CA2678951C - System and method of interlocking to protect software-mediated program and device behaviours - Google Patents

System and method of interlocking to protect software-mediated program and device behaviours Download PDF

Info

Publication number
CA2678951C
CA2678951C CA2678951A CA2678951A CA2678951C CA 2678951 C CA2678951 C CA 2678951C CA 2678951 A CA2678951 A CA 2678951A CA 2678951 A CA2678951 A CA 2678951A CA 2678951 C CA2678951 C CA 2678951C
Authority
CA
Canada
Prior art keywords
expression
code
function
boolean
variables
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CA2678951A
Other languages
English (en)
French (fr)
Other versions
CA2678951A1 (en
Inventor
Yongxin Zhou
Yuan Xiang Gu
Harold Joseph Johnson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Irdeto BV
Original Assignee
Irdeto BV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Irdeto BV filed Critical Irdeto BV
Priority claimed from PCT/CA2008/000331 external-priority patent/WO2008101340A1/en
Publication of CA2678951A1 publication Critical patent/CA2678951A1/en
Application granted granted Critical
Publication of CA2678951C publication Critical patent/CA2678951C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1066Hiding content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • H04L2209/046Masking or blinding of operations, operands or results of the operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/20Manipulating the length of blocks of bits, e.g. padding or block truncation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)
  • Stored Programmes (AREA)
CA2678951A 2007-02-23 2008-02-21 System and method of interlocking to protect software-mediated program and device behaviours Expired - Fee Related CA2678951C (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US11/709,654 US8752032B2 (en) 2007-02-23 2007-02-23 System and method of interlocking to protect software-mediated program and device behaviours
US11/709,654 2007-02-23
US11/980,392 US8161463B2 (en) 2007-02-23 2007-10-31 System and method of interlocking to protect software—mediated program and device behaviors
US11/980,392 2007-10-31
PCT/CA2008/000331 WO2008101340A1 (en) 2007-02-23 2008-02-21 System and method for interlocking to protect software-mediated program and device behaviours

Publications (2)

Publication Number Publication Date
CA2678951A1 CA2678951A1 (en) 2008-08-28
CA2678951C true CA2678951C (en) 2020-03-24

Family

ID=39709589

Family Applications (2)

Application Number Title Priority Date Filing Date
CA2678951A Expired - Fee Related CA2678951C (en) 2007-02-23 2008-02-21 System and method of interlocking to protect software-mediated program and device behaviours
CA2678953A Expired - Fee Related CA2678953C (en) 2007-02-23 2008-02-21 System and method of interlocking to protect software-mediated program and device behaviours

Family Applications After (1)

Application Number Title Priority Date Filing Date
CA2678953A Expired - Fee Related CA2678953C (en) 2007-02-23 2008-02-21 System and method of interlocking to protect software-mediated program and device behaviours

Country Status (8)

Country Link
US (5) US8752032B2 (enExample)
EP (2) EP2126776B1 (enExample)
CN (2) CN101622627B (enExample)
AR (1) AR065443A1 (enExample)
CA (2) CA2678951C (enExample)
IN (1) IN2009DN05762A (enExample)
TW (1) TW200905559A (enExample)
WO (1) WO2008101341A1 (enExample)

Families Citing this family (164)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7581103B2 (en) * 2001-06-13 2009-08-25 Intertrust Technologies Corporation Software self-checking systems and methods
GB2405958A (en) * 2003-08-20 2005-03-16 Macrovision Europ Ltd Code obfuscation and controlling a processor by emulation
US8752032B2 (en) 2007-02-23 2014-06-10 Irdeto Canada Corporation System and method of interlocking to protect software-mediated program and device behaviours
US8358703B2 (en) 2007-03-23 2013-01-22 Thomson Licensing Modifying a coded bitstream
US8588459B2 (en) * 2007-06-14 2013-11-19 Thomson Licensing Modifying a coded bitstream
CN101911153B (zh) * 2008-01-21 2014-08-20 日本电信电话株式会社 秘密计算系统、秘密计算方法、秘密计算装置
US7890480B2 (en) * 2008-02-11 2011-02-15 International Business Machines Corporation Processing of deterministic user-defined functions using multiple corresponding hash tables
US9081962B2 (en) * 2008-04-30 2015-07-14 Graeme Harkness Anti-tamper techniques
US8800048B2 (en) * 2008-05-20 2014-08-05 Microsoft Corporation Software protection through interdependent parameter cloud constrained software execution
US8429637B2 (en) * 2008-09-02 2013-04-23 Apple Inc. System and method for conditional expansion obfuscation
US8020125B1 (en) * 2008-09-10 2011-09-13 Cadence Design Systems, Inc. System, methods and apparatus for generation of simulation stimulus
US20100218037A1 (en) * 2008-09-16 2010-08-26 File System Labs Llc Matrix-based Error Correction and Erasure Code Methods and Apparatus and Applications Thereof
US8484630B2 (en) * 2008-12-23 2013-07-09 International Business Machines Corporation Code motion based on live ranges in an optimizing compiler
FR2942559B1 (fr) * 2009-02-24 2016-05-20 European Aeronautic Defence And Space Company - Eads France Procede de protection du code source d'un programme d'ordinateur.
CN102449951B (zh) * 2009-03-31 2015-09-23 皇家飞利浦有限公司 用于在电子组件中执行密码任务的方法
CN102483790B (zh) * 2009-05-06 2016-01-20 爱迪德技术有限公司 利用白盒密码术的联锁二进制保护
US20100329448A1 (en) * 2009-06-30 2010-12-30 Rane Shantanu D Method for Secure Evaluation of a Function Applied to Encrypted Signals
US8433925B2 (en) * 2009-09-04 2013-04-30 Gradiant Cryptographic system for performing secure computations and signal processing directly on encrypted data in untrusted environments
US8972742B2 (en) 2009-09-04 2015-03-03 Gradiant System for secure image recognition
US8843762B2 (en) * 2009-09-04 2014-09-23 Gradiant, Centro Tecnolóxico de Telecomunicacións de Galicia Cryptographic system for performing secure iterative computations and signal processing directly on encrypted data in untrusted environments
US8752029B2 (en) * 2009-09-29 2014-06-10 Microsoft Corporation Computing a symbolic bound for a procedure
US9134977B2 (en) * 2010-02-26 2015-09-15 Red Hat, Inc. Compiler operation for handling conditional statements
CN102939608A (zh) * 2010-03-25 2013-02-20 埃德图加拿大公司 抗边通道和重复调用攻击的动态、可变定时操作路径的系统和方法
US20120089494A1 (en) * 2010-10-08 2012-04-12 Microsoft Corporation Privacy-Preserving Metering
EP2477110A1 (en) * 2011-01-14 2012-07-18 Wibu-Systems AG Method for protecting an application program against reverse engineering and related computer program product
US8707053B2 (en) * 2011-02-09 2014-04-22 Apple Inc. Performing boolean logic operations using arithmetic operations by code obfuscation
WO2012161763A1 (en) * 2011-02-15 2012-11-29 Lewis James M Method and system for identifying counterfeit programmable devices
US8837715B2 (en) 2011-02-17 2014-09-16 Gradiant, Centro Tecnolóxico de Telecomunicacións de Galica Method and apparatus for secure iterative processing and adaptive filtering
JP2012173870A (ja) * 2011-02-18 2012-09-10 Toshiba Corp 半導体装置及びメモリ保護方法
US8752027B2 (en) * 2011-09-14 2014-06-10 Microsoft Corporation Injecting faults into program for testing software
US20130097431A1 (en) * 2011-10-18 2013-04-18 Paul Marion Hriljac Systems and methods of source software code modification
EP2586959B2 (de) * 2011-10-28 2016-09-14 Cedes AG Sicherungsvorrichtung, Schließvorrichtung und Auswerteeinheit
US9698973B2 (en) 2012-03-30 2017-07-04 Irdeto B.V. Securing accessible systems using dynamic data mangling
US8976960B2 (en) 2012-04-02 2015-03-10 Apple Inc. Methods and apparatus for correlation protected processing of cryptographic operations
US9015681B1 (en) 2012-08-10 2015-04-21 The Mathworks, Inc. Creating and using array creation routines or a family of routines separate from algorithmic code
US9146750B2 (en) 2012-08-10 2015-09-29 The Mathworks, Inc. Mechanism for replacing an array creation routine within code
US9244667B2 (en) 2012-08-10 2016-01-26 The Mathworks, Inc. Mechanism for transforming between type-independent and type-specific code
WO2014046974A2 (en) 2012-09-20 2014-03-27 Case Paul Sr Case secure computer architecture
WO2014051459A1 (en) 2012-09-28 2014-04-03 Intel Corporation Loop vectorization methods and apparatus
US9336370B2 (en) 2012-12-06 2016-05-10 Apple Inc. Method and apparatus for dynamic obfuscation of static data
US9262639B2 (en) 2013-01-09 2016-02-16 Cisco Technology Inc. Plaintext injection attack protection
EP2947642B1 (en) * 2013-01-17 2017-09-06 Nippon Telegraph and Telephone Corporation Secret computation system, arithmetic unit, secret computation method and program
CN104919754B (zh) * 2013-01-17 2018-01-16 日本电信电话株式会社 篡改检测装置、篡改检测方法、以及程序
IL224743A0 (en) 2013-02-14 2013-06-27 Harel Cain A system for automatic obfuscation of computer programs
US11044076B2 (en) * 2013-02-25 2021-06-22 Hecusys, LLC Encrypted data processing
US9721120B2 (en) * 2013-05-14 2017-08-01 Apple Inc. Preventing unauthorized calls to a protected function
CN104182661A (zh) * 2013-05-24 2014-12-03 富泰华工业(深圳)有限公司 软件保护系统
US8881293B1 (en) * 2013-07-01 2014-11-04 Sap Se Static application security testing
KR101328012B1 (ko) * 2013-08-12 2013-11-13 숭실대학교산학협력단 애플리케이션 코드 난독화 장치 및 그 방법
US9021606B1 (en) * 2013-09-27 2015-04-28 Amazon Technologies, Inc. Systems and methods providing format data
US9361379B1 (en) 2013-09-27 2016-06-07 Amazon Technologies, Inc. Systems and methods providing recommendation data
US9218437B1 (en) * 2013-09-27 2015-12-22 Amazon Technologies, Inc. Systems and methods providing event data
JP6046870B1 (ja) * 2013-12-05 2016-12-21 コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. テーブルネットワークの繰り返し適用のための計算装置
GB201400992D0 (en) * 2014-01-21 2014-03-05 Metaforic Ltd Method of protecting dynamic cryptographic keys
CN103793248B (zh) * 2014-01-23 2017-02-01 北京奇虎科技有限公司 一种应用程序升级的方法及装置
EP2913772A1 (de) * 2014-02-28 2015-09-02 Wibu-Systems AG Verfahren und Computersystem zum Schutz eines Computerprogramms gegen Beeinflussung
US9425952B2 (en) * 2014-03-27 2016-08-23 Samsung Israel Research Corporation Algebraic manipulation detection codes from algebraic curves
EP3127269B1 (en) * 2014-03-31 2018-07-11 Irdeto B.V. Protecting an item of software
GB201405754D0 (en) 2014-03-31 2014-05-14 Irdeto Bv Protecting an item of software comprising conditional code
US9858440B1 (en) * 2014-05-23 2018-01-02 Shape Security, Inc. Encoding of sensitive data
FR3024007B1 (fr) * 2014-07-16 2016-08-26 Viaccess Sa Procede d'acces a un contenu multimedia protege par un terminal
EP2983156B1 (fr) * 2014-08-06 2019-07-24 Secure-IC SAS Système et procédé de protection de circuit
US9824214B2 (en) * 2014-08-15 2017-11-21 Securisea, Inc. High performance software vulnerabilities detection system and methods
US9454659B1 (en) * 2014-08-15 2016-09-27 Securisea, Inc. Software vulnerabilities detection system and methods
US10599852B2 (en) 2014-08-15 2020-03-24 Securisea, Inc. High performance software vulnerabilities detection system and methods
SG10201405852QA (en) 2014-09-18 2016-04-28 Huawei Internat Pte Ltd Encryption function and decryption function generating method, encryption and decryption method and related apparatuses
US10496372B2 (en) 2014-09-30 2019-12-03 Koninklijke Philips N.V. Electronic calculating device for performing obfuscated arithmetic
RU2710310C2 (ru) 2014-12-12 2019-12-25 Конинклейке Филипс Н.В. Электронное устройство формирования
CN107005403A (zh) * 2014-12-22 2017-08-01 皇家飞利浦有限公司 电子计算设备
CN107580765B (zh) * 2015-01-27 2021-10-26 艾锐势有限责任公司 用于保护流媒体和其它数据流的混淆
US20160328539A1 (en) * 2015-05-05 2016-11-10 Nxp B.V. Obscuring Software Code With Split Variables
US10068070B2 (en) * 2015-05-05 2018-09-04 Nxp B.V. White-box elliptic curve point multiplication
US9712472B2 (en) 2015-07-02 2017-07-18 Microsoft Technology Licensing, Llc Application spawning responsive to communication
US9785484B2 (en) 2015-07-02 2017-10-10 Microsoft Technology Licensing, Llc Distributed application interfacing across different hardware
US9733915B2 (en) 2015-07-02 2017-08-15 Microsoft Technology Licensing, Llc Building of compound application chain applications
US9733993B2 (en) 2015-07-02 2017-08-15 Microsoft Technology Licensing, Llc Application sharing using endpoint interface entities
US10198252B2 (en) 2015-07-02 2019-02-05 Microsoft Technology Licensing, Llc Transformation chain application splitting
US9658836B2 (en) * 2015-07-02 2017-05-23 Microsoft Technology Licensing, Llc Automated generation of transformation chain compatible class
US9860145B2 (en) 2015-07-02 2018-01-02 Microsoft Technology Licensing, Llc Recording of inter-application data flow
US10261985B2 (en) 2015-07-02 2019-04-16 Microsoft Technology Licensing, Llc Output rendering in dynamic redefining application
US9626181B2 (en) * 2015-07-06 2017-04-18 Dell Products L.P. Systems and methods to securely inject binary images and code into firmware
US10198405B2 (en) 2015-07-08 2019-02-05 Microsoft Technology Licensing, Llc Rule-based layout of changing information
US10031724B2 (en) 2015-07-08 2018-07-24 Microsoft Technology Licensing, Llc Application operation responsive to object spatial status
US10277582B2 (en) 2015-08-27 2019-04-30 Microsoft Technology Licensing, Llc Application service architecture
US9946853B1 (en) * 2015-09-17 2018-04-17 Symantec Corporation Techniques for application code obfuscation
FR3047373B1 (fr) * 2016-01-28 2018-01-05 Morpho Procede de calcul securise multipartite protege contre une partie malveillante
EP3217307B1 (en) * 2016-02-22 2018-11-07 Eshard Method of testing the resistance of a circuit to a side channel analysis of second order or more
US10235218B2 (en) 2016-05-03 2019-03-19 International Business Machines Corporation Automatic correction of cryptographic application program interfaces
US10243937B2 (en) * 2016-07-08 2019-03-26 Nxp B.V. Equality check implemented with secret sharing
US9760349B1 (en) * 2016-11-09 2017-09-12 Red Hat, Inc. Managing different software dependencies associated with source code
EP3555785A1 (en) 2016-12-15 2019-10-23 Irdeto B.V. Software integrity verification
WO2018120233A1 (zh) * 2016-12-30 2018-07-05 华为技术有限公司 一种事务处理方法及装置
US11934945B2 (en) 2017-02-23 2024-03-19 Cerebras Systems Inc. Accelerated deep learning
CN106934260B (zh) * 2017-03-14 2020-03-17 北京深思数盾科技股份有限公司 代码保护方法、装置、服务器及存储介质
EP3385735B1 (en) 2017-04-04 2019-12-04 Secure-IC SAS Device and method for detecting points of failures
WO2018189728A1 (en) 2017-04-14 2018-10-18 Cerebras Systems Inc. Floating-point unit stochastic rounding for accelerated deep learning
US11488004B2 (en) 2017-04-17 2022-11-01 Cerebras Systems Inc. Neuron smearing for accelerated deep learning
CA3060969C (en) 2017-04-17 2020-12-29 Cerebras Systems Inc. Neuron smearing for accelerated deep learning
WO2018193380A1 (en) 2017-04-17 2018-10-25 Cerebras Systems Inc. Fabric vectors for deep learning acceleration
CN108809619B (zh) * 2017-04-27 2022-11-29 郑珂威 用于完全同态加密的精度控制及累计误差消除方法
CN107194212B (zh) * 2017-06-21 2020-04-17 株洲中车时代电气股份有限公司 一种显示器源代码中协议内容的保护方法
US10097538B1 (en) * 2017-08-12 2018-10-09 Growpath, Inc. User authentication systems and methods
US10642582B2 (en) 2017-08-24 2020-05-05 Google Llc System of type inference for tuple graph programs method of executing a tuple graph program across a network
US10887235B2 (en) 2017-08-24 2021-01-05 Google Llc Method of executing a tuple graph program across a network
US10599482B2 (en) 2017-08-24 2020-03-24 Google Llc Method for intra-subgraph optimization in tuple graph programs
US10489585B2 (en) 2017-08-29 2019-11-26 Red Hat, Inc. Generation of a random value for a child process
CN109697451B (zh) * 2017-10-23 2022-01-07 北京京东尚科信息技术有限公司 相似图像聚类方法及装置、存储介质、电子设备
EP3534253A1 (en) * 2018-02-28 2019-09-04 Koninklijke Philips N.V. Compiling device and method
US10810077B1 (en) * 2018-06-11 2020-10-20 Ambarella International Lp Rapid soft-error detection
EP3591550A1 (en) 2018-07-06 2020-01-08 Koninklijke Philips N.V. A compiler device with masking function
US10521613B1 (en) 2018-08-08 2019-12-31 Carlos Manuel Gonzalez Adaptive standalone secure software
US10762179B2 (en) 2018-08-08 2020-09-01 Irdeto B.V. System and method for watermarking software
WO2020044208A1 (en) * 2018-08-29 2020-03-05 Cerebras Systems Inc. Isa enhancements for accelerated deep learning
US20200104127A1 (en) * 2018-09-28 2020-04-02 Carnegie Mellon University Coded computation strategies for distributed matrix-matrix and matrix-vector products
US11822704B2 (en) * 2018-10-29 2023-11-21 Cryptography Research, Inc. Constant time secure arithmetic-to-Boolean mask conversion
US11764940B2 (en) 2019-01-10 2023-09-19 Duality Technologies, Inc. Secure search of secret data in a semi-trusted environment using homomorphic encryption
JP6832375B2 (ja) * 2019-02-25 2021-02-24 ウィンボンド エレクトロニクス コーポレーション 半導体集積回路をリバースエンジニアリングから保護する方法
US11269762B2 (en) * 2019-03-25 2022-03-08 Aurora Labs Ltd. Using line-of-code behavior and relation models to anticipate impact of hardware changes
US11263316B2 (en) * 2019-08-20 2022-03-01 Irdeto B.V. Securing software routines
US12177133B2 (en) 2019-10-16 2024-12-24 Cerebras Systems Inc. Dynamic routing for accelerated deep learning
US12169771B2 (en) 2019-10-16 2024-12-17 Cerebras Systems Inc. Basic wavelet filtering for accelerated deep learning
US11574045B2 (en) 2019-12-10 2023-02-07 Winkk, Inc. Automated ID proofing using a random multitude of real-time behavioral biometric samplings
US12388799B1 (en) 2019-12-13 2025-08-12 Selfiie Corporation Systems and methods for providing a split inference approach to protect data and model
US11531782B1 (en) * 2022-05-13 2022-12-20 TripleBlind, Inc. Systems and methods for finding a value in a combined list of private values
US12088565B2 (en) 2019-12-13 2024-09-10 Triplelind Holdings, Inc. Systems and methods for privacy preserving training and inference of decentralized recommendation systems from decentralized data
US11599671B1 (en) 2019-12-13 2023-03-07 TripleBlind, Inc. Systems and methods for finding a value in a combined list of private values
US12149510B1 (en) 2019-12-13 2024-11-19 Tripleblind Holdings, Inc. Systems and methods for providing a private multi-modal artificial intelligence platform
CN111176610B (zh) * 2019-12-27 2022-03-25 北京百度网讯科技有限公司 量子随机数生成方法、装置、电子设备及存储介质
US12099997B1 (en) 2020-01-31 2024-09-24 Steven Mark Hoffberg Tokenized fungible liabilities
US11188316B2 (en) * 2020-03-09 2021-11-30 International Business Machines Corporation Performance optimization of class instance comparisons
US11204985B2 (en) * 2020-03-31 2021-12-21 Irdeto Canada Corporation Systems, methods, and storage media for creating secured computer code having entangled transformations
US11669613B2 (en) * 2020-05-29 2023-06-06 EnSoft Corp. Method for analyzing and verifying software for safety and security
KR102803025B1 (ko) * 2020-06-11 2025-05-07 라인플러스 주식회사 클래스 분산 및 순차적 메모리 적재를 이용한 파일 보호 방법 및 시스템
US11347500B2 (en) 2020-06-17 2022-05-31 Bank Of America Corporation Software code converter for resolving conflicts during code development
US11573775B2 (en) 2020-06-17 2023-02-07 Bank Of America Corporation Software code converter for resolving redundancy during code development
US11782685B2 (en) 2020-06-17 2023-10-10 Bank Of America Corporation Software code vectorization converter
CN111881462A (zh) * 2020-07-17 2020-11-03 张睿 一种商用密码应用加密有效性的在线分析技术
US11621837B2 (en) 2020-09-03 2023-04-04 Theon Technology Llc Secure encryption of data using partial-key cryptography
US11310042B2 (en) 2020-09-11 2022-04-19 Crown Sterling Limited, LLC Methods of storing and distributing large keys
US11029920B1 (en) * 2020-10-21 2021-06-08 Chariot Technologies Lab, Inc. Execution of a conditional statement by an arithmetic and/or bitwise unit
US11528136B2 (en) 2020-11-24 2022-12-13 Crown Sterling Limited, LLC Decryption of encrypted data missing a private key
EP4033381A1 (en) * 2021-01-25 2022-07-27 Thales Dis Cpl Usa, Inc. Software obfuscation method using an opaque predicate based on multiplying mixed boolean-arithmetic expressions
US11687440B2 (en) * 2021-02-02 2023-06-27 Thales Dis Cpl Usa, Inc. Method and device of protecting a first software application to generate a protected software application
US11438314B2 (en) * 2021-02-10 2022-09-06 Yahoo Assets Llc Automatic privacy-aware machine learning method and apparatus
CN113158184B (zh) * 2021-03-03 2023-05-19 中国人民解放军战略支援部队信息工程大学 基于有限状态自动机的攻击脚本生成方法及相关装置
US12190131B2 (en) * 2021-03-25 2025-01-07 Tata Consultancy Services Limited Method and system for function call and variable access based relaxed backward slicing
CN113014439B (zh) * 2021-04-19 2021-10-26 广州大一互联网络科技有限公司 一种数据中心带宽的虚拟弹性管理方法
CN113268455B (zh) * 2021-04-26 2022-07-26 卡斯柯信号(成都)有限公司 基于布尔逻辑的联锁数据自动配置方法及系统
WO2023287437A1 (en) * 2021-07-16 2023-01-19 Lattice Semiconductor Corporation Communication systems and methods
CN113626841B (zh) * 2021-08-10 2024-10-29 萨思数字科技(北京)有限公司 基于多方安全计算的选择问题处理方法
US11755772B2 (en) 2021-09-20 2023-09-12 Crown Sterling Limited, LLC Securing data in a blockchain with a one-time pad
WO2023081222A1 (en) * 2021-11-03 2023-05-11 Arris Enterprises Llc White-box processing for encoding with large integer values
US11791988B2 (en) 2021-11-22 2023-10-17 Theon Technology Llc Use of random entropy in cryptography
US11943336B2 (en) 2021-11-22 2024-03-26 Theon Technology Llc Use of gradient decent function in cryptography
US11902420B2 (en) 2021-11-23 2024-02-13 Theon Technology Llc Partial cryptographic key transport using one-time pad encryption
US11762762B1 (en) * 2022-03-24 2023-09-19 Xilinx, Inc. Static and automatic inference of inter-basic block burst transfers for high-level synthesis
US12395353B2 (en) 2022-09-21 2025-08-19 Winkk, Inc. Authentication process with an exposed and unregistered public certificate
US12261952B2 (en) 2022-11-04 2025-03-25 Crown Sterling Limited, LLC Multiple vector one-time key pad
US12488166B2 (en) 2022-11-28 2025-12-02 Xilinx, Inc. Implementing burst transfers for predicated memory accesses in loop bodies for high-level synthesis
US12250310B2 (en) 2023-01-09 2025-03-11 Crown Sterling Limited, LLC Use of irrational numbers in elliptic curve cryptography
US12210644B2 (en) * 2023-06-09 2025-01-28 Content Square SAS Obfuscation
EP4524785A1 (en) * 2023-09-13 2025-03-19 Thales Dis France Sas Method to secure a software code
EP4575846A1 (en) * 2023-12-21 2025-06-25 Nagravision Sàrl Method and device for obfuscating code control flow
CN119011628B (zh) * 2024-09-06 2025-07-04 桂林理工大学 一种物联网中多维数据的聚合方法、系统、设备及介质

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BE1003932A6 (fr) 1989-04-28 1992-07-22 Musyck Emile Systeme cryptographique par bloc de donnees binaires.
US6088452A (en) * 1996-03-07 2000-07-11 Northern Telecom Limited Encoding technique for software and hardware
US5892899A (en) * 1996-06-13 1999-04-06 Intel Corporation Tamper resistant methods and apparatus
CN1155700A (zh) * 1996-09-08 1997-07-30 周跃平 计算机软件保护方法
US6192475B1 (en) * 1997-03-31 2001-02-20 David R. Wallace System and method for cloaking software
EP0988591A1 (en) * 1997-06-09 2000-03-29 Intertrust, Incorporated Obfuscation techniques for enhancing software security
US6594761B1 (en) * 1999-06-09 2003-07-15 Cloakware Corporation Tamper resistant software encoding
US7430670B1 (en) * 1999-07-29 2008-09-30 Intertrust Technologies Corp. Software self-defense systems and methods
US6779114B1 (en) * 1999-08-19 2004-08-17 Cloakware Corporation Tamper resistant software-control flow encoding
US7287166B1 (en) * 1999-09-03 2007-10-23 Purdue Research Foundation Guards for application in software tamperproofing
US7757097B2 (en) * 1999-09-03 2010-07-13 Purdue Research Foundation Method and system for tamperproofing software
CA2298990A1 (en) * 2000-02-18 2001-08-18 Cloakware Corporation Method and system for resistance to power analysis
CA2305078A1 (en) * 2000-04-12 2001-10-12 Cloakware Corporation Tamper resistant software - mass data encoding
CA2327911A1 (en) 2000-12-08 2002-06-08 Cloakware Corporation Obscuring functions in computer software
FR2820914A1 (fr) * 2001-02-15 2002-08-16 Bull Cp8 Procede de securisation d'un ensemble electronique mettant en oeuvre en algorithme cryptographique utilisant des operations booleennes et des operations arithmetiques, et systeme embarque correspondant
CA2348355A1 (en) * 2001-05-24 2002-11-24 Cloakware Corporation General scheme of using encodings in computations
US7243340B2 (en) * 2001-11-15 2007-07-10 Pace Anti-Piracy Method and system for obfuscation of computer program execution flow to increase computer program security
CA2363795A1 (en) 2001-11-26 2003-05-26 Cloakware Corporation Computer system protection by communication diversity
CA2369304A1 (en) * 2002-01-30 2003-07-30 Cloakware Corporation A protocol to hide cryptographic private keys
US20050193198A1 (en) 2004-01-27 2005-09-01 Jean-Michel Livowsky System, method and apparatus for electronic authentication
US7966499B2 (en) * 2004-01-28 2011-06-21 Irdeto Canada Corporation System and method for obscuring bit-wise and two's complement integer computations in software
WO2005101975A2 (en) 2004-04-22 2005-11-03 Fortress Gb Ltd. Accelerated throughput synchronized word stream cipher, message authenticator and zero-knowledge output random number generator
JP4622807B2 (ja) 2005-03-25 2011-02-02 ソニー株式会社 暗号処理装置、および暗号処理方法、並びにコンピュータ・プログラム
US8036274B2 (en) 2005-08-12 2011-10-11 Microsoft Corporation SIMD lapped transform-based digital media encoding/decoding
ATE432507T1 (de) * 2006-12-21 2009-06-15 Ericsson Telefon Ab L M Verschleierung von computerprogrammcodes
US8752032B2 (en) 2007-02-23 2014-06-10 Irdeto Canada Corporation System and method of interlocking to protect software-mediated program and device behaviours
US8185749B2 (en) * 2008-09-02 2012-05-22 Apple Inc. System and method for revising boolean and arithmetic operations
AU2011362967B2 (en) * 2011-03-24 2016-10-06 Irdeto B.V. System and method providing dependency networks throughout applications for attack resistance

Also Published As

Publication number Publication date
CN101622627A (zh) 2010-01-06
CA2678951A1 (en) 2008-08-28
EP2126775A1 (en) 2009-12-02
EP2126776B1 (en) 2017-11-15
EP2126775A4 (en) 2011-02-09
CA2678953A1 (en) 2008-08-28
US8161463B2 (en) 2012-04-17
US8752032B2 (en) 2014-06-10
IN2009DN05762A (enExample) 2015-07-24
EP2126776A1 (en) 2009-12-02
CN101622627B (zh) 2012-05-09
EP2126776A4 (en) 2011-02-09
US20080208560A1 (en) 2008-08-28
AR065443A1 (es) 2009-06-10
US10402547B2 (en) 2019-09-03
US20150213239A1 (en) 2015-07-30
EP2126775B1 (en) 2017-11-01
CA2678953C (en) 2017-10-03
CN101627394B (zh) 2013-07-17
US20080216051A1 (en) 2008-09-04
WO2008101341A1 (en) 2008-08-28
TW200905559A (en) 2009-02-01
US9910971B2 (en) 2018-03-06
CN101627394A (zh) 2010-01-13
US20150074803A1 (en) 2015-03-12
US20160239647A1 (en) 2016-08-18

Similar Documents

Publication Publication Date Title
CA2678951C (en) System and method of interlocking to protect software-mediated program and device behaviours
CN104662549B (zh) 使用交叉链接来保护可访问的系统
US7549147B2 (en) Security framework for protecting rights in computer software
EP2656266B1 (en) Improvements relating to cryptography using polymorphic code
EP1192516A1 (en) Tamper resistant software encoding
WO2008101340A1 (en) System and method for interlocking to protect software-mediated program and device behaviours
Mercadier et al. OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element
Plasmans White-box cryptography for digital content protection

Legal Events

Date Code Title Description
EEER Examination request

Effective date: 20130220

MKLA Lapsed

Effective date: 20210222