AU2016276660A1 - Potentate: A cryptography-obfuscating, self-policing, pervasive distribution system for digital content - Google Patents

Potentate: A cryptography-obfuscating, self-policing, pervasive distribution system for digital content Download PDF

Info

Publication number
AU2016276660A1
AU2016276660A1 AU2016276660A AU2016276660A AU2016276660A1 AU 2016276660 A1 AU2016276660 A1 AU 2016276660A1 AU 2016276660 A AU2016276660 A AU 2016276660A AU 2016276660 A AU2016276660 A AU 2016276660A AU 2016276660 A1 AU2016276660 A1 AU 2016276660A1
Authority
AU
Australia
Prior art keywords
software
cryptography
asset
data
pct
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2016276660A
Other languages
English (en)
Inventor
Pradeep Varma
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of AU2016276660A1 publication Critical patent/AU2016276660A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/123Shopping for digital content
    • G06Q20/1235Shopping for digital content with control of digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1066Hiding content
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • G06Q2220/10Usage protection of distributed data files
    • G06Q2220/18Licensing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)
  • User Interface Of Digital Computer (AREA)
AU2016276660A 2015-06-11 2016-06-06 Potentate: A cryptography-obfuscating, self-policing, pervasive distribution system for digital content Abandoned AU2016276660A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
IN1753/DEL/2015 2015-06-11
IN1753DE2015 IN2015DE01753A (enExample) 2015-06-11 2015-06-11
PCT/IN2016/050169 WO2016199166A1 (en) 2015-06-11 2016-06-06 Potentate: a cryptography-obfuscating, self-policing, pervasive distribution system for digital content

Publications (1)

Publication Number Publication Date
AU2016276660A1 true AU2016276660A1 (en) 2018-01-04

Family

ID=54394859

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2016276660A Abandoned AU2016276660A1 (en) 2015-06-11 2016-06-06 Potentate: A cryptography-obfuscating, self-policing, pervasive distribution system for digital content

Country Status (4)

Country Link
US (1) US20160364707A1 (enExample)
AU (1) AU2016276660A1 (enExample)
IN (1) IN2015DE01753A (enExample)
WO (1) WO2016199166A1 (enExample)

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10372926B1 (en) * 2015-12-21 2019-08-06 Amazon Technologies, Inc. Passive distribution of encryption keys for distributed data stores
CN106909811B (zh) * 2015-12-23 2020-07-03 腾讯科技(深圳)有限公司 用户标识处理的方法和装置
JP2017194835A (ja) * 2016-04-20 2017-10-26 富士通株式会社 認証プログラム、認証方法および認証装置
US10423748B2 (en) * 2016-07-08 2019-09-24 efabless corporation Systems and methods for obfuscating a circuit design
US10354069B2 (en) * 2016-09-02 2019-07-16 Bae Systems Information And Electronic Systems Integration Inc. Automated reverse engineering
JP6805720B2 (ja) * 2016-10-21 2020-12-23 富士通株式会社 データ検索プログラム、データ検索装置およびデータ検索方法
FR3063822B1 (fr) 2017-03-10 2019-03-15 Wallix Procede d’acces a une ressource informatique securisee par une application informatique.
JP7059516B2 (ja) 2017-03-29 2022-04-26 富士通株式会社 符号化プログラム、符号化装置および符号化方法
EP3625686B1 (en) * 2017-05-18 2025-02-19 The Silk Technologies Ilc Ltd. Garbage collection in a distributed storage system
EP3462308B1 (en) 2017-09-29 2022-03-02 ARM Limited Transaction nesting depth testing instruction
US10706164B2 (en) * 2017-09-29 2020-07-07 Intel Corporation Crypto-enforced capabilities for isolation
US11055411B2 (en) * 2018-05-10 2021-07-06 Acronis International Gmbh System and method for protection against ransomware attacks
US10838715B1 (en) * 2019-05-03 2020-11-17 Servicenow, Inc. Efficient automatic population of downgrade rights of licensed software
US11250165B2 (en) 2019-12-20 2022-02-15 Intel Corporation Binding of cryptographic operations to context or speculative execution restrictions
US11403234B2 (en) 2019-06-29 2022-08-02 Intel Corporation Cryptographic computing using encrypted base addresses and used in multi-tenant environments
US11580234B2 (en) 2019-06-29 2023-02-14 Intel Corporation Implicit integrity for cryptographic computing
US12282567B2 (en) 2019-06-29 2025-04-22 Intel Corporation Cryptographic computing using encrypted base addresses and used in multi-tenant environments
US11575504B2 (en) 2019-06-29 2023-02-07 Intel Corporation Cryptographic computing engine for memory load and store units of a microarchitecture pipeline
CN113031930B (zh) * 2019-12-24 2022-07-05 武汉斗鱼鱼乐网络科技有限公司 一种控制流平坦化的源代码混淆生成方法及装置
CN111294340B (zh) * 2020-01-17 2022-05-17 河南芯盾网安科技发展有限公司 基于零宽字符的加密信息隐写方法
US11416621B2 (en) 2020-06-18 2022-08-16 Micron Technology, Inc. Authenticating software images
US11526612B2 (en) * 2020-09-22 2022-12-13 International Business Machines Corporation Computer file metadata segmentation security system
US11669625B2 (en) 2020-12-26 2023-06-06 Intel Corporation Data type based cryptographic computing
US11580035B2 (en) 2020-12-26 2023-02-14 Intel Corporation Fine-grained stack protection using cryptographic computing
US11625337B2 (en) 2020-12-26 2023-04-11 Intel Corporation Encoded pointer based data encryption
US12306998B2 (en) 2022-06-30 2025-05-20 Intel Corporation Stateless and low-overhead domain isolation using cryptographic computing
US12321467B2 (en) 2022-06-30 2025-06-03 Intel Corporation Cryptographic computing isolation for multi-tenancy and secure software components
CN115396103B (zh) * 2022-10-26 2023-03-24 杭州海康威视数字技术股份有限公司 基于白盒密钥的ai数据共享方法、系统和装置
CN120910888A (zh) * 2025-06-05 2025-11-07 豫北医学院 针对义齿加工程序进行加解密处理的方法及系统

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5822606A (en) * 1996-01-11 1998-10-13 Morton; Steven G. DSP having a plurality of like processors controlled in parallel by an instruction word, and a control processor also controlled by the instruction word
US7810080B2 (en) * 2003-09-15 2010-10-05 Thomas Plum Automated safe secure techniques for eliminating undefined behavior in computer software
CN100342296C (zh) * 2005-09-09 2007-10-10 深圳兆日技术有限公司 基于可信计算模块芯片实现计算机软件防盗版的方法
KR101639587B1 (ko) * 2008-03-05 2016-07-14 이르데토 비.브이. 암호 시스템
CN101727941B (zh) * 2008-10-24 2013-01-16 英属开曼群岛商康帝国际科技股份有限公司 分布式隐藏解密钥匙的方法与系统
EP2430584B1 (en) * 2009-05-06 2019-11-13 Irdeto B.V. Interlocked binary protection using whitebox cryptography
CN102034054A (zh) * 2009-09-29 2011-04-27 华腾国际科技股份有限公司 信息验证系统
JP5914962B2 (ja) * 2010-04-09 2016-05-11 ソニー株式会社 画像処理装置および方法、プログラム、並びに、記録媒体
CN104392154B (zh) * 2014-11-10 2017-06-16 北京深思数盾科技股份有限公司 一种加密方法

Also Published As

Publication number Publication date
IN2015DE01753A (enExample) 2015-08-28
US20160364707A1 (en) 2016-12-15
WO2016199166A1 (en) 2016-12-15

Similar Documents

Publication Publication Date Title
US20160364707A1 (en) Potentate: A Cryptography-Obfuscating, Self-Policing, Pervasive Distribution System For Digital Content
CN101908119B (zh) 一种动态链接库dll文件的处理方法和装置
US7539875B1 (en) Secure repository with layers of tamper resistance and system and method for providing same
US7287166B1 (en) Guards for application in software tamperproofing
US7051200B1 (en) System and method for interfacing a software process to secure repositories
US7739511B2 (en) Systems and methods for watermarking software and other media
US7111285B2 (en) Method and system for protecting software applications against static and dynamic software piracy techniques
JP5314016B2 (ja) 情報処理装置、暗号鍵の管理方法、コンピュータプログラム及び集積回路
US7805375B2 (en) Digital license migration from first platform to second platform
US10678893B2 (en) Methods and related apparatus for managing access to digital assets
CN104462959A (zh) 一种安卓应用的加固保护方法、服务器和系统
WO2002001333A2 (en) System and method for providing an individualized secure repository
KR20200017120A (ko) 코스 스프레잉을 이용한 코드 보호 방법 및 시스템
JP2010535372A (ja) 補助情報をデジタル署名付きコンテンツに埋め込み認証する、コンピュータにより実施される方法およびシステム
KR20200017121A (ko) 원타임 코드를 이용한 코드 보호 방법 및 시스템
JP2025116234A (ja) ソフトウェア利用システムおよびソフトウェア利用方法
AU2023220809A1 (en) Protecting software
Valdez Protecting executable software

Legal Events

Date Code Title Description
MK4 Application lapsed section 142(2)(d) - no continuation fee paid for the application