AU2016276660A1 - Potentate: A cryptography-obfuscating, self-policing, pervasive distribution system for digital content - Google Patents
Potentate: A cryptography-obfuscating, self-policing, pervasive distribution system for digital content Download PDFInfo
- Publication number
- AU2016276660A1 AU2016276660A1 AU2016276660A AU2016276660A AU2016276660A1 AU 2016276660 A1 AU2016276660 A1 AU 2016276660A1 AU 2016276660 A AU2016276660 A AU 2016276660A AU 2016276660 A AU2016276660 A AU 2016276660A AU 2016276660 A1 AU2016276660 A1 AU 2016276660A1
- Authority
- AU
- Australia
- Prior art keywords
- software
- cryptography
- asset
- data
- pct
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
- G06Q20/123—Shopping for digital content
- G06Q20/1235—Shopping for digital content with control of digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1066—Hiding content
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
- G06Q2220/10—Usage protection of distributed data files
- G06Q2220/18—Licensing
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
- User Interface Of Digital Computer (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IN1753/DEL/2015 | 2015-06-11 | ||
| IN1753DE2015 IN2015DE01753A (enExample) | 2015-06-11 | 2015-06-11 | |
| PCT/IN2016/050169 WO2016199166A1 (en) | 2015-06-11 | 2016-06-06 | Potentate: a cryptography-obfuscating, self-policing, pervasive distribution system for digital content |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| AU2016276660A1 true AU2016276660A1 (en) | 2018-01-04 |
Family
ID=54394859
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| AU2016276660A Abandoned AU2016276660A1 (en) | 2015-06-11 | 2016-06-06 | Potentate: A cryptography-obfuscating, self-policing, pervasive distribution system for digital content |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US20160364707A1 (enExample) |
| AU (1) | AU2016276660A1 (enExample) |
| IN (1) | IN2015DE01753A (enExample) |
| WO (1) | WO2016199166A1 (enExample) |
Families Citing this family (29)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10372926B1 (en) * | 2015-12-21 | 2019-08-06 | Amazon Technologies, Inc. | Passive distribution of encryption keys for distributed data stores |
| CN106909811B (zh) * | 2015-12-23 | 2020-07-03 | 腾讯科技(深圳)有限公司 | 用户标识处理的方法和装置 |
| JP2017194835A (ja) * | 2016-04-20 | 2017-10-26 | 富士通株式会社 | 認証プログラム、認証方法および認証装置 |
| US10423748B2 (en) * | 2016-07-08 | 2019-09-24 | efabless corporation | Systems and methods for obfuscating a circuit design |
| US10354069B2 (en) * | 2016-09-02 | 2019-07-16 | Bae Systems Information And Electronic Systems Integration Inc. | Automated reverse engineering |
| JP6805720B2 (ja) * | 2016-10-21 | 2020-12-23 | 富士通株式会社 | データ検索プログラム、データ検索装置およびデータ検索方法 |
| FR3063822B1 (fr) | 2017-03-10 | 2019-03-15 | Wallix | Procede d’acces a une ressource informatique securisee par une application informatique. |
| JP7059516B2 (ja) | 2017-03-29 | 2022-04-26 | 富士通株式会社 | 符号化プログラム、符号化装置および符号化方法 |
| EP3625686B1 (en) * | 2017-05-18 | 2025-02-19 | The Silk Technologies Ilc Ltd. | Garbage collection in a distributed storage system |
| EP3462308B1 (en) | 2017-09-29 | 2022-03-02 | ARM Limited | Transaction nesting depth testing instruction |
| US10706164B2 (en) * | 2017-09-29 | 2020-07-07 | Intel Corporation | Crypto-enforced capabilities for isolation |
| US11055411B2 (en) * | 2018-05-10 | 2021-07-06 | Acronis International Gmbh | System and method for protection against ransomware attacks |
| US10838715B1 (en) * | 2019-05-03 | 2020-11-17 | Servicenow, Inc. | Efficient automatic population of downgrade rights of licensed software |
| US11250165B2 (en) | 2019-12-20 | 2022-02-15 | Intel Corporation | Binding of cryptographic operations to context or speculative execution restrictions |
| US11403234B2 (en) | 2019-06-29 | 2022-08-02 | Intel Corporation | Cryptographic computing using encrypted base addresses and used in multi-tenant environments |
| US11580234B2 (en) | 2019-06-29 | 2023-02-14 | Intel Corporation | Implicit integrity for cryptographic computing |
| US12282567B2 (en) | 2019-06-29 | 2025-04-22 | Intel Corporation | Cryptographic computing using encrypted base addresses and used in multi-tenant environments |
| US11575504B2 (en) | 2019-06-29 | 2023-02-07 | Intel Corporation | Cryptographic computing engine for memory load and store units of a microarchitecture pipeline |
| CN113031930B (zh) * | 2019-12-24 | 2022-07-05 | 武汉斗鱼鱼乐网络科技有限公司 | 一种控制流平坦化的源代码混淆生成方法及装置 |
| CN111294340B (zh) * | 2020-01-17 | 2022-05-17 | 河南芯盾网安科技发展有限公司 | 基于零宽字符的加密信息隐写方法 |
| US11416621B2 (en) | 2020-06-18 | 2022-08-16 | Micron Technology, Inc. | Authenticating software images |
| US11526612B2 (en) * | 2020-09-22 | 2022-12-13 | International Business Machines Corporation | Computer file metadata segmentation security system |
| US11669625B2 (en) | 2020-12-26 | 2023-06-06 | Intel Corporation | Data type based cryptographic computing |
| US11580035B2 (en) | 2020-12-26 | 2023-02-14 | Intel Corporation | Fine-grained stack protection using cryptographic computing |
| US11625337B2 (en) | 2020-12-26 | 2023-04-11 | Intel Corporation | Encoded pointer based data encryption |
| US12306998B2 (en) | 2022-06-30 | 2025-05-20 | Intel Corporation | Stateless and low-overhead domain isolation using cryptographic computing |
| US12321467B2 (en) | 2022-06-30 | 2025-06-03 | Intel Corporation | Cryptographic computing isolation for multi-tenancy and secure software components |
| CN115396103B (zh) * | 2022-10-26 | 2023-03-24 | 杭州海康威视数字技术股份有限公司 | 基于白盒密钥的ai数据共享方法、系统和装置 |
| CN120910888A (zh) * | 2025-06-05 | 2025-11-07 | 豫北医学院 | 针对义齿加工程序进行加解密处理的方法及系统 |
Family Cites Families (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5822606A (en) * | 1996-01-11 | 1998-10-13 | Morton; Steven G. | DSP having a plurality of like processors controlled in parallel by an instruction word, and a control processor also controlled by the instruction word |
| US7810080B2 (en) * | 2003-09-15 | 2010-10-05 | Thomas Plum | Automated safe secure techniques for eliminating undefined behavior in computer software |
| CN100342296C (zh) * | 2005-09-09 | 2007-10-10 | 深圳兆日技术有限公司 | 基于可信计算模块芯片实现计算机软件防盗版的方法 |
| KR101639587B1 (ko) * | 2008-03-05 | 2016-07-14 | 이르데토 비.브이. | 암호 시스템 |
| CN101727941B (zh) * | 2008-10-24 | 2013-01-16 | 英属开曼群岛商康帝国际科技股份有限公司 | 分布式隐藏解密钥匙的方法与系统 |
| EP2430584B1 (en) * | 2009-05-06 | 2019-11-13 | Irdeto B.V. | Interlocked binary protection using whitebox cryptography |
| CN102034054A (zh) * | 2009-09-29 | 2011-04-27 | 华腾国际科技股份有限公司 | 信息验证系统 |
| JP5914962B2 (ja) * | 2010-04-09 | 2016-05-11 | ソニー株式会社 | 画像処理装置および方法、プログラム、並びに、記録媒体 |
| CN104392154B (zh) * | 2014-11-10 | 2017-06-16 | 北京深思数盾科技股份有限公司 | 一种加密方法 |
-
2015
- 2015-06-11 IN IN1753DE2015 patent/IN2015DE01753A/en unknown
- 2015-10-30 US US14/928,851 patent/US20160364707A1/en not_active Abandoned
-
2016
- 2016-06-06 WO PCT/IN2016/050169 patent/WO2016199166A1/en not_active Ceased
- 2016-06-06 AU AU2016276660A patent/AU2016276660A1/en not_active Abandoned
Also Published As
| Publication number | Publication date |
|---|---|
| IN2015DE01753A (enExample) | 2015-08-28 |
| US20160364707A1 (en) | 2016-12-15 |
| WO2016199166A1 (en) | 2016-12-15 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20160364707A1 (en) | Potentate: A Cryptography-Obfuscating, Self-Policing, Pervasive Distribution System For Digital Content | |
| CN101908119B (zh) | 一种动态链接库dll文件的处理方法和装置 | |
| US7539875B1 (en) | Secure repository with layers of tamper resistance and system and method for providing same | |
| US7287166B1 (en) | Guards for application in software tamperproofing | |
| US7051200B1 (en) | System and method for interfacing a software process to secure repositories | |
| US7739511B2 (en) | Systems and methods for watermarking software and other media | |
| US7111285B2 (en) | Method and system for protecting software applications against static and dynamic software piracy techniques | |
| JP5314016B2 (ja) | 情報処理装置、暗号鍵の管理方法、コンピュータプログラム及び集積回路 | |
| US7805375B2 (en) | Digital license migration from first platform to second platform | |
| US10678893B2 (en) | Methods and related apparatus for managing access to digital assets | |
| CN104462959A (zh) | 一种安卓应用的加固保护方法、服务器和系统 | |
| WO2002001333A2 (en) | System and method for providing an individualized secure repository | |
| KR20200017120A (ko) | 코스 스프레잉을 이용한 코드 보호 방법 및 시스템 | |
| JP2010535372A (ja) | 補助情報をデジタル署名付きコンテンツに埋め込み認証する、コンピュータにより実施される方法およびシステム | |
| KR20200017121A (ko) | 원타임 코드를 이용한 코드 보호 방법 및 시스템 | |
| JP2025116234A (ja) | ソフトウェア利用システムおよびソフトウェア利用方法 | |
| AU2023220809A1 (en) | Protecting software | |
| Valdez | Protecting executable software |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MK4 | Application lapsed section 142(2)(d) - no continuation fee paid for the application |