BR112014028947A2 - método de configuração de um processador, dispositivo para configuração de um processador, processador, e produto de programa de computador - Google Patents

método de configuração de um processador, dispositivo para configuração de um processador, processador, e produto de programa de computador

Info

Publication number
BR112014028947A2
BR112014028947A2 BR112014028947A BR112014028947A BR112014028947A2 BR 112014028947 A2 BR112014028947 A2 BR 112014028947A2 BR 112014028947 A BR112014028947 A BR 112014028947A BR 112014028947 A BR112014028947 A BR 112014028947A BR 112014028947 A2 BR112014028947 A2 BR 112014028947A2
Authority
BR
Brazil
Prior art keywords
processor
program
machine instructions
program product
bit sequence
Prior art date
Application number
BR112014028947A
Other languages
English (en)
Inventor
Charles Mallon Willem
Original Assignee
Koninklijke Philips Nv
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Nv filed Critical Koninklijke Philips Nv
Publication of BR112014028947A2 publication Critical patent/BR112014028947A2/pt

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Devices For Executing Special Programs (AREA)
  • Storage Device Security (AREA)

Abstract

resumo método de configuração de um processador, dispositivo para configuração de um processador, processador, e produto de programa de computador o uso não autorizado de programas de computador é dificultado compilando um processador ao invés de somente compilar um programa em código de máquina. a maneira na qual o processador deve responder às instruções da máquina, isto é, seus dados de decodificação, é computada de uma sequência de bits b arbitrária e um programa p como inserções. os dados de decodificação de um processador são computados, os quais executarão operações definidas pelo programa p quando o processador usa a dada sequência de bits b como uma fonte de instruções da máquina. um processador é configurado de forma a executar as instruções de máquina de acordo com os ditos dados de decodificação. outros programas p’ podem então ser compilados em instruções de máquina b’ para aquele processador e executada pelo processador. sem conhecer a sequência de bits b e o programa original p, é difícil modificar as instruções da máquina b' de forma que um processador diferente executará o outro programa p’. 1/1
BR112014028947A 2012-05-25 2013-05-17 método de configuração de um processador, dispositivo para configuração de um processador, processador, e produto de programa de computador BR112014028947A2 (pt)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
NL2008888 2012-05-25
PCT/IB2013/054042 WO2013175368A1 (en) 2012-05-25 2013-05-17 Method, system and device for protection against reverse engineering and/or tampering with programs

Publications (1)

Publication Number Publication Date
BR112014028947A2 true BR112014028947A2 (pt) 2017-06-27

Family

ID=48808407

Family Applications (1)

Application Number Title Priority Date Filing Date
BR112014028947A BR112014028947A2 (pt) 2012-05-25 2013-05-17 método de configuração de um processador, dispositivo para configuração de um processador, processador, e produto de programa de computador

Country Status (9)

Country Link
US (1) US10095847B2 (pt)
EP (1) EP2856378B1 (pt)
JP (1) JP6133409B2 (pt)
CN (1) CN104321774B (pt)
BR (1) BR112014028947A2 (pt)
MX (1) MX2014014102A (pt)
RU (1) RU2014152808A (pt)
WO (1) WO2013175368A1 (pt)
ZA (1) ZA201409425B (pt)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9659156B1 (en) * 2014-03-20 2017-05-23 Symantec Corporation Systems and methods for protecting virtual machine program code
US9501301B2 (en) * 2015-02-26 2016-11-22 Nxp B.V. Flexible instruction sets for obfuscated virtual machines
US9760736B2 (en) * 2015-09-29 2017-09-12 International Business Machines Corporation CPU obfuscation for cloud applications
CN105825089A (zh) * 2016-03-15 2016-08-03 上海斐讯数据通信技术有限公司 一种智能终端jni数据跟踪方法及系统
CN109358844A (zh) * 2018-09-30 2019-02-19 仝瑞麟 程序执行方法及装置

Family Cites Families (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH01321519A (ja) * 1988-06-24 1989-12-27 Hitachi Micro Comput Eng Ltd マイクロプロセッサ
JPH0475137A (ja) * 1990-07-18 1992-03-10 Hitachi Ltd データ処理装置
JPH07182304A (ja) * 1993-12-24 1995-07-21 Rohm Co Ltd マイクロコンピュータ及びその製造方法
US6101592A (en) * 1998-12-18 2000-08-08 Billions Of Operations Per Second, Inc. Methods and apparatus for scalable instruction set architecture with dynamic compact instructions
US6862563B1 (en) * 1998-10-14 2005-03-01 Arc International Method and apparatus for managing the configuration and functionality of a semiconductor design
US6834343B1 (en) * 1999-05-27 2004-12-21 Microsoft Corporation Method for watermarking computer programs
US7770016B2 (en) * 1999-07-29 2010-08-03 Intertrust Technologies Corporation Systems and methods for watermarking software and other media
US6757831B1 (en) * 1999-08-18 2004-06-29 Sun Microsystems, Inc. Logic block used to check instruction buffer configuration
US7080257B1 (en) * 2000-03-27 2006-07-18 Microsoft Corporation Protecting digital goods using oblivious checking
CA2435624C (en) * 2000-09-22 2013-05-07 Richard B. Levine Systems and methods for preventing unauthorized use of digital content
JP2002132364A (ja) * 2000-10-19 2002-05-10 Yutaka Iizuka プログラムを内部解析から保護する方法、コンピュータ読み取り可能な記録媒体及びプログラムの配布方法
CA2327911A1 (en) * 2000-12-08 2002-06-08 Cloakware Corporation Obscuring functions in computer software
WO2002061574A1 (en) * 2001-01-30 2002-08-08 Koninklijke Philips Electronics N.V. Computer instruction with instruction fetch control bits
US7266811B2 (en) * 2001-09-05 2007-09-04 Conexant Systems, Inc. Methods, systems, and computer program products for translating machine code associated with a first processor for execution on a second processor
JP2003288203A (ja) * 2002-03-27 2003-10-10 Asahi Kasei Corp プロセッサの開発支援装置
WO2004006075A1 (ja) * 2002-07-09 2004-01-15 Fujitsu Limited 開放型汎用耐攻撃cpu及びその応用システム
US20050028132A1 (en) 2003-07-31 2005-02-03 Srinivasamurthy Venugopal K. Application specific optimization of interpreters for embedded systems
US20050102474A1 (en) * 2003-11-06 2005-05-12 Sridhar Lakshmanamurthy Dynamically caching engine instructions
US7594221B2 (en) * 2004-04-20 2009-09-22 Hewlett-Packard Development Company, L.P. Method and apparatus for translating binary code
JP4828517B2 (ja) * 2005-02-10 2011-11-30 パナソニック株式会社 プログラム変換装置及びプログラム実行装置
JP2006286084A (ja) 2005-03-31 2006-10-19 Fujitsu Ltd 符号器、復号器および符号化方法
US8352929B2 (en) * 2005-08-06 2013-01-08 Microsoft Corporation Method for preventing software reverse engineering, unauthorized modification, and runtime data interception
US7760903B2 (en) * 2005-08-30 2010-07-20 Microsoft Corporation Tamper-resistant text stream watermarking
US20100191959A1 (en) * 2005-09-23 2010-07-29 Space Micro Inc. Secure microprocessor and method
EP2044724B1 (en) * 2006-07-12 2015-04-29 Irdeto B.V. Tamper resistance of a digital data processing unit
EP2044723A2 (en) * 2006-07-12 2009-04-08 Koninklijke Philips Electronics N.V. Verifying authenticity of an execution environment
US8505002B2 (en) * 2006-09-29 2013-08-06 Arm Limited Translation of SIMD instructions in a data processing system
US8584109B2 (en) * 2006-10-27 2013-11-12 Microsoft Corporation Virtualization for diversified tamper resistance
DE602006007029D1 (de) * 2006-12-21 2009-07-09 Ericsson Telefon Ab L M Verschleierung von Computerprogrammcodes
JP4708446B2 (ja) * 2007-03-02 2011-06-22 パナソニック株式会社 符号化装置、復号装置およびそれらの方法
US20080229115A1 (en) * 2007-03-16 2008-09-18 Microsoft Corporation Provision of functionality via obfuscated software
US20110035601A1 (en) * 2007-12-21 2011-02-10 University Of Virginia Patent Foundation System, method and computer program product for protecting software via continuous anti-tampering and obfuscation transforms
EP2430584B1 (en) * 2009-05-06 2019-11-13 Irdeto B.V. Interlocked binary protection using whitebox cryptography
US20100325446A1 (en) * 2009-06-19 2010-12-23 Joseph Martin Mordetsky Securing Executable Code Integrity Using Auto-Derivative Key
EP2388730A1 (en) * 2010-05-17 2011-11-23 Nagravision S.A. Method for generating software code
US20120159444A1 (en) * 2010-12-17 2012-06-21 Microsoft Corporation Fusing debug information from different compiler stages
US8621620B2 (en) * 2011-03-29 2013-12-31 Mcafee, Inc. System and method for protecting and securing storage devices using below-operating system trapping
US9575903B2 (en) * 2011-08-04 2017-02-21 Elwha Llc Security perimeter
JP2013070026A (ja) 2011-09-08 2013-04-18 Rohm Co Ltd 半導体装置、半導体装置の製造方法、半導体装置の実装構造、およびパワー用半導体装置

Also Published As

Publication number Publication date
MX2014014102A (es) 2015-01-26
WO2013175368A1 (en) 2013-11-28
RU2014152808A (ru) 2016-07-20
EP2856378B1 (en) 2017-12-27
ZA201409425B (en) 2017-05-31
EP2856378A1 (en) 2015-04-08
US10095847B2 (en) 2018-10-09
JP2015523635A (ja) 2015-08-13
JP6133409B2 (ja) 2017-05-24
CN104321774B (zh) 2018-08-28
US20150161363A1 (en) 2015-06-11
CN104321774A (zh) 2015-01-28

Similar Documents

Publication Publication Date Title
BR112017010225A2 (pt) complexidade de localização de ativos e recursos de língua arbitrários
BR112015030158A2 (pt) preempção de armazenamento temporário de comando intermediário para cargas de trabalho gráficas
BR112017003784A2 (pt) ferramentas de produtividade para autorização de conteúdo
BR112014028947A2 (pt) método de configuração de um processador, dispositivo para configuração de um processador, processador, e produto de programa de computador
GB2519017A (en) Next instruction access intent instruction
BR112015004684A2 (pt) geração de código nativo a partir de código de linguagem intermediária para um aplicativo
BR112013010516A2 (pt) sistema e método para gerar um modelo geoestatístico de um volume geológico relevante, que é limitado por um modelo baseado em processo do volume geológico relevante
Saini et al. A review of open source software development life cycle models
BR112017024301A2 (pt) janela de instruções e buffer de operandos de processador dissociados
WO2013134046A3 (en) Application level speculative processing
WO2015015225A3 (en) Software development tool
BR112016020148A8 (pt) método, produto de programa de computador e sistema para gerenciamento de recursos com base em perfis de utilização de recurso específicos para dispositivo ou específicos para usuário".
WO2013117995A3 (en) Environment and method for cross-platform development of software applications
BR102014015634A8 (pt) Método implementado por computador para evitar ataques contra sistemas de autorização, programa de computador, e produto de programa de computador
GB2508553A (en) Protecting memory of a virtual guest
BR112017003660A2 (pt) conjuntos de armazenamento de dados escaláveis
BR112015010016A2 (pt) compilador, computador, método de compilação e programa de computador
BR112016007492B8 (pt) Método e aparelho para otimização de recurso de memória
BR112014016536A8 (pt) dispositivo de máquina virtual; sistema de execução distribuído; método de máquina virtual; e programa de computador
BR112017005717A2 (pt) criação de tarefa com previsão de dados
MX2016012528A (es) Distribucion de multiples subprocesos en una computadora.
BR112016025864A8 (pt) Método de lançamento do aplicativo de terminal e terminal
JP2013539888A5 (pt)
MX2016012532A (es) Instruccion de inicio de ejecucion virtual para distribuir multiples subprocesos en una computadora.
BR112012026354A2 (pt) aparelho, método, programa de computador e interface de usuário

Legal Events

Date Code Title Description
B06F Objections, documents and/or translations needed after an examination request according art. 34 industrial property law
B08F Application fees: dismissal - article 86 of industrial property law

Free format text: REFERENTE A 6A ANUIDADE.

B08K Lapse as no evidence of payment of the annual fee has been furnished to inpi (acc. art. 87)

Free format text: EM VIRTUDE DO ARQUIVAMENTO PUBLICADO NA RPI 2514 DE 12-03-2019 E CONSIDERANDO AUSENCIA DE MANIFESTACAO DENTRO DOS PRAZOS LEGAIS, INFORMO QUE CABE SER MANTIDO O ARQUIVAMENTO DO PEDIDO DE PATENTE, CONFORME O DISPOSTO NO ARTIGO 12, DA RESOLUCAO 113/2013.