ATE520091T1 - Verfahren und vorrichtungen zur softwareverschlüsselung auf befehlsebene - Google Patents
Verfahren und vorrichtungen zur softwareverschlüsselung auf befehlsebeneInfo
- Publication number
- ATE520091T1 ATE520091T1 AT09176197T AT09176197T ATE520091T1 AT E520091 T1 ATE520091 T1 AT E520091T1 AT 09176197 T AT09176197 T AT 09176197T AT 09176197 T AT09176197 T AT 09176197T AT E520091 T1 ATE520091 T1 AT E520091T1
- Authority
- AT
- Austria
- Prior art keywords
- instruction
- encrypted
- computer code
- decryption
- code instructions
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- H—ELECTRICITY
- H01—ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
- H01L2924/00—Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
- H01L2924/30—Technical effects
- H01L2924/301—Electrical effects
- H01L2924/30107—Inductance
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP08305946A EP2196937A1 (de) | 2008-12-15 | 2008-12-15 | Verfahren und Vorrichtungen zur Softwareverschlüsselung auf Befehlsebene |
Publications (1)
Publication Number | Publication Date |
---|---|
ATE520091T1 true ATE520091T1 (de) | 2011-08-15 |
Family
ID=40627567
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AT09176197T ATE520091T1 (de) | 2008-12-15 | 2009-11-17 | Verfahren und vorrichtungen zur softwareverschlüsselung auf befehlsebene |
Country Status (7)
Country | Link |
---|---|
US (1) | US8341426B2 (de) |
EP (2) | EP2196937A1 (de) |
JP (1) | JP5184489B2 (de) |
KR (1) | KR101632658B1 (de) |
CN (1) | CN101751243B (de) |
AT (1) | ATE520091T1 (de) |
TW (1) | TWI478050B (de) |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
BR112012031052B1 (pt) * | 2010-07-22 | 2020-12-01 | Nagravision S.A. | método implementado por processador voltado para assegurar a integridade do software |
US8745408B2 (en) * | 2011-04-08 | 2014-06-03 | Infineon Technologies Ag | Instruction encryption/decryption arrangement and method with iterative encryption/decryption key update |
EP2856377B1 (de) | 2012-06-01 | 2017-09-27 | Intel Corporation | Identifizierung und ausführung von untergruppen mehrerer befehle in einer ausführungsumgebung mit erhöhter sicherheit |
US8812873B2 (en) | 2012-09-26 | 2014-08-19 | Intel Corporation | Secure execution of a computer program using binary translators |
US9311493B2 (en) * | 2013-07-30 | 2016-04-12 | Battelle Memorial Institute | System for processing an encrypted instruction stream in hardware |
EP2884692B1 (de) * | 2013-12-13 | 2020-05-20 | Nxp B.V. | Aktualisieren von software auf einem sicheren element |
US9547758B2 (en) | 2014-05-19 | 2017-01-17 | Nxp B.V. | Program cable obfuscation based upon recently executed program code |
EP2978159A1 (de) | 2014-07-21 | 2016-01-27 | Nxp B.V. | Nonce-Erzeugung zur Verschlüsselung und Entschlüsselung |
DE102015201430A1 (de) * | 2015-01-28 | 2016-07-28 | Ihp Gmbh - Innovations For High Performance Microelectronics / Leibniz-Institut Für Innovative Mikroelektronik | Intrinsische Authentifizierung von Programcode |
CN104917610B (zh) * | 2015-06-15 | 2018-03-06 | 上海交通大学 | 基于量子真随机数的通信中继服务器安全系统及方法 |
FR3047100B1 (fr) * | 2016-01-26 | 2018-03-02 | Commissariat A L'energie Atomique Et Aux Energies Alternatives | Methode de chiffrement d'un flot d'instructions et execution d'un flot d'instructions ainsi chiffre. |
TWI760546B (zh) * | 2017-08-23 | 2022-04-11 | 安地卡及巴布達商區塊鏈控股有限公司 | 用於高安全性高速資料加密及傳輸的電腦實施系統與方法 |
EP3614293A1 (de) * | 2018-08-24 | 2020-02-26 | Nagravision S.A. | Sicherung von in einem speicher einer iot-vorrichtung gespeicherten daten während eines niedrigleistungsmodus |
CN109394095B (zh) | 2018-10-23 | 2020-09-15 | 珠海市一微半导体有限公司 | 一种机器人运动地毯偏移的控制方法、芯片及清洁机器人 |
CN109698504A (zh) * | 2019-03-08 | 2019-04-30 | 张文韬 | 潮流计算结果分析方法及系统 |
EP4002165A1 (de) * | 2020-11-18 | 2022-05-25 | Thales DIS France SA | Codeflussschutz mit fehlerfortpflanzung |
US11409846B2 (en) | 2021-01-14 | 2022-08-09 | Safelishare, Inc. | User controlled trusted and isolated computing environments |
US20220342655A1 (en) * | 2021-04-22 | 2022-10-27 | STMicroelectronics (Grand Ouest) SAS | Microcontroller, computer program product, and method for adding an additional function to a computer program |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4562305A (en) * | 1982-12-22 | 1985-12-31 | International Business Machines Corporation | Software cryptographic apparatus and method |
US5386469A (en) | 1993-08-05 | 1995-01-31 | Zilog, Inc. | Firmware encryption for microprocessor/microcomputer |
US5675645A (en) * | 1995-04-18 | 1997-10-07 | Ricoh Company, Ltd. | Method and apparatus for securing executable programs against copying |
JPH1055273A (ja) * | 1996-06-05 | 1998-02-24 | Matsushita Electric Ind Co Ltd | ソフトウェア保護装置 |
US6061449A (en) * | 1997-10-10 | 2000-05-09 | General Instrument Corporation | Secure processor with external memory using block chaining and block re-ordering |
US6345359B1 (en) | 1997-11-14 | 2002-02-05 | Raytheon Company | In-line decryption for protecting embedded software |
US6333983B1 (en) * | 1997-12-16 | 2001-12-25 | International Business Machines Corporation | Method and apparatus for performing strong encryption or decryption data using special encryption functions |
US6971022B1 (en) * | 1999-06-15 | 2005-11-29 | Matsushita Electric Industrial Co., Ltd. | Cryptographic apparatus for performing cryptography on a specified area of content data |
EP1496420B1 (de) * | 2000-05-22 | 2007-07-04 | Infineon Technologies AG | Sicherheits-Datenverarbeitungseinheit sowie dazugehöriges Verfahren |
JP4098478B2 (ja) * | 2001-01-31 | 2008-06-11 | 株式会社東芝 | マイクロプロセッサ |
JP2004246637A (ja) * | 2003-02-14 | 2004-09-02 | Fainaaku Kk | 固有情報化プロセッサ、これを備えた処理装置および記憶装置、関連するプログラム実行方法、およびコンピュータプログラム |
JP2005050116A (ja) * | 2003-07-28 | 2005-02-24 | Matsushita Electric Ind Co Ltd | 命令実行装置およびその方法 |
US7996671B2 (en) | 2003-11-17 | 2011-08-09 | Bluerisc Inc. | Security of program executables and microprocessors based on compiler-architecture interaction |
JP4737592B2 (ja) * | 2005-02-16 | 2011-08-03 | ルネサスエレクトロニクス株式会社 | データ処理装置 |
US8495367B2 (en) * | 2007-02-22 | 2013-07-23 | International Business Machines Corporation | Nondestructive interception of secure data in transit |
US8538012B2 (en) * | 2007-03-14 | 2013-09-17 | Intel Corporation | Performing AES encryption or decryption in multiple modes with a single instruction |
JP2009169489A (ja) * | 2008-01-11 | 2009-07-30 | Oki Electric Ind Co Ltd | 暗号化方法、復号化方法、暗号化装置、復号化装置 |
-
2008
- 2008-12-15 EP EP08305946A patent/EP2196937A1/de not_active Withdrawn
-
2009
- 2009-11-16 JP JP2009261037A patent/JP5184489B2/ja not_active Expired - Fee Related
- 2009-11-17 AT AT09176197T patent/ATE520091T1/de not_active IP Right Cessation
- 2009-11-17 EP EP09176197A patent/EP2196938B1/de not_active Not-in-force
- 2009-11-20 TW TW098139417A patent/TWI478050B/zh not_active IP Right Cessation
- 2009-12-01 CN CN200910252802.0A patent/CN101751243B/zh not_active Expired - Fee Related
- 2009-12-10 US US12/653,224 patent/US8341426B2/en not_active Expired - Fee Related
- 2009-12-11 KR KR1020090123199A patent/KR101632658B1/ko active IP Right Grant
Also Published As
Publication number | Publication date |
---|---|
CN101751243A (zh) | 2010-06-23 |
KR20100069588A (ko) | 2010-06-24 |
US20100153745A1 (en) | 2010-06-17 |
EP2196938A1 (de) | 2010-06-16 |
KR101632658B1 (ko) | 2016-06-22 |
TW201023031A (en) | 2010-06-16 |
EP2196937A1 (de) | 2010-06-16 |
EP2196938B1 (de) | 2011-08-10 |
TWI478050B (zh) | 2015-03-21 |
CN101751243B (zh) | 2015-02-18 |
JP5184489B2 (ja) | 2013-04-17 |
JP2010140473A (ja) | 2010-06-24 |
US8341426B2 (en) | 2012-12-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ATE520091T1 (de) | Verfahren und vorrichtungen zur softwareverschlüsselung auf befehlsebene | |
JP2010140473A5 (de) | ||
JP2011187039A5 (de) | ||
KR101391982B1 (ko) | 안드로이드 어플리케이션의 디컴파일 방지를 위한 암호화 방법 | |
ATE463898T1 (de) | System und verfahren für den vergleich von privatwerten | |
DE602005023166D1 (de) | System und Verfahren zur Verschlüsselung von Tastenanschlägen bezüglich eines Passworts | |
DE602006008599D1 (de) | Verfahren zum Schutz von IC-Karten vor Leistungsanalyse-Attacken | |
WO2009044461A1 (ja) | デバイスアクセス制御プログラム、デバイスアクセス制御方法および情報処理装置 | |
BR0303651A (pt) | Aparelho, método e programa de execução de conteúdo e aparelho e sistema de gerenciamento de chave | |
WO2013130555A3 (en) | Method of operating a computing device, computing device and computer program | |
NZ720190A (en) | System and methods for encrypting data | |
GB2526040A (en) | Instruction for performing a pseudorandom number generate operation | |
GB201215241D0 (en) | Protecting application programs from malicious software or malware | |
WO2007063433A3 (en) | Program executable image encryption | |
CN102360412A (zh) | Java源代码的保护方法和系统 | |
MX2019003604A (es) | Mensaje cifrado con instruccion de autenticacion. | |
FR2950721B1 (fr) | Procede d'execution d'un algorithme de protection d'un dispositif electronique par masquage affine et dispositif associe | |
WO2013130561A3 (en) | Method of operating a computing device, computing device and computer program | |
ATE545084T1 (de) | Verfahren zum schutz einer kryptografischen vorrichtung gegen spa-, dpa- und zeitangriffe | |
CN108595198A (zh) | 一种安全的固件更新方法 | |
JP2014085674A5 (de) | ||
CN106375080B (zh) | 一种flash文件的加密及解密方法及其装置 | |
CN1477495A (zh) | 程序开发方法、程序开发支援装置及程序安装方法 | |
TW200708026A (en) | Method and system for digital rights management in a mobile multimedia processor | |
MY159284A (en) | A method for encrypting and decrypting data and a system therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |