AU2001294009A1 - Methods of providing java tamperproofing - Google Patents

Methods of providing java tamperproofing

Info

Publication number
AU2001294009A1
AU2001294009A1 AU2001294009A AU9400901A AU2001294009A1 AU 2001294009 A1 AU2001294009 A1 AU 2001294009A1 AU 2001294009 A AU2001294009 A AU 2001294009A AU 9400901 A AU9400901 A AU 9400901A AU 2001294009 A1 AU2001294009 A1 AU 2001294009A1
Authority
AU
Australia
Prior art keywords
tamperproofing
methods
providing java
java
providing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2001294009A
Other languages
English (en)
Inventor
Martin Richard Lambert
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sealedmedia Ltd
Original Assignee
Sealedmedia Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sealedmedia Ltd filed Critical Sealedmedia Ltd
Publication of AU2001294009A1 publication Critical patent/AU2001294009A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
AU2001294009A 2000-10-11 2001-10-11 Methods of providing java tamperproofing Abandoned AU2001294009A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
GB0024918 2000-10-11
GBGB0024918.5A GB0024918D0 (en) 2000-10-11 2000-10-11 Method of providing java tamperproofing
GB0024918.5 2000-10-11
PCT/GB2001/004533 WO2002031648A2 (en) 2000-10-11 2001-10-11 Methods of providing java tamperproofing

Publications (1)

Publication Number Publication Date
AU2001294009A1 true AU2001294009A1 (en) 2002-04-22

Family

ID=9901089

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2001294009A Abandoned AU2001294009A1 (en) 2000-10-11 2001-10-11 Methods of providing java tamperproofing

Country Status (5)

Country Link
US (1) US7590863B2 (de)
EP (2) EP1325411B1 (de)
AU (1) AU2001294009A1 (de)
GB (1) GB0024918D0 (de)
WO (1) WO2002031648A2 (de)

Families Citing this family (92)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002215411A (ja) * 2001-01-19 2002-08-02 Hitachi Ltd Javaアプリケーション実行装置
US20030046274A1 (en) * 2001-08-30 2003-03-06 Erickson John S. Software media container
EP1546892B1 (de) * 2002-09-04 2017-03-29 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Schutz von mobilcode vor böswilligen hosts querverweise auf verwandte anmeldungen
US6792460B2 (en) * 2002-10-02 2004-09-14 Mercury Interactive Corporation System and methods for monitoring application server performance
GB0310142D0 (en) * 2003-05-02 2003-06-04 Bitarts Ltd Delivering a software component
CN103001923B (zh) 2003-06-05 2016-03-30 英特特拉斯特技术公司 用于控制对在计算机系统上的电子内容片段的访问的方法和系统
US7272228B2 (en) * 2003-06-12 2007-09-18 International Business Machines Corporation System and method for securing code and ensuring proper execution using state-based encryption
GB2405958A (en) * 2003-08-20 2005-03-16 Macrovision Europ Ltd Code obfuscation and controlling a processor by emulation
US8336105B2 (en) * 2003-10-31 2012-12-18 Telefonaktiebolaget Lm Ericsson (Publ) Method and devices for the control of the usage of content
US7882496B2 (en) * 2004-06-01 2011-02-01 International Business Machines Corporation Method and system for metering execution of interpreted programs
JP4227565B2 (ja) * 2004-06-11 2009-02-18 キヤノン株式会社 印刷システム、管理サーバ装置、それらの制御方法、プログラム及び記憶媒体
WO2006016407A1 (ja) * 2004-08-12 2006-02-16 Fujitsu Limited Javaアプレット、JARファイル生成方法、JARファイル生成プログラム、JARファイル生成装置
US20060037005A1 (en) * 2004-08-15 2006-02-16 Russell Paul F Method and apparatus for increasing computer security
JP5013477B2 (ja) 2004-11-09 2012-08-29 トムソン ライセンシング 別個の記憶媒体上のコンテンツの結合
FI20041517A0 (fi) 2004-11-25 2004-11-25 Nokia Corp Menetelmä elektroniikkalaitteiden ohjelmien turvalliseen tulkintaan
JP4638505B2 (ja) * 2004-11-24 2011-02-23 ノキア コーポレイション 電子デバイス内の安全なプログラム解釈方法
DE102004061634A1 (de) * 2004-12-17 2006-06-29 Siemens Ag Verfahren und Vorrichtung zur Verschlüsselung und Ausführung einer Software-Bibliothek
US20060156418A1 (en) * 2005-01-10 2006-07-13 Ibm Corporation Method and apparatus for preventing unauthorized access to data
US7716743B2 (en) * 2005-01-14 2010-05-11 Microsoft Corporation Privacy friendly malware quarantines
FR2887097A1 (fr) * 2005-06-14 2006-12-15 France Telecom Procede de protection d'un code-source en langage semi-interprete
US20070016893A1 (en) * 2005-07-14 2007-01-18 International Business Machines Corporation Tracking resource usage by applications
US8838974B2 (en) * 2005-07-15 2014-09-16 The Mathworks, Inc. System and method for verifying the integrity of read-only components in deployed mixed-mode applications
JPWO2007011001A1 (ja) * 2005-07-22 2009-02-05 パナソニック株式会社 実行装置
WO2007035062A1 (en) * 2005-09-22 2007-03-29 Kt Corporation Method for generating standard file based on steganography technology, and apparatus and method for validating integrity of metadata in the standard file
US9626667B2 (en) * 2005-10-18 2017-04-18 Intertrust Technologies Corporation Digital rights management engine systems and methods
CA2626244A1 (en) 2005-10-18 2007-04-26 Intertrust Technologies Corporation Methods for evaluating licenses containing control programs by a drm engine
KR100765772B1 (ko) * 2005-11-04 2007-10-15 삼성전자주식회사 자바 애플리케이션의 인증을 위한 클래스 라이브러리풋프린트 파일 및 이를 이용한 인증 방법
GB0522938D0 (en) * 2005-11-10 2005-12-21 Ibm System and method for matching of classpaths in a shared classes system
US7954092B2 (en) * 2005-12-24 2011-05-31 International Business Machines Corporation Creating an assured execution environment for at least one computer program executable on a computer system
US8214296B2 (en) * 2006-02-14 2012-07-03 Microsoft Corporation Disaggregated secure execution environment
US20070234337A1 (en) * 2006-03-31 2007-10-04 Prowess Consulting, Llc System and method for sanitizing a computer program
US9547485B2 (en) * 2006-03-31 2017-01-17 Prowess Consulting, Llc System and method for deploying a virtual machine
EP1850260A1 (de) * 2006-04-26 2007-10-31 Macrovision Corporation Verfahren und System zum Binden von einem ausführbaren Code zur Verwaltung von Digitalen Rechten an eine Softwareanwendung
US8458673B2 (en) * 2006-04-26 2013-06-04 Flexera Software Llc Computer-implemented method and system for binding digital rights management executable code to a software application
US8341747B2 (en) * 2006-08-08 2012-12-25 International Business Machines Corporation Method to provide a secure virtual machine launcher
US8321666B2 (en) * 2006-08-15 2012-11-27 Sap Ag Implementations of secure computation protocols
US20080115125A1 (en) * 2006-11-13 2008-05-15 Cingular Wireless Ii, Llc Optimizing static dictionary usage for signal compression and for hypertext transfer protocol compression in a wireless network
US7796592B2 (en) * 2006-11-13 2010-09-14 At&T Mobility Ii Llc Optimizing static dictionary usage for signal, hypertext transfer protocol and bytecode compression in a wireless network
US8312558B2 (en) 2007-01-03 2012-11-13 At&T Intellectual Property I, L.P. System and method of managing protected video content
US9069638B2 (en) * 2007-06-11 2015-06-30 Red Hat, Inc. Update system to synchronize changes from external sources for a java virtual machine
US8296848B1 (en) * 2007-06-20 2012-10-23 Symantec Corporation Control flow redirection and analysis for detecting vulnerability exploitation
US8671166B2 (en) * 2007-08-09 2014-03-11 Prowess Consulting, Llc Methods and systems for deploying hardware files to a computer
CN101836214A (zh) * 2007-08-29 2010-09-15 僖迪网络科技株式会社 对数字媒体内容未经许可的复制的保护
US9984369B2 (en) 2007-12-19 2018-05-29 At&T Intellectual Property I, L.P. Systems and methods to identify target video content
US8051111B2 (en) 2008-01-31 2011-11-01 Prowess Consulting, Llc Method and system for modularizing windows imaging format
US9928349B2 (en) * 2008-02-14 2018-03-27 International Business Machines Corporation System and method for controlling the disposition of computer-based objects
US8364984B2 (en) * 2009-03-13 2013-01-29 Microsoft Corporation Portable secure data files
US20100312805A1 (en) * 2009-05-08 2010-12-09 Noonan Iii Donal Charles System and method for capturing, managing, and distributing computer files
US9954875B2 (en) 2009-06-26 2018-04-24 International Business Machines Corporation Protecting from unintentional malware download
US8578175B2 (en) 2011-02-23 2013-11-05 International Business Machines Corporation Secure object having protected region, integrity tree, and unprotected region
US8954752B2 (en) * 2011-02-23 2015-02-10 International Business Machines Corporation Building and distributing secure object software
US9298894B2 (en) 2009-06-26 2016-03-29 International Business Machines Corporation Cache structure for a computer system providing support for secure objects
US9846789B2 (en) 2011-09-06 2017-12-19 International Business Machines Corporation Protecting application programs from malicious software or malware
US8819446B2 (en) 2009-06-26 2014-08-26 International Business Machines Corporation Support for secure objects in a computer system
DE102009052457A1 (de) 2009-11-09 2011-05-26 Siemens Aktiengesellschaft Verfahren und System zum Auslösen eines Namenskonfliktes
WO2011057393A1 (en) 2009-11-13 2011-05-19 Irdeto Canada Corporation System and method to protect java bytecode code against static and dynamic attacks within hostile execution environments
US8831993B2 (en) 2010-03-19 2014-09-09 Novell, Inc. Techniques for sharing virtual machine (VM) resources
US9189211B1 (en) * 2010-06-30 2015-11-17 Sony Computer Entertainment America Llc Method and system for transcoding data
US8464104B2 (en) 2010-09-10 2013-06-11 International Business Machines Corporation Mobility of versioned workload partitions
US9058497B2 (en) 2010-12-23 2015-06-16 Microsoft Technology Licensing, Llc Cryptographic key management
US9864853B2 (en) 2011-02-23 2018-01-09 International Business Machines Corporation Enhanced security mechanism for authentication of users of a system
US8719586B1 (en) * 2011-03-09 2014-05-06 Amazon Technologies, Inc. Digital rights management for applications
JP6047553B2 (ja) 2011-04-11 2016-12-21 インタートラスト テクノロジーズ コーポレイション 情報セキュリティのためのシステムと方法
CN102360412B (zh) * 2011-09-26 2014-07-02 飞天诚信科技股份有限公司 Java源代码的保护方法和系统
US9275233B1 (en) * 2012-12-21 2016-03-01 Emc Corporation Generation and use of a modified protected file
CN103218551B (zh) * 2013-05-03 2016-04-06 飞天诚信科技股份有限公司 一种保护java程序的方法
KR20140139392A (ko) * 2013-05-27 2014-12-05 삼성전자주식회사 모바일 장치를 위한 애플리케이션 실행 파일 생성방법, 모바일 장치의 애플리케이션 실행 방법, 애플리케이션 실행 파일 생성 장치 및 모바일 장치
US9160540B2 (en) * 2013-07-25 2015-10-13 Adobe Systems Incorporated Preventing playback of streaming video if ads are removed
KR101328012B1 (ko) * 2013-08-12 2013-11-13 숭실대학교산학협력단 애플리케이션 코드 난독화 장치 및 그 방법
KR101350390B1 (ko) * 2013-08-14 2014-01-16 숭실대학교산학협력단 코드 난독화 장치 및 그 방법
KR101471589B1 (ko) * 2013-08-22 2014-12-10 (주)잉카엔트웍스 공통중간언어 기반 프로그램을 위한 보안 제공 방법
KR101490047B1 (ko) * 2013-09-27 2015-02-04 숭실대학교산학협력단 자가변환 기반 애플리케이션 코드 난독화 장치 및 그 방법
JP2015075902A (ja) * 2013-10-08 2015-04-20 キヤノン株式会社 画像形成装置、その制御方法とプログラム
US9223965B2 (en) * 2013-12-10 2015-12-29 International Business Machines Corporation Secure generation and management of a virtual card on a mobile device
US9235692B2 (en) 2013-12-13 2016-01-12 International Business Machines Corporation Secure application debugging
US20150235042A1 (en) * 2014-02-14 2015-08-20 Symantec Corporation Systems and methods for authenticating an application
IN2014MU00819A (de) * 2014-03-11 2015-09-25 Tata Consultancy Services Ltd
CN106663025A (zh) * 2014-03-31 2017-05-10 耶德托公司 用于混淆虚拟机上的应用程序的执行的方法、装置以及计算机可读介质
US9251330B2 (en) 2014-04-09 2016-02-02 International Business Machines Corporation Secure management of a smart card
US9336018B2 (en) * 2014-05-02 2016-05-10 Oracle International Corporation Mechanism for class data sharing using extension and application class-loaders
US10475026B2 (en) 2014-05-16 2019-11-12 International Business Machines Corporation Secure management of transactions using a smart/virtual card
EP2999187B1 (de) * 2014-09-18 2017-11-15 Alcatel Lucent Verfahren, Computerprogrammprodukt und Server zum Streaming von Medieninhalten von einem Server zu einem Client
CN104915602B (zh) * 2015-04-22 2017-08-11 飞天诚信科技股份有限公司 一种Android平台下的PIN码保护方法
CN105975856B (zh) * 2015-09-25 2019-03-08 武汉安天信息技术有限责任公司 一种移动终端病毒动态检测方法及系统
US10394528B2 (en) 2016-03-30 2019-08-27 Oracle International Corporation Returning a runtime type loaded from an archive in a module system
US10191753B2 (en) 2016-03-30 2019-01-29 Oracle International Corporation Generating verification metadata and verifying a runtime type based on verification metadata
KR102009419B1 (ko) * 2017-07-20 2019-08-09 라인 가부시키가이샤 실행 가능한 압축 파일을 보호하기 위한 파일 보호 방법 및 시스템
US10681165B2 (en) * 2018-09-11 2020-06-09 Palantir Technologies Inc. System architecture for enabling efficient inter-application communications
CN110532737A (zh) * 2019-08-29 2019-12-03 深圳前海环融联易信息科技服务有限公司 Jar包加密管理方法、装置、计算机设备及存储介质
CN113961177A (zh) * 2020-07-21 2022-01-21 腾讯科技(武汉)有限公司 一种应用程序的处理方法、装置、设备及介质
US11550883B2 (en) 2020-09-08 2023-01-10 Assured Information Security, Inc. Code protection
US11615168B2 (en) * 2020-10-27 2023-03-28 Dell Products L.P. Method and system for generating and verifying licenses with multiple signatures

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6938263B2 (en) * 1996-04-23 2005-08-30 Sun Microsystems, Inc. System and method for facilitating dynamic loading of “stub” information to enable a program operating in one address space to invoke processing of a remote method or procedure in another address space
US5805829A (en) * 1996-10-01 1998-09-08 International Business Machines Corp Process for running applets over non-IP networks
JPH10301773A (ja) * 1997-04-30 1998-11-13 Sony Corp 情報処理装置および情報処理方法、並びに記録媒体
US5937411A (en) * 1997-11-21 1999-08-10 International Business Machines Corporation Method and apparatus for creating storage for java archive manifest file
US6044467A (en) * 1997-12-11 2000-03-28 Sun Microsystems, Inc. Secure class resolution, loading and definition
GB2349250A (en) * 1998-02-13 2000-10-25 Nat Computer Board Method for protecting bytecode
GB2341461B (en) * 1998-09-10 2003-03-12 Ibm Program component distribution
US6202208B1 (en) * 1998-09-29 2001-03-13 Nortel Networks Limited Patching environment for modifying a Java virtual machine and method
CA2292041A1 (en) * 1998-12-22 2000-06-22 Scott Alan Thomson Software program protection mechanism
IL132916A (en) * 1999-11-14 2004-02-08 Mcafee Inc Method and system for intercepting an application program interface
US6629128B1 (en) * 1999-11-30 2003-09-30 Recursion Software, Inc. System and method for distributed processing in a computer network

Also Published As

Publication number Publication date
EP2362324B1 (de) 2018-11-21
US7590863B2 (en) 2009-09-15
US20040039926A1 (en) 2004-02-26
EP2362324A3 (de) 2011-10-05
EP1325411B1 (de) 2018-03-07
EP1325411A2 (de) 2003-07-09
WO2002031648A3 (en) 2002-07-18
EP2362324A2 (de) 2011-08-31
GB0024918D0 (en) 2000-11-22
WO2002031648A2 (en) 2002-04-18

Similar Documents

Publication Publication Date Title
AU2001294009A1 (en) Methods of providing java tamperproofing
AU3867400A (en) Methods of using bioelastomers
AU2002227435A1 (en) Antisense modulation of calreticulin expression
AU2001261630A1 (en) Audio closure
AU2001280599A1 (en) Compounds and methods
AU2557500A (en) Methods of making compounds
AUPQ998100A0 (en) Application development
AU2001253418A1 (en) Compounds and methods
IL135466A0 (en) Enzymatic modification of sterols
AU2001243394A1 (en) Compounds and methods
AU2001265871A1 (en) Substituted sulfonylaminopyrimidines
AU2002219900A1 (en) Minimal identification of features
AU2001254731A1 (en) Substituted phenyluracils
AU2001258255A1 (en) Substituted benzoylcyclohexenones
AU2002359694A1 (en) Compounds and methods
AUPQ872300A0 (en) Compounds and methods
AU1288801A (en) Encapsulation of waste
AU2001258533A1 (en) Construction of dies
AU2001265935A1 (en) Production of biohydrolysates
AU2001278951A1 (en) Compounds and methods
AUPQ904100A0 (en) Method of encryption
AU2001266176A1 (en) Methods
AU5647501A (en) Crystallography methods
AU2002235277A1 (en) Compounds and methods
AU2001250536A1 (en) Methods