BRPI0614089A8 - Método para evitar engenharia reversa de software, modificação não autorizada e interceptação de dados de tempo de execução - Google Patents
Método para evitar engenharia reversa de software, modificação não autorizada e interceptação de dados de tempo de execuçãoInfo
- Publication number
- BRPI0614089A8 BRPI0614089A8 BRPI0614089A BRPI0614089A BRPI0614089A8 BR PI0614089 A8 BRPI0614089 A8 BR PI0614089A8 BR PI0614089 A BRPI0614089 A BR PI0614089A BR PI0614089 A BRPI0614089 A BR PI0614089A BR PI0614089 A8 BRPI0614089 A8 BR PI0614089A8
- Authority
- BR
- Brazil
- Prior art keywords
- software
- unauthorized modification
- interception
- runtime data
- reverse engineering
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 8
- 230000004048 modification Effects 0.000 title abstract 4
- 238000012986 modification Methods 0.000 title abstract 4
- 238000006243 chemical reaction Methods 0.000 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45504—Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Devices For Executing Special Programs (AREA)
- Storage Device Security (AREA)
Abstract
MÉTODO PARA EVITAR ENGENHARIA REVERSA DE SOFTWARE, MODIFICAÇÃO NÃO AUTORIZADA E INTERCEPTAÇÃO DE DADOS DE TEMPO DE EXECUÇÃO Um método para evitar a modificação desautorizada de um software ou modificação desautorizada de dados de tempo de execução. De acordo com esse método, um conversor, que é capaz de converter o software em um código de máquina generalizado é fornecido. O conversor é projetado de tal modo que não possa sofrer engenharia reversa, pelo uso de um processo de conversão que causa perda de dados. Um intérprete, cujo conhecimento de seu método de processo é mantido restrito, também é fornecido. O intérprete interpreta o código de máquina geral em um código de máquina específico, enquanto reconstrói os dados perdidos durante o processo de interpretação.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US59580205P | 2005-08-06 | 2005-08-06 | |
US60/595.802 | 2005-08-06 | ||
PCT/IL2006/000398 WO2007017856A1 (en) | 2005-08-06 | 2006-03-30 | Method for preventing software reverse engineering, unauthorized modification, and runtime data interception |
Publications (2)
Publication Number | Publication Date |
---|---|
BRPI0614089A2 BRPI0614089A2 (pt) | 2011-03-09 |
BRPI0614089A8 true BRPI0614089A8 (pt) | 2017-01-17 |
Family
ID=36648619
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BRPI0614089A BRPI0614089A8 (pt) | 2005-08-06 | 2006-03-30 | Método para evitar engenharia reversa de software, modificação não autorizada e interceptação de dados de tempo de execução |
Country Status (5)
Country | Link |
---|---|
US (2) | US8352929B2 (pt) |
CN (1) | CN101300584B (pt) |
BR (1) | BRPI0614089A8 (pt) |
RU (1) | RU2439669C2 (pt) |
WO (1) | WO2007017856A1 (pt) |
Families Citing this family (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2439669C2 (ru) | 2005-08-06 | 2012-01-10 | Майкрософт Корпорейшн | Способ предотвращения обратного инжиниринга программного обеспечения, неавторизованной модификации и перехвата данных во время выполнения |
US8464207B2 (en) * | 2007-10-12 | 2013-06-11 | Novell Intellectual Property Holdings, Inc. | System and method for tracking software changes |
CN100474253C (zh) * | 2007-11-22 | 2009-04-01 | 北京飞天诚信科技有限公司 | .Net程序保护方法及装置 |
US8776016B2 (en) * | 2009-10-29 | 2014-07-08 | Red Hat, Inc. | Integration of structured profiling data with source data in the eclipse development environment |
US8561032B2 (en) * | 2009-11-04 | 2013-10-15 | Red Hat, Inc. | Visualizing thread life time in eclipse |
US8789024B2 (en) * | 2009-11-04 | 2014-07-22 | Red Hat, Inc. | Integration of visualization with source code in the Eclipse development environment |
US8683452B1 (en) * | 2010-12-21 | 2014-03-25 | Emc Corporation | Dynamically obfuscated javascript |
BR112014028947A2 (pt) * | 2012-05-25 | 2017-06-27 | Koninklijke Philips Nv | método de configuração de um processador, dispositivo para configuração de um processador, processador, e produto de programa de computador |
US9152801B2 (en) * | 2012-06-28 | 2015-10-06 | Steven W. Cooke | Cryptographic system of symmetric-key encryption using large permutation vector keys |
CN103218551B (zh) * | 2013-05-03 | 2016-04-06 | 飞天诚信科技股份有限公司 | 一种保护java程序的方法 |
US20220012346A1 (en) * | 2013-09-13 | 2022-01-13 | Vmware, Inc. | Risk assessment for managed client devices |
US9392084B2 (en) | 2014-01-06 | 2016-07-12 | International Business Machines Corporation | Recovery of a network infrastructure to facilitate business continuity |
US9659156B1 (en) * | 2014-03-20 | 2017-05-23 | Symantec Corporation | Systems and methods for protecting virtual machine program code |
US9715433B2 (en) * | 2014-08-29 | 2017-07-25 | Netapp, Inc. | Reconciliation in sync replication |
RU2628920C2 (ru) * | 2015-03-31 | 2017-08-22 | Закрытое акционерное общество "Лаборатория Касперского" | Способ обнаружения вредоносных сборок |
RU2635271C2 (ru) * | 2015-03-31 | 2017-11-09 | Закрытое акционерное общество "Лаборатория Касперского" | Способ категоризации сборок и зависимых образов |
CN105279399A (zh) * | 2015-10-30 | 2016-01-27 | 百度在线网络技术(北京)有限公司 | 应用防破解方法和装置 |
RU2625052C1 (ru) * | 2016-03-18 | 2017-07-11 | Акционерное общество "Лаборатория Касперского" | Способ ограничения доступа образа машинного кода к ресурсам операционной системы |
WO2018081093A1 (en) * | 2016-10-24 | 2018-05-03 | Clark Carl M | Software algorithm security |
CN107292131A (zh) * | 2017-06-21 | 2017-10-24 | 北京深思数盾科技股份有限公司 | 软件保护方法和装置 |
RU2720254C1 (ru) * | 2019-12-05 | 2020-04-28 | Акционерное общество "Актив-софт" (АО "Актив-софт") | Способ восстановления и обновления программного обеспечения на смарт-карте |
US11573775B2 (en) | 2020-06-17 | 2023-02-07 | Bank Of America Corporation | Software code converter for resolving redundancy during code development |
US11782685B2 (en) | 2020-06-17 | 2023-10-10 | Bank Of America Corporation | Software code vectorization converter |
US11347500B2 (en) | 2020-06-17 | 2022-05-31 | Bank Of America Corporation | Software code converter for resolving conflicts during code development |
CN112241519A (zh) * | 2020-11-05 | 2021-01-19 | 王志平 | 一种软件版权保护的实现方法 |
CN112642157B (zh) * | 2020-12-31 | 2023-04-28 | 广州华多网络科技有限公司 | 代理开发控制方法及其相应的装置、设备、介质 |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5293576A (en) | 1991-11-21 | 1994-03-08 | Motorola, Inc. | Command authentication process |
AUPN002594A0 (en) * | 1994-12-13 | 1995-01-12 | Dunn, Alexander Atkinson | Improvements in software for the protection of executable programs, libraries and their data |
US6334189B1 (en) * | 1997-12-05 | 2001-12-25 | Jamama, Llc | Use of pseudocode to protect software from unauthorized use |
US7430670B1 (en) * | 1999-07-29 | 2008-09-30 | Intertrust Technologies Corp. | Software self-defense systems and methods |
RU2183051C2 (ru) | 2000-04-12 | 2002-05-27 | Военный университет связи | Способ формирования ключа шифрования/дешифрования |
EP1352307A2 (en) * | 2000-09-22 | 2003-10-15 | EDC Systems, Inc. | Systems and methods for preventing unauthorized use of digital content |
US7237123B2 (en) * | 2000-09-22 | 2007-06-26 | Ecd Systems, Inc. | Systems and methods for preventing unauthorized use of digital content |
DE10108487A1 (de) | 2001-02-22 | 2002-09-12 | Giesecke & Devrient Gmbh | Verfahren und System zur verteilten Erstellung eines Programms für einen programmierbaren, tragbaren Datenträger |
CA2348355A1 (en) * | 2001-05-24 | 2002-11-24 | Cloakware Corporation | General scheme of using encodings in computations |
US7383443B2 (en) | 2002-06-27 | 2008-06-03 | Microsoft Corporation | System and method for obfuscating code using instruction replacement scheme |
WO2004003264A1 (ja) * | 2002-06-28 | 2004-01-08 | Sharp Kabushiki Kaisha | 薄板製造方法および薄板製造装置 |
US7093119B2 (en) * | 2002-07-16 | 2006-08-15 | International Business Machines Corporation | Methods and computer program products for protecting source code of an interpreted programming language |
US20040128260A1 (en) | 2002-12-30 | 2004-07-01 | Nokia, Inc. | Method and system for protecting against unauthorized modification of products |
JP4193607B2 (ja) * | 2003-06-26 | 2008-12-10 | 日本電気株式会社 | データフロー制御方式、方法、およびプログラム |
GB2405958A (en) | 2003-08-20 | 2005-03-16 | Macrovision Europ Ltd | Code obfuscation and controlling a processor by emulation |
US7366914B2 (en) * | 2003-08-29 | 2008-04-29 | Intel Corporation | Source code transformation based on program operators |
MXPA06006107A (es) | 2003-12-01 | 2006-08-11 | Samsung Electronics Co Ltd | Metodo y aparato de codificacion y decodificacion escalables de video. |
RU2439669C2 (ru) | 2005-08-06 | 2012-01-10 | Майкрософт Корпорейшн | Способ предотвращения обратного инжиниринга программного обеспечения, неавторизованной модификации и перехвата данных во время выполнения |
-
2006
- 2006-03-30 RU RU2008104404/08A patent/RU2439669C2/ru not_active IP Right Cessation
- 2006-03-30 CN CN200680029302.5A patent/CN101300584B/zh not_active Expired - Fee Related
- 2006-03-30 US US12/063,104 patent/US8352929B2/en not_active Expired - Fee Related
- 2006-03-30 BR BRPI0614089A patent/BRPI0614089A8/pt not_active Application Discontinuation
- 2006-03-30 WO PCT/IL2006/000398 patent/WO2007017856A1/en active Application Filing
-
2013
- 2013-01-07 US US13/735,849 patent/US8938727B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
US8938727B2 (en) | 2015-01-20 |
US20130125243A1 (en) | 2013-05-16 |
CN101300584A (zh) | 2008-11-05 |
CN101300584B (zh) | 2012-02-29 |
US20100313188A1 (en) | 2010-12-09 |
RU2008104404A (ru) | 2009-08-10 |
BRPI0614089A2 (pt) | 2011-03-09 |
WO2007017856A1 (en) | 2007-02-15 |
RU2439669C2 (ru) | 2012-01-10 |
US8352929B2 (en) | 2013-01-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BRPI0614089A8 (pt) | Método para evitar engenharia reversa de software, modificação não autorizada e interceptação de dados de tempo de execução | |
CN103544414B (zh) | 一种Android系统应用的深度代码混淆方法 | |
DE602006007029D1 (de) | Verschleierung von Computerprogrammcodes | |
WO2007104956A3 (en) | Instrumentation for real-time performance profiling | |
BRPI0509108A (pt) | método e codificador para codificar uma pluralidade de sinais de entrada para gerar dados codificados correspondentes, método e decodificador para decodificar dados codificados para regenerar representações correspondentes de uma pluralidade de sinais de entrada, dados codificados, e, software | |
WO2007045614A3 (en) | Visualization of collaborative portlet sequences | |
WO2008067357A3 (en) | System for overriding bytecode, which should be interpreted, with native code, which can be directly executed | |
TW200502786A (en) | Type bridges | |
BRPI0406816A (pt) | Aditivos para cimento de sólidos grandes bombeáveis | |
ATE386971T1 (de) | Bereitstellung einer sicheren eingabe an ein system mit einer hochsicherheitsumgebung | |
DE602007003410D1 (de) | Datenschutzgerechte Verknüpfung von Zeichenfolgen | |
ATE238586T1 (de) | Ableitung von operandtypen innerhalb einer zwischensprache | |
WO2004010295A3 (en) | Method and apparatus for instrumentation on/off | |
WO2008005581A3 (en) | Compiled data for software applications | |
EP2290538A3 (en) | Method and device for reducing power consumption in application specific instruction set processors | |
WO2003032157A1 (en) | Compiler | |
ATE366957T1 (de) | Verfahren zur erhöhung der sicherheit einer cpu | |
BR9914396A (pt) | Processo para a proteção de endereços de entrada | |
BRPI0518346A2 (pt) | dispositivo e processo para a transmissço de dados em tempo real | |
BR112018073295A2 (pt) | armazenamento de dados estendidos | |
WO2002021233A3 (en) | Data communications | |
Viet Chu | On Generalized Zeckendorf Decompositions and Generalized Golden Strings | |
Zosa Forde et al. | The Scientific Method in the Science of Machine Learning | |
Faden | Using Autoplot Java Codes to Support Analysis in Python | |
FROESCHNER | Review of the Middle American lace bug genus Macrotingis (Heteroptera: Tingidae), with a key and a new species from México |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B25A | Requested transfer of rights approved |
Owner name: MICROSOFT CORPORATION (US) Free format text: TRANSFERIDO DE: SECURED DIMENSIONS LTD. |
|
B25A | Requested transfer of rights approved |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC (US) |
|
B07A | Application suspended after technical examination (opinion) [chapter 7.1 patent gazette] | ||
B15K | Others concerning applications: alteration of classification |
Ipc: G06F 21/14 (2013.01), G06F 21/12 (2013.01), G06F 9 |
|
B09B | Patent application refused [chapter 9.2 patent gazette] | ||
B09B | Patent application refused [chapter 9.2 patent gazette] |
Free format text: MANTIDO O INDEFERIMENTO UMA VEZ QUE NAO FOI APRESENTADO RECURSO DENTRO DO PRAZO LEGAL |