BRPI0614089A8 - Método para evitar engenharia reversa de software, modificação não autorizada e interceptação de dados de tempo de execução - Google Patents

Método para evitar engenharia reversa de software, modificação não autorizada e interceptação de dados de tempo de execução

Info

Publication number
BRPI0614089A8
BRPI0614089A8 BRPI0614089A BRPI0614089A BRPI0614089A8 BR PI0614089 A8 BRPI0614089 A8 BR PI0614089A8 BR PI0614089 A BRPI0614089 A BR PI0614089A BR PI0614089 A BRPI0614089 A BR PI0614089A BR PI0614089 A8 BRPI0614089 A8 BR PI0614089A8
Authority
BR
Brazil
Prior art keywords
software
unauthorized modification
interception
runtime data
reverse engineering
Prior art date
Application number
BRPI0614089A
Other languages
English (en)
Inventor
Asipov Keren
Asipov Boris
Original Assignee
Secured Dimensions Ltd
Microsoft Corp
Microsoft Technology Licensing Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=36648619&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=BRPI0614089(A8) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Secured Dimensions Ltd, Microsoft Corp, Microsoft Technology Licensing Llc filed Critical Secured Dimensions Ltd
Publication of BRPI0614089A2 publication Critical patent/BRPI0614089A2/pt
Publication of BRPI0614089A8 publication Critical patent/BRPI0614089A8/pt

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45504Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Devices For Executing Special Programs (AREA)
  • Storage Device Security (AREA)

Abstract

MÉTODO PARA EVITAR ENGENHARIA REVERSA DE SOFTWARE, MODIFICAÇÃO NÃO AUTORIZADA E INTERCEPTAÇÃO DE DADOS DE TEMPO DE EXECUÇÃO Um método para evitar a modificação desautorizada de um software ou modificação desautorizada de dados de tempo de execução. De acordo com esse método, um conversor, que é capaz de converter o software em um código de máquina generalizado é fornecido. O conversor é projetado de tal modo que não possa sofrer engenharia reversa, pelo uso de um processo de conversão que causa perda de dados. Um intérprete, cujo conhecimento de seu método de processo é mantido restrito, também é fornecido. O intérprete interpreta o código de máquina geral em um código de máquina específico, enquanto reconstrói os dados perdidos durante o processo de interpretação.
BRPI0614089A 2005-08-06 2006-03-30 Método para evitar engenharia reversa de software, modificação não autorizada e interceptação de dados de tempo de execução BRPI0614089A8 (pt)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US59580205P 2005-08-06 2005-08-06
US60/595.802 2005-08-06
PCT/IL2006/000398 WO2007017856A1 (en) 2005-08-06 2006-03-30 Method for preventing software reverse engineering, unauthorized modification, and runtime data interception

Publications (2)

Publication Number Publication Date
BRPI0614089A2 BRPI0614089A2 (pt) 2011-03-09
BRPI0614089A8 true BRPI0614089A8 (pt) 2017-01-17

Family

ID=36648619

Family Applications (1)

Application Number Title Priority Date Filing Date
BRPI0614089A BRPI0614089A8 (pt) 2005-08-06 2006-03-30 Método para evitar engenharia reversa de software, modificação não autorizada e interceptação de dados de tempo de execução

Country Status (5)

Country Link
US (2) US8352929B2 (pt)
CN (1) CN101300584B (pt)
BR (1) BRPI0614089A8 (pt)
RU (1) RU2439669C2 (pt)
WO (1) WO2007017856A1 (pt)

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2439669C2 (ru) 2005-08-06 2012-01-10 Майкрософт Корпорейшн Способ предотвращения обратного инжиниринга программного обеспечения, неавторизованной модификации и перехвата данных во время выполнения
US8464207B2 (en) * 2007-10-12 2013-06-11 Novell Intellectual Property Holdings, Inc. System and method for tracking software changes
CN100474253C (zh) * 2007-11-22 2009-04-01 北京飞天诚信科技有限公司 .Net程序保护方法及装置
US8776016B2 (en) * 2009-10-29 2014-07-08 Red Hat, Inc. Integration of structured profiling data with source data in the eclipse development environment
US8561032B2 (en) * 2009-11-04 2013-10-15 Red Hat, Inc. Visualizing thread life time in eclipse
US8789024B2 (en) * 2009-11-04 2014-07-22 Red Hat, Inc. Integration of visualization with source code in the Eclipse development environment
US8683452B1 (en) * 2010-12-21 2014-03-25 Emc Corporation Dynamically obfuscated javascript
BR112014028947A2 (pt) * 2012-05-25 2017-06-27 Koninklijke Philips Nv método de configuração de um processador, dispositivo para configuração de um processador, processador, e produto de programa de computador
US9152801B2 (en) * 2012-06-28 2015-10-06 Steven W. Cooke Cryptographic system of symmetric-key encryption using large permutation vector keys
CN103218551B (zh) * 2013-05-03 2016-04-06 飞天诚信科技股份有限公司 一种保护java程序的方法
US20220012346A1 (en) * 2013-09-13 2022-01-13 Vmware, Inc. Risk assessment for managed client devices
US9392084B2 (en) 2014-01-06 2016-07-12 International Business Machines Corporation Recovery of a network infrastructure to facilitate business continuity
US9659156B1 (en) * 2014-03-20 2017-05-23 Symantec Corporation Systems and methods for protecting virtual machine program code
US9715433B2 (en) * 2014-08-29 2017-07-25 Netapp, Inc. Reconciliation in sync replication
RU2628920C2 (ru) * 2015-03-31 2017-08-22 Закрытое акционерное общество "Лаборатория Касперского" Способ обнаружения вредоносных сборок
RU2635271C2 (ru) * 2015-03-31 2017-11-09 Закрытое акционерное общество "Лаборатория Касперского" Способ категоризации сборок и зависимых образов
CN105279399A (zh) * 2015-10-30 2016-01-27 百度在线网络技术(北京)有限公司 应用防破解方法和装置
RU2625052C1 (ru) * 2016-03-18 2017-07-11 Акционерное общество "Лаборатория Касперского" Способ ограничения доступа образа машинного кода к ресурсам операционной системы
WO2018081093A1 (en) * 2016-10-24 2018-05-03 Clark Carl M Software algorithm security
CN107292131A (zh) * 2017-06-21 2017-10-24 北京深思数盾科技股份有限公司 软件保护方法和装置
RU2720254C1 (ru) * 2019-12-05 2020-04-28 Акционерное общество "Актив-софт" (АО "Актив-софт") Способ восстановления и обновления программного обеспечения на смарт-карте
US11573775B2 (en) 2020-06-17 2023-02-07 Bank Of America Corporation Software code converter for resolving redundancy during code development
US11782685B2 (en) 2020-06-17 2023-10-10 Bank Of America Corporation Software code vectorization converter
US11347500B2 (en) 2020-06-17 2022-05-31 Bank Of America Corporation Software code converter for resolving conflicts during code development
CN112241519A (zh) * 2020-11-05 2021-01-19 王志平 一种软件版权保护的实现方法
CN112642157B (zh) * 2020-12-31 2023-04-28 广州华多网络科技有限公司 代理开发控制方法及其相应的装置、设备、介质

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5293576A (en) 1991-11-21 1994-03-08 Motorola, Inc. Command authentication process
AUPN002594A0 (en) * 1994-12-13 1995-01-12 Dunn, Alexander Atkinson Improvements in software for the protection of executable programs, libraries and their data
US6334189B1 (en) * 1997-12-05 2001-12-25 Jamama, Llc Use of pseudocode to protect software from unauthorized use
US7430670B1 (en) * 1999-07-29 2008-09-30 Intertrust Technologies Corp. Software self-defense systems and methods
RU2183051C2 (ru) 2000-04-12 2002-05-27 Военный университет связи Способ формирования ключа шифрования/дешифрования
EP1352307A2 (en) * 2000-09-22 2003-10-15 EDC Systems, Inc. Systems and methods for preventing unauthorized use of digital content
US7237123B2 (en) * 2000-09-22 2007-06-26 Ecd Systems, Inc. Systems and methods for preventing unauthorized use of digital content
DE10108487A1 (de) 2001-02-22 2002-09-12 Giesecke & Devrient Gmbh Verfahren und System zur verteilten Erstellung eines Programms für einen programmierbaren, tragbaren Datenträger
CA2348355A1 (en) * 2001-05-24 2002-11-24 Cloakware Corporation General scheme of using encodings in computations
US7383443B2 (en) 2002-06-27 2008-06-03 Microsoft Corporation System and method for obfuscating code using instruction replacement scheme
WO2004003264A1 (ja) * 2002-06-28 2004-01-08 Sharp Kabushiki Kaisha 薄板製造方法および薄板製造装置
US7093119B2 (en) * 2002-07-16 2006-08-15 International Business Machines Corporation Methods and computer program products for protecting source code of an interpreted programming language
US20040128260A1 (en) 2002-12-30 2004-07-01 Nokia, Inc. Method and system for protecting against unauthorized modification of products
JP4193607B2 (ja) * 2003-06-26 2008-12-10 日本電気株式会社 データフロー制御方式、方法、およびプログラム
GB2405958A (en) 2003-08-20 2005-03-16 Macrovision Europ Ltd Code obfuscation and controlling a processor by emulation
US7366914B2 (en) * 2003-08-29 2008-04-29 Intel Corporation Source code transformation based on program operators
MXPA06006107A (es) 2003-12-01 2006-08-11 Samsung Electronics Co Ltd Metodo y aparato de codificacion y decodificacion escalables de video.
RU2439669C2 (ru) 2005-08-06 2012-01-10 Майкрософт Корпорейшн Способ предотвращения обратного инжиниринга программного обеспечения, неавторизованной модификации и перехвата данных во время выполнения

Also Published As

Publication number Publication date
US8938727B2 (en) 2015-01-20
US20130125243A1 (en) 2013-05-16
CN101300584A (zh) 2008-11-05
CN101300584B (zh) 2012-02-29
US20100313188A1 (en) 2010-12-09
RU2008104404A (ru) 2009-08-10
BRPI0614089A2 (pt) 2011-03-09
WO2007017856A1 (en) 2007-02-15
RU2439669C2 (ru) 2012-01-10
US8352929B2 (en) 2013-01-08

Similar Documents

Publication Publication Date Title
BRPI0614089A8 (pt) Método para evitar engenharia reversa de software, modificação não autorizada e interceptação de dados de tempo de execução
CN103544414B (zh) 一种Android系统应用的深度代码混淆方法
DE602006007029D1 (de) Verschleierung von Computerprogrammcodes
WO2007104956A3 (en) Instrumentation for real-time performance profiling
BRPI0509108A (pt) método e codificador para codificar uma pluralidade de sinais de entrada para gerar dados codificados correspondentes, método e decodificador para decodificar dados codificados para regenerar representações correspondentes de uma pluralidade de sinais de entrada, dados codificados, e, software
WO2007045614A3 (en) Visualization of collaborative portlet sequences
WO2008067357A3 (en) System for overriding bytecode, which should be interpreted, with native code, which can be directly executed
TW200502786A (en) Type bridges
BRPI0406816A (pt) Aditivos para cimento de sólidos grandes bombeáveis
ATE386971T1 (de) Bereitstellung einer sicheren eingabe an ein system mit einer hochsicherheitsumgebung
DE602007003410D1 (de) Datenschutzgerechte Verknüpfung von Zeichenfolgen
ATE238586T1 (de) Ableitung von operandtypen innerhalb einer zwischensprache
WO2004010295A3 (en) Method and apparatus for instrumentation on/off
WO2008005581A3 (en) Compiled data for software applications
EP2290538A3 (en) Method and device for reducing power consumption in application specific instruction set processors
WO2003032157A1 (en) Compiler
ATE366957T1 (de) Verfahren zur erhöhung der sicherheit einer cpu
BR9914396A (pt) Processo para a proteção de endereços de entrada
BRPI0518346A2 (pt) dispositivo e processo para a transmissço de dados em tempo real
BR112018073295A2 (pt) armazenamento de dados estendidos
WO2002021233A3 (en) Data communications
Viet Chu On Generalized Zeckendorf Decompositions and Generalized Golden Strings
Zosa Forde et al. The Scientific Method in the Science of Machine Learning
Faden Using Autoplot Java Codes to Support Analysis in Python
FROESCHNER Review of the Middle American lace bug genus Macrotingis (Heteroptera: Tingidae), with a key and a new species from México

Legal Events

Date Code Title Description
B25A Requested transfer of rights approved

Owner name: MICROSOFT CORPORATION (US)

Free format text: TRANSFERIDO DE: SECURED DIMENSIONS LTD.

B25A Requested transfer of rights approved

Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC (US)

B07A Application suspended after technical examination (opinion) [chapter 7.1 patent gazette]
B15K Others concerning applications: alteration of classification

Ipc: G06F 21/14 (2013.01), G06F 21/12 (2013.01), G06F 9

B09B Patent application refused [chapter 9.2 patent gazette]
B09B Patent application refused [chapter 9.2 patent gazette]

Free format text: MANTIDO O INDEFERIMENTO UMA VEZ QUE NAO FOI APRESENTADO RECURSO DENTRO DO PRAZO LEGAL