hostile execution environments
US8938800B2 (en) 2010-07-28 2015-01-20 Mcafee, Inc. System and method for network level protection against malicious software
US8925101B2 (en) 2010-07-28 2014-12-30 Mcafee, Inc. System and method for local protection against malicious software
US8549003B1 (en) 2010-09-12 2013-10-01 Mcafee, Inc. System and method for clustering host inventories
US9075993B2 (en) 2011-01-24 2015-07-07 Mcafee, Inc. System and method for selectively grouping and managing program files
US9112830B2 (en) 2011-02-23 2015-08-18 Mcafee, Inc. System and method for interlocking a host and a gateway
FR2974207B1 (en) * 2011-04-14 2013-05-24 In Webo Technologies METHOD AND SYSTEM FOR SECURING A SOFTWARE
US8806171B2 (en) * 2011-05-24 2014-08-12 Georgia Tech Research Corporation Systems and methods providing wear leveling using dynamic randomization for non-volatile memory
US9594881B2 (en) 2011-09-09 2017-03-14 Mcafee, Inc. System and method for passive threat detection using virtual memory inspection
CA2849292A1 (en) * 2011-09-21 2013-03-28 ValueCorp Pacific, Inc. System and method for mathematics ontology extraction and research
US9280377B2 (en) 2013-03-29 2016-03-08 Citrix Systems, Inc. Application with multiple operation modes
US8694738B2 (en) 2011-10-11 2014-04-08 Mcafee, Inc. System and method for critical address space protection in a hypervisor environment
US9143530B2 (en) 2011-10-11 2015-09-22 Citrix Systems, Inc. Secure container for protecting enterprise data on a mobile device
US8973144B2 (en) 2011-10-13 2015-03-03 Mcafee, Inc. System and method for kernel rootkit protection in a hypervisor environment
US9069586B2 (en) 2011-10-13 2015-06-30 Mcafee, Inc. System and method for kernel rootkit protection in a hypervisor environment
US8713668B2 (en) 2011-10-17 2014-04-29 Mcafee, Inc. System and method for redirected firewall discovery in a network environment
US8800024B2 (en) 2011-10-17 2014-08-05 Mcafee, Inc. System and method for host-initiated firewall discovery in a network environment
US20130275699A1 (en) * 2012-03-23 2013-10-17 Hicamp Systems, Inc. Special memory access path with segment-offset addressing
EP2831797B1 (en) * 2012-03-30 2018-05-02 Irdeto B.V. Securing accessible systems using dynamic data mangling
US8739272B1 (en) 2012-04-02 2014-05-27 Mcafee, Inc. System and method for interlocking a host and a gateway
US8910239B2 (en) 2012-10-15 2014-12-09 Citrix Systems, Inc. Providing virtualized private network tunnels
WO2014062804A1 (en) 2012-10-16 2014-04-24 Citrix Systems, Inc. Application wrapping for application management framework
US9971585B2 (en) 2012-10-16 2018-05-15 Citrix Systems, Inc. Wrapping unmanaged applications on a mobile device
US8973146B2 (en) 2012-12-27 2015-03-03 Mcafee, Inc. Herd based scan avoidance system in a network environment
US10127624B1 (en) * 2012-12-28 2018-11-13 Amazon Technologies, Inc. Block mapping in high efficiency video coding compliant encoders and decoders
FR3000826B1 (en) * 2013-01-07 2015-01-16 Morpho METHOD FOR ACCESSING ALL CELLS IN A MEMORY ZONE FOR WRITING OR READING BLOCKS IN THESE CELLS
US9262639B2 (en) * 2013-01-09 2016-02-16 Cisco Technology Inc. Plaintext injection attack protection
WO2014154280A1 (en) * 2013-03-28 2014-10-02 Irdeto B.V. Obfuscating access to a data store by a software application
US9355223B2 (en) 2013-03-29 2016-05-31 Citrix Systems, Inc. Providing a managed browser
US10284627B2 (en) 2013-03-29 2019-05-07 Citrix Systems, Inc. Data management for an application with multiple operation modes
US9985850B2 (en) 2013-03-29 2018-05-29 Citrix Systems, Inc. Providing mobile device management functionalities
JP6083348B2 (en) * 2013-07-31 2017-02-22 株式会社ソシオネクスト Program execution method and decoding apparatus
KR101328012B1 (en) * 2013-08-12 2013-11-13 숭실대학교산학협력단 Apparatus for tamper protection of application code and method thereof
WO2015060857A1 (en) 2013-10-24 2015-04-30 Mcafee, Inc. Agent assisted malicious application blocking in a network environment
US9478263B2 (en) * 2014-01-17 2016-10-25 Apple Inc. Systems and methods for monitoring and controlling repetitive accesses to volatile memory
GB201405755D0 (en) 2014-03-31 2014-05-14 Irdeto Bv Optimizing and protecting software
EP3127271B1 (en) 2014-03-31 2018-07-25 Irdeto B.V. Obfuscated performance of a predetermined function
WO2015149826A1 (en) 2014-03-31 2015-10-08 Irdeto B.V. Protecting an item of software
US9338145B2 (en) * 2014-04-28 2016-05-10 Nxp B.V. Security patch without changing the key
US9858440B1 (en) * 2014-05-23 2018-01-02 Shape Security, Inc. Encoding of sensitive data
US20160048457A1 (en) * 2014-08-13 2016-02-18 The Boeing Company Dynamic memory address remapping in computing systems
EP3198498B1 (en) 2014-09-26 2021-04-14 Irdeto B.V. A challenge-response method and associated computing device
GB201418815D0 (en) 2014-10-22 2014-12-03 Irdeto Bv Providing access to content
EP3012764A1 (en) 2014-10-24 2016-04-27 Thomson Licensing Control flow graph flattening device and method
EP3012762A1 (en) 2014-10-24 2016-04-27 Thomson Licensing Control flow graph flattening device and method
US10223033B2 (en) * 2014-10-29 2019-03-05 International Business Machines Corporation Coordinating arrival times of data slices in a dispersed storage network
US10095582B2 (en) * 2014-10-29 2018-10-09 International Business Machines Corporation Partial rebuilding techniques in a dispersed storage unit
US10459792B2 (en) * 2014-10-29 2019-10-29 Pure Storage, Inc. Using an eventually consistent dispersed memory to implement storage tiers
US20180113747A1 (en) * 2014-10-29 2018-04-26 International Business Machines Corporation Overdrive mode for distributed storage networks
US20180101457A1 (en) * 2014-10-29 2018-04-12 International Business Machines Corporation Retrying failed write operations in a dispersed storage network
US10282135B2 (en) * 2014-10-29 2019-05-07 International Business Machines Corporation Strong consistency write threshold
US20180181332A1 (en) * 2014-10-29 2018-06-28 International Business Machines Corporation Expanding a dispersed storage network memory beyond two locations
CN108064381B (en) 2015-03-30 2021-06-18 爱迪德技术有限公司 Method for data protection
GB201505553D0 (en) 2015-03-31 2015-05-13 Irdeto Bv Online advertisements
EP3555785A1 (en) 2016-12-15 2019-10-23 Irdeto B.V. Software integrity verification
GB201703864D0 (en) 2017-03-10 2017-04-26 Irdeto Bv Secured system operation
CA3075457A1 (en) 2017-09-12 2019-03-21 Irdeto B.V. Device and method for gpu-based watermarking
DE102018108313A1 (en) * 2018-04-09 2019-10-10 Infineon Technologies Ag A method and processing apparatus for performing a grid-based cryptographic operation
US10984139B2 (en) * 2018-04-10 2021-04-20 Visa International Service Association Tamper-resistant data encoding for mobile devices
US11017128B2 (en) 2018-05-22 2021-05-25 Seagate Technology Llc Data security using bit transposition during memory accesses
US10797868B2 (en) 2018-05-31 2020-10-06 Irdeto B.V. Shared secret establishment
US11074324B2 (en) 2018-09-05 2021-07-27 International Business Machines Corporation Preventing software application tampering
US11741196B2 (en) 2018-11-15 2023-08-29 The Research Foundation For The State University Of New York Detecting and preventing exploits of software vulnerability using instruction tags
US20220114110A1 (en) * 2019-01-10 2022-04-14 Nippon Telegraph And Telephone Corporation Secure array access apparatus, secure array access method, and program
JP7168776B2 (en) * 2019-05-07 2022-11-09 株式会社日立製作所 Information processing method, information processing device and storage medium
US11347860B2 (en) * 2019-06-28 2022-05-31 Seagate Technology Llc Randomizing firmware loaded to a processor memory
US10735189B2 (en) 2019-07-01 2020-08-04 Alibaba Group Holding Limited Data exchange for multi-party computation
US11263316B2 (en) 2019-08-20 2022-03-01 Irdeto B.V. Securing software routines
KR20210154017A (en) * 2020-06-11 2021-12-20 라인플러스 주식회사 Method and system for protecting file using class dispersion and sequential memory loading
US11316658B2 (en) 2020-07-20 2022-04-26 Bank Of America Corporation System and method for securing a database by scrambling data
CN112328291A (en) * 2020-12-11 2021-02-05 上海市民信箱信息服务有限公司 APP light application market software version control method
CN113791838A (en) * 2021-08-20 2021-12-14 深圳市元征科技股份有限公司 Program file calling method and device and storage medium
EP4339835A1 (en) 2022-09-16 2024-03-20 Irdeto B.V. Machine learning model protection

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5081675A (en) * 1989-11-13 1992-01-14 Kitti Kittirutsunetorn System for protection of software in memory against unauthorized use
US5095525A (en) * 1989-06-26 1992-03-10 Rockwell International Corporation Memory transformation apparatus and method
WO1999001815A1 (en) * 1997-06-09 1999-01-14 Intertrust, Incorporated Obfuscation techniques for enhancing software security
EP0908810A2 (en) * 1997-10-10 1999-04-14 General Instrument Corporation Secure processor with external memory using block chaining and block re-ordering

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4135240A (en) * 1973-07-09 1979-01-16 Bell Telephone Laboratories, Incorporated Protection of data file contents
US4064558A (en) * 1976-10-22 1977-12-20 General Electric Company Method and apparatus for randomizing memory site usage
US4215402A (en) * 1978-10-23 1980-07-29 International Business Machines Corporation Hash index table hash generator apparatus
US4812981A (en) * 1985-10-24 1989-03-14 Prime Computer, Inc. Memory management system improving the efficiency of fork operations
JPH0285927A (en) * 1988-09-22 1990-03-27 Hitachi Vlsi Eng Corp Memory device
US5123045A (en) * 1989-08-18 1992-06-16 Massachusetts Institute Of Technology Comprehensive software protection system
WO1994003856A1 (en) * 1992-08-07 1994-02-17 Massachusetts Institute Of Technology Column-associative cache
US6115802A (en) * 1995-10-13 2000-09-05 Sun Mircrosystems, Inc. Efficient hash table for use in multi-threaded environments
US6192475B1 (en) * 1997-03-31 2001-02-20 David R. Wallace System and method for cloaking software
US5899994A (en) * 1997-06-26 1999-05-04 Sun Microsystems, Inc. Flexible translation storage buffers for virtual address translation
US6167392A (en) * 1997-10-09 2000-12-26 Telcordia Technologies, Inc. Method and apparatus for private information retrieval from a single electronic storage device
FR2787216B1 (en) * 1998-12-11 2001-07-27 Bull Cp8 METHOD FOR STORAGE AND OPERATION OF INFORMATION UNITS IN A SECURITY MODULE, AND ASSOCIATED SECURITY MODULE
US6779114B1 (en) * 1999-08-19 2004-08-17 Cloakware Corporation Tamper resistant software-control flow encoding
CA2305078A1 (en) 2000-04-12 2001-10-12 Cloakware Corporation Tamper resistant software - mass data encoding
CA2447451C (en) * 2000-05-12 2013-02-12 Xtreamlok Pty. Ltd. Information security method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5095525A (en) * 1989-06-26 1992-03-10 Rockwell International Corporation Memory transformation apparatus and method
US5081675A (en) * 1989-11-13 1992-01-14 Kitti Kittirutsunetorn System for protection of software in memory against unauthorized use
WO1999001815A1 (en) * 1997-06-09 1999-01-14 Intertrust, Incorporated Obfuscation techniques for enhancing software security
EP0908810A2 (en) * 1997-10-10 1999-04-14 General Instrument Corporation Secure processor with external memory using block chaining and block re-ordering

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"DATA SECURITY METHOD FOR STORAGE DEVICE", IBM TECHNICAL DISCLOSURE BULLETIN, IBM CORP. NEW YORK, US, vol. 38, no. 5, 1 May 1995 (1995-05-01), pages 23, XP000519482, ISSN: 0018-8689 *

Also Published As

Publication number Publication date
WO2001079969A2 (en) 2001-10-25
US20030163718A1 (en) 2003-08-28
EP1309905A2 (en) 2003-05-14
US7350085B2 (en) 2008-03-25
AU4818901A (en) 2001-10-30
CA2305078A1 (en) 2001-10-12

Similar Documents

Publication Publication Date Title
WO2001079969A3 (en) Tamper resistant software
US20220014505A1 (en) Systems and methods for dynamically and randomly encrypting and decrypting data
CA2350029A1 (en) Sustainable digital watermarking via tamper-resistant software
EP1407339B1 (en) Firmware validation
EP1043862A3 (en) Generation of repeatable cryptographic key based on varying parameters
WO2004111760A3 (en) Application layer security method and system
CA2287871A1 (en) Secure document management system
US20150105047A1 (en) Methods of determining and transmitting messages
EP0821326A3 (en) Method and system for the secure transmission and storage of protectable information
WO2003003169A3 (en) Secure method and system for biometric verification
WO2003005638A8 (en) Method for an integrated protection system of data distributed processing in computer networks and system for carrying out said method
WO2001086372A3 (en) Information security method and system
WO2008033236A3 (en) System and methods for an identity theft protection bot
CA2258087A1 (en) Tamper resistant methods and apparatus
CA2115905A1 (en) Secure personal identification instrument and method for creating same
Jain et al. Attacks on biometric systems: an overview
WO2002103496A3 (en) An electronic data vault providing biometrically protected electronic signatures
WO2000004422A2 (en) Method for image processing to facilitate copy protection
CA2676921A1 (en) Password protection system and method
ATE289093T1 (en) METHOD AND SYSTEM FOR PROTECTING AGAINST INTRUSION IN A COMMUNICATION DEVICE
CN109196507A (en) For providing the method and apparatus of cryptosecurity function for the operation of equipment
CN110457948A (en) A kind of dynamic data means of defence and system based on store instruction randomization
RU2346397C1 (en) Method of protecting personal biometrical identification and authentification data
Laribee et al. Analysis and defensive tools for social-engineering attacks on computer systems
RU2391704C1 (en) Method for generation of electronic biometric id card

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 2001921074

Country of ref document: EP

AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2405742

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 10257333

Country of ref document: US

WWP Wipo information: published in national office

Ref document number: 2001921074

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 2001921074

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: JP