CN101627394B - 保护以软件为媒介的程序和装置性态的联锁系统和方法 - Google Patents
保护以软件为媒介的程序和装置性态的联锁系统和方法 Download PDFInfo
- Publication number
- CN101627394B CN101627394B CN2008800059421A CN200880005942A CN101627394B CN 101627394 B CN101627394 B CN 101627394B CN 2008800059421 A CN2008800059421 A CN 2008800059421A CN 200880005942 A CN200880005942 A CN 200880005942A CN 101627394 B CN101627394 B CN 101627394B
- Authority
- CN
- China
- Prior art keywords
- modified
- basic block
- code
- expression
- constant
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1066—Hiding content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
- H04L2209/046—Masking or blinding of operations, operands or results of the operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/20—Manipulating the length of blocks of bits, e.g. padding or block truncation
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
- Compression, Expansion, Code Conversion, And Decoders (AREA)
- Stored Programmes (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/709,654 | 2007-02-23 | ||
| US11/709,654 US8752032B2 (en) | 2007-02-23 | 2007-02-23 | System and method of interlocking to protect software-mediated program and device behaviours |
| PCT/CA2008/000333 WO2008101341A1 (en) | 2007-02-23 | 2008-02-21 | System and method for interlocking to protect software-mediated program and device behaviours |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN101627394A CN101627394A (zh) | 2010-01-13 |
| CN101627394B true CN101627394B (zh) | 2013-07-17 |
Family
ID=39709589
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN2008800059421A Active CN101627394B (zh) | 2007-02-23 | 2008-02-21 | 保护以软件为媒介的程序和装置性态的联锁系统和方法 |
| CN2008800060715A Active CN101622627B (zh) | 2007-02-23 | 2008-02-21 | 保护以软件为媒介的程序和装置性态的联锁系统和方法 |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN2008800060715A Active CN101622627B (zh) | 2007-02-23 | 2008-02-21 | 保护以软件为媒介的程序和装置性态的联锁系统和方法 |
Country Status (8)
| Country | Link |
|---|---|
| US (5) | US8752032B2 (enExample) |
| EP (2) | EP2126775B1 (enExample) |
| CN (2) | CN101627394B (enExample) |
| AR (1) | AR065443A1 (enExample) |
| CA (2) | CA2678953C (enExample) |
| IN (1) | IN2009DN05762A (enExample) |
| TW (1) | TW200905559A (enExample) |
| WO (1) | WO2008101341A1 (enExample) |
Families Citing this family (164)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7581103B2 (en) * | 2001-06-13 | 2009-08-25 | Intertrust Technologies Corporation | Software self-checking systems and methods |
| GB2405958A (en) * | 2003-08-20 | 2005-03-16 | Macrovision Europ Ltd | Code obfuscation and controlling a processor by emulation |
| US8752032B2 (en) * | 2007-02-23 | 2014-06-10 | Irdeto Canada Corporation | System and method of interlocking to protect software-mediated program and device behaviours |
| CN101636761B (zh) | 2007-03-23 | 2013-07-24 | 汤姆森特许公司 | 修改编码的比特流 |
| BRPI0811626B1 (pt) * | 2007-06-14 | 2019-08-20 | Contentarmor | Método e dispositivo imprimir marca d'água em dados codificados de extensão variável, fluxo contínuo de dados codificados de extensão variável e mídia legível por processador |
| EP2242032B1 (en) * | 2008-01-21 | 2013-10-02 | Nippon Telegraph and Telephone Corporation | Secure computing system, secure computing method, secure computing apparatus and program therefor |
| US7890480B2 (en) * | 2008-02-11 | 2011-02-15 | International Business Machines Corporation | Processing of deterministic user-defined functions using multiple corresponding hash tables |
| US9081962B2 (en) * | 2008-04-30 | 2015-07-14 | Graeme Harkness | Anti-tamper techniques |
| US8800048B2 (en) * | 2008-05-20 | 2014-08-05 | Microsoft Corporation | Software protection through interdependent parameter cloud constrained software execution |
| US8429637B2 (en) * | 2008-09-02 | 2013-04-23 | Apple Inc. | System and method for conditional expansion obfuscation |
| US8020125B1 (en) * | 2008-09-10 | 2011-09-13 | Cadence Design Systems, Inc. | System, methods and apparatus for generation of simulation stimulus |
| US20100218037A1 (en) * | 2008-09-16 | 2010-08-26 | File System Labs Llc | Matrix-based Error Correction and Erasure Code Methods and Apparatus and Applications Thereof |
| US8484630B2 (en) * | 2008-12-23 | 2013-07-09 | International Business Machines Corporation | Code motion based on live ranges in an optimizing compiler |
| FR2942559B1 (fr) * | 2009-02-24 | 2016-05-20 | European Aeronautic Defence And Space Company - Eads France | Procede de protection du code source d'un programme d'ordinateur. |
| EP2415199B1 (fr) * | 2009-03-31 | 2017-10-18 | Koninklijke Philips N.V. | Procede pour effectuer une tache cryptographique dans un composant electronique |
| EP2430584B1 (en) * | 2009-05-06 | 2019-11-13 | Irdeto B.V. | Interlocked binary protection using whitebox cryptography |
| US20100329448A1 (en) * | 2009-06-30 | 2010-12-30 | Rane Shantanu D | Method for Secure Evaluation of a Function Applied to Encrypted Signals |
| US8972742B2 (en) | 2009-09-04 | 2015-03-03 | Gradiant | System for secure image recognition |
| US8433925B2 (en) * | 2009-09-04 | 2013-04-30 | Gradiant | Cryptographic system for performing secure computations and signal processing directly on encrypted data in untrusted environments |
| US8843762B2 (en) * | 2009-09-04 | 2014-09-23 | Gradiant, Centro Tecnolóxico de Telecomunicacións de Galicia | Cryptographic system for performing secure iterative computations and signal processing directly on encrypted data in untrusted environments |
| US8752029B2 (en) * | 2009-09-29 | 2014-06-10 | Microsoft Corporation | Computing a symbolic bound for a procedure |
| US9134977B2 (en) * | 2010-02-26 | 2015-09-15 | Red Hat, Inc. | Compiler operation for handling conditional statements |
| CA2792302A1 (en) * | 2010-03-25 | 2011-09-29 | Irdeto Canada Corporation | System and method for dynamic, variably-timed operation paths as a resistance to side channel and repeated invocation attacks |
| US20120089494A1 (en) * | 2010-10-08 | 2012-04-12 | Microsoft Corporation | Privacy-Preserving Metering |
| EP2477110A1 (en) * | 2011-01-14 | 2012-07-18 | Wibu-Systems AG | Method for protecting an application program against reverse engineering and related computer program product |
| US8707053B2 (en) * | 2011-02-09 | 2014-04-22 | Apple Inc. | Performing boolean logic operations using arithmetic operations by code obfuscation |
| WO2012161763A1 (en) * | 2011-02-15 | 2012-11-29 | Lewis James M | Method and system for identifying counterfeit programmable devices |
| US8837715B2 (en) | 2011-02-17 | 2014-09-16 | Gradiant, Centro Tecnolóxico de Telecomunicacións de Galica | Method and apparatus for secure iterative processing and adaptive filtering |
| JP2012173870A (ja) * | 2011-02-18 | 2012-09-10 | Toshiba Corp | 半導体装置及びメモリ保護方法 |
| US8752027B2 (en) * | 2011-09-14 | 2014-06-10 | Microsoft Corporation | Injecting faults into program for testing software |
| WO2013059367A1 (en) * | 2011-10-18 | 2013-04-25 | Paul Marion Hriljac | Systems and methods of source software code modification |
| EP2586959B2 (de) * | 2011-10-28 | 2016-09-14 | Cedes AG | Sicherungsvorrichtung, Schließvorrichtung und Auswerteeinheit |
| US9906360B2 (en) | 2012-03-30 | 2018-02-27 | Irdeto B.V. | Securing accessible systems using variable dependent coding |
| US8976960B2 (en) | 2012-04-02 | 2015-03-10 | Apple Inc. | Methods and apparatus for correlation protected processing of cryptographic operations |
| US9146750B2 (en) | 2012-08-10 | 2015-09-29 | The Mathworks, Inc. | Mechanism for replacing an array creation routine within code |
| US9015681B1 (en) | 2012-08-10 | 2015-04-21 | The Mathworks, Inc. | Creating and using array creation routines or a family of routines separate from algorithmic code |
| US9244667B2 (en) | 2012-08-10 | 2016-01-26 | The Mathworks, Inc. | Mechanism for transforming between type-independent and type-specific code |
| US8938796B2 (en) | 2012-09-20 | 2015-01-20 | Paul Case, SR. | Case secure computer architecture |
| CN107729018A (zh) * | 2012-09-28 | 2018-02-23 | 英特尔公司 | 循环向量化方法和设备 |
| US9336370B2 (en) | 2012-12-06 | 2016-05-10 | Apple Inc. | Method and apparatus for dynamic obfuscation of static data |
| US9262639B2 (en) | 2013-01-09 | 2016-02-16 | Cisco Technology Inc. | Plaintext injection attack protection |
| JP5957095B2 (ja) * | 2013-01-17 | 2016-07-27 | 日本電信電話株式会社 | 改ざん検知装置、改ざん検知方法、およびプログラム |
| EP2947642B1 (en) * | 2013-01-17 | 2017-09-06 | Nippon Telegraph and Telephone Corporation | Secret computation system, arithmetic unit, secret computation method and program |
| IL224743A0 (en) | 2013-02-14 | 2013-06-27 | Harel Cain | A system for automatic obfuscation of computer programs |
| US11044076B2 (en) * | 2013-02-25 | 2021-06-22 | Hecusys, LLC | Encrypted data processing |
| US9721120B2 (en) * | 2013-05-14 | 2017-08-01 | Apple Inc. | Preventing unauthorized calls to a protected function |
| CN104182661A (zh) * | 2013-05-24 | 2014-12-03 | 富泰华工业(深圳)有限公司 | 软件保护系统 |
| US8881293B1 (en) * | 2013-07-01 | 2014-11-04 | Sap Se | Static application security testing |
| KR101328012B1 (ko) * | 2013-08-12 | 2013-11-13 | 숭실대학교산학협력단 | 애플리케이션 코드 난독화 장치 및 그 방법 |
| US9021606B1 (en) * | 2013-09-27 | 2015-04-28 | Amazon Technologies, Inc. | Systems and methods providing format data |
| US9361379B1 (en) | 2013-09-27 | 2016-06-07 | Amazon Technologies, Inc. | Systems and methods providing recommendation data |
| US9218437B1 (en) * | 2013-09-27 | 2015-12-22 | Amazon Technologies, Inc. | Systems and methods providing event data |
| CN105765896B (zh) * | 2013-12-05 | 2020-02-07 | 皇家飞利浦有限公司 | 用于表格网络的迭代应用的计算设备 |
| GB201400992D0 (en) * | 2014-01-21 | 2014-03-05 | Metaforic Ltd | Method of protecting dynamic cryptographic keys |
| CN103793248B (zh) * | 2014-01-23 | 2017-02-01 | 北京奇虎科技有限公司 | 一种应用程序升级的方法及装置 |
| EP2913772A1 (de) * | 2014-02-28 | 2015-09-02 | Wibu-Systems AG | Verfahren und Computersystem zum Schutz eines Computerprogramms gegen Beeinflussung |
| US9425952B2 (en) * | 2014-03-27 | 2016-08-23 | Samsung Israel Research Corporation | Algebraic manipulation detection codes from algebraic curves |
| US10546155B2 (en) * | 2014-03-31 | 2020-01-28 | Irdeto B.V. | Protecting an item of software |
| GB201405754D0 (en) * | 2014-03-31 | 2014-05-14 | Irdeto Bv | Protecting an item of software comprising conditional code |
| US9858440B1 (en) * | 2014-05-23 | 2018-01-02 | Shape Security, Inc. | Encoding of sensitive data |
| FR3024007B1 (fr) * | 2014-07-16 | 2016-08-26 | Viaccess Sa | Procede d'acces a un contenu multimedia protege par un terminal |
| EP2983156B1 (fr) * | 2014-08-06 | 2019-07-24 | Secure-IC SAS | Système et procédé de protection de circuit |
| US10599852B2 (en) | 2014-08-15 | 2020-03-24 | Securisea, Inc. | High performance software vulnerabilities detection system and methods |
| US9454659B1 (en) * | 2014-08-15 | 2016-09-27 | Securisea, Inc. | Software vulnerabilities detection system and methods |
| US9824214B2 (en) * | 2014-08-15 | 2017-11-21 | Securisea, Inc. | High performance software vulnerabilities detection system and methods |
| SG10201405852QA (en) * | 2014-09-18 | 2016-04-28 | Huawei Internat Pte Ltd | Encryption function and decryption function generating method, encryption and decryption method and related apparatuses |
| EP3201758A1 (en) | 2014-09-30 | 2017-08-09 | Koninklijke Philips N.V. | Electronic calculating device for performing obfuscated arithmetic |
| WO2016092097A1 (en) | 2014-12-12 | 2016-06-16 | Koninklijke Philips N.V. | Electronic generation device |
| US10505710B2 (en) * | 2014-12-22 | 2019-12-10 | Koninklijke Philips N.V. | Electronic calculating device |
| KR102000861B1 (ko) * | 2015-01-27 | 2019-07-16 | 애리스 엔터프라이지즈 엘엘씨 | 스트리밍 미디어 및 다른 데이터 흐름들의 보호를 위한 난독화 |
| US20160328539A1 (en) * | 2015-05-05 | 2016-11-10 | Nxp B.V. | Obscuring Software Code With Split Variables |
| US10068070B2 (en) * | 2015-05-05 | 2018-09-04 | Nxp B.V. | White-box elliptic curve point multiplication |
| US9860145B2 (en) | 2015-07-02 | 2018-01-02 | Microsoft Technology Licensing, Llc | Recording of inter-application data flow |
| US9733915B2 (en) | 2015-07-02 | 2017-08-15 | Microsoft Technology Licensing, Llc | Building of compound application chain applications |
| US9658836B2 (en) * | 2015-07-02 | 2017-05-23 | Microsoft Technology Licensing, Llc | Automated generation of transformation chain compatible class |
| US10198252B2 (en) | 2015-07-02 | 2019-02-05 | Microsoft Technology Licensing, Llc | Transformation chain application splitting |
| US9712472B2 (en) | 2015-07-02 | 2017-07-18 | Microsoft Technology Licensing, Llc | Application spawning responsive to communication |
| US9733993B2 (en) | 2015-07-02 | 2017-08-15 | Microsoft Technology Licensing, Llc | Application sharing using endpoint interface entities |
| US9785484B2 (en) | 2015-07-02 | 2017-10-10 | Microsoft Technology Licensing, Llc | Distributed application interfacing across different hardware |
| US10261985B2 (en) | 2015-07-02 | 2019-04-16 | Microsoft Technology Licensing, Llc | Output rendering in dynamic redefining application |
| US9626181B2 (en) * | 2015-07-06 | 2017-04-18 | Dell Products L.P. | Systems and methods to securely inject binary images and code into firmware |
| US10198405B2 (en) | 2015-07-08 | 2019-02-05 | Microsoft Technology Licensing, Llc | Rule-based layout of changing information |
| US10031724B2 (en) | 2015-07-08 | 2018-07-24 | Microsoft Technology Licensing, Llc | Application operation responsive to object spatial status |
| US10277582B2 (en) | 2015-08-27 | 2019-04-30 | Microsoft Technology Licensing, Llc | Application service architecture |
| US9946853B1 (en) * | 2015-09-17 | 2018-04-17 | Symantec Corporation | Techniques for application code obfuscation |
| FR3047373B1 (fr) * | 2016-01-28 | 2018-01-05 | Morpho | Procede de calcul securise multipartite protege contre une partie malveillante |
| EP3217307B1 (en) * | 2016-02-22 | 2018-11-07 | Eshard | Method of testing the resistance of a circuit to a side channel analysis of second order or more |
| US10235218B2 (en) * | 2016-05-03 | 2019-03-19 | International Business Machines Corporation | Automatic correction of cryptographic application program interfaces |
| US10243937B2 (en) * | 2016-07-08 | 2019-03-26 | Nxp B.V. | Equality check implemented with secret sharing |
| US9760349B1 (en) * | 2016-11-09 | 2017-09-12 | Red Hat, Inc. | Managing different software dependencies associated with source code |
| WO2018108275A1 (en) * | 2016-12-15 | 2018-06-21 | Irdeto B.V. | Software integrity verification |
| WO2018120233A1 (zh) | 2016-12-30 | 2018-07-05 | 华为技术有限公司 | 一种事务处理方法及装置 |
| CA3051990C (en) | 2017-02-23 | 2021-03-23 | Cerebras Systems Inc. | Accelerated deep learning |
| CN106934260B (zh) * | 2017-03-14 | 2020-03-17 | 北京深思数盾科技股份有限公司 | 代码保护方法、装置、服务器及存储介质 |
| EP3385735B1 (en) | 2017-04-04 | 2019-12-04 | Secure-IC SAS | Device and method for detecting points of failures |
| US11449574B2 (en) | 2017-04-14 | 2022-09-20 | Cerebras Systems Inc. | Floating-point unit stochastic rounding for accelerated deep learning |
| US10657438B2 (en) | 2017-04-17 | 2020-05-19 | Cerebras Systems Inc. | Backpressure for accelerated deep learning |
| US10515303B2 (en) | 2017-04-17 | 2019-12-24 | Cerebras Systems Inc. | Wavelet representation for accelerated deep learning |
| US11488004B2 (en) | 2017-04-17 | 2022-11-01 | Cerebras Systems Inc. | Neuron smearing for accelerated deep learning |
| CN108809619B (zh) * | 2017-04-27 | 2022-11-29 | 郑珂威 | 用于完全同态加密的精度控制及累计误差消除方法 |
| CN107194212B (zh) * | 2017-06-21 | 2020-04-17 | 株洲中车时代电气股份有限公司 | 一种显示器源代码中协议内容的保护方法 |
| US10097538B1 (en) * | 2017-08-12 | 2018-10-09 | Growpath, Inc. | User authentication systems and methods |
| US10599482B2 (en) | 2017-08-24 | 2020-03-24 | Google Llc | Method for intra-subgraph optimization in tuple graph programs |
| US10887235B2 (en) | 2017-08-24 | 2021-01-05 | Google Llc | Method of executing a tuple graph program across a network |
| US10642582B2 (en) * | 2017-08-24 | 2020-05-05 | Google Llc | System of type inference for tuple graph programs method of executing a tuple graph program across a network |
| US10489585B2 (en) | 2017-08-29 | 2019-11-26 | Red Hat, Inc. | Generation of a random value for a child process |
| CN109697451B (zh) * | 2017-10-23 | 2022-01-07 | 北京京东尚科信息技术有限公司 | 相似图像聚类方法及装置、存储介质、电子设备 |
| EP3534253A1 (en) * | 2018-02-28 | 2019-09-04 | Koninklijke Philips N.V. | Compiling device and method |
| US10810077B1 (en) * | 2018-06-11 | 2020-10-20 | Ambarella International Lp | Rapid soft-error detection |
| EP3591550A1 (en) | 2018-07-06 | 2020-01-08 | Koninklijke Philips N.V. | A compiler device with masking function |
| US10521613B1 (en) | 2018-08-08 | 2019-12-31 | Carlos Manuel Gonzalez | Adaptive standalone secure software |
| US10762179B2 (en) | 2018-08-08 | 2020-09-01 | Irdeto B.V. | System and method for watermarking software |
| US11321087B2 (en) * | 2018-08-29 | 2022-05-03 | Cerebras Systems Inc. | ISA enhancements for accelerated deep learning |
| US20200104127A1 (en) * | 2018-09-28 | 2020-04-02 | Carnegie Mellon University | Coded computation strategies for distributed matrix-matrix and matrix-vector products |
| EP3874364A4 (en) * | 2018-10-29 | 2022-08-03 | Cryptography Research, Inc. | Constant time secure arithmetic-to-boolean mask conversion |
| US11764940B2 (en) | 2019-01-10 | 2023-09-19 | Duality Technologies, Inc. | Secure search of secret data in a semi-trusted environment using homomorphic encryption |
| JP6832375B2 (ja) * | 2019-02-25 | 2021-02-24 | ウィンボンド エレクトロニクス コーポレーション | 半導体集積回路をリバースエンジニアリングから保護する方法 |
| US10878082B2 (en) | 2019-03-25 | 2020-12-29 | Aurora Labs Ltd. | Dynamic CFI using line-of-code behavior and relation models |
| US11263316B2 (en) * | 2019-08-20 | 2022-03-01 | Irdeto B.V. | Securing software routines |
| WO2021074795A1 (en) | 2019-10-16 | 2021-04-22 | Cerebras Systems Inc. | Dynamic routing for accelerated deep learning |
| US12169771B2 (en) | 2019-10-16 | 2024-12-17 | Cerebras Systems Inc. | Basic wavelet filtering for accelerated deep learning |
| US11574045B2 (en) | 2019-12-10 | 2023-02-07 | Winkk, Inc. | Automated ID proofing using a random multitude of real-time behavioral biometric samplings |
| US11599671B1 (en) | 2019-12-13 | 2023-03-07 | TripleBlind, Inc. | Systems and methods for finding a value in a combined list of private values |
| US12149510B1 (en) | 2019-12-13 | 2024-11-19 | Tripleblind Holdings, Inc. | Systems and methods for providing a private multi-modal artificial intelligence platform |
| US12388799B1 (en) | 2019-12-13 | 2025-08-12 | Selfiie Corporation | Systems and methods for providing a split inference approach to protect data and model |
| US11531782B1 (en) * | 2022-05-13 | 2022-12-20 | TripleBlind, Inc. | Systems and methods for finding a value in a combined list of private values |
| US12088565B2 (en) | 2019-12-13 | 2024-09-10 | Triplelind Holdings, Inc. | Systems and methods for privacy preserving training and inference of decentralized recommendation systems from decentralized data |
| CN111176610B (zh) * | 2019-12-27 | 2022-03-25 | 北京百度网讯科技有限公司 | 量子随机数生成方法、装置、电子设备及存储介质 |
| US12099997B1 (en) | 2020-01-31 | 2024-09-24 | Steven Mark Hoffberg | Tokenized fungible liabilities |
| US11188316B2 (en) * | 2020-03-09 | 2021-11-30 | International Business Machines Corporation | Performance optimization of class instance comparisons |
| US11204985B2 (en) * | 2020-03-31 | 2021-12-21 | Irdeto Canada Corporation | Systems, methods, and storage media for creating secured computer code having entangled transformations |
| US11669613B2 (en) * | 2020-05-29 | 2023-06-06 | EnSoft Corp. | Method for analyzing and verifying software for safety and security |
| KR102803025B1 (ko) * | 2020-06-11 | 2025-05-07 | 라인플러스 주식회사 | 클래스 분산 및 순차적 메모리 적재를 이용한 파일 보호 방법 및 시스템 |
| US11573775B2 (en) | 2020-06-17 | 2023-02-07 | Bank Of America Corporation | Software code converter for resolving redundancy during code development |
| US11782685B2 (en) | 2020-06-17 | 2023-10-10 | Bank Of America Corporation | Software code vectorization converter |
| US11347500B2 (en) | 2020-06-17 | 2022-05-31 | Bank Of America Corporation | Software code converter for resolving conflicts during code development |
| CN111881462A (zh) * | 2020-07-17 | 2020-11-03 | 张睿 | 一种商用密码应用加密有效性的在线分析技术 |
| US11621837B2 (en) | 2020-09-03 | 2023-04-04 | Theon Technology Llc | Secure encryption of data using partial-key cryptography |
| US11310042B2 (en) | 2020-09-11 | 2022-04-19 | Crown Sterling Limited, LLC | Methods of storing and distributing large keys |
| US11029920B1 (en) * | 2020-10-21 | 2021-06-08 | Chariot Technologies Lab, Inc. | Execution of a conditional statement by an arithmetic and/or bitwise unit |
| US11528136B2 (en) | 2020-11-24 | 2022-12-13 | Crown Sterling Limited, LLC | Decryption of encrypted data missing a private key |
| EP4033381A1 (en) * | 2021-01-25 | 2022-07-27 | Thales Dis Cpl Usa, Inc. | Software obfuscation method using an opaque predicate based on multiplying mixed boolean-arithmetic expressions |
| US11687440B2 (en) * | 2021-02-02 | 2023-06-27 | Thales Dis Cpl Usa, Inc. | Method and device of protecting a first software application to generate a protected software application |
| US11438314B2 (en) * | 2021-02-10 | 2022-09-06 | Yahoo Assets Llc | Automatic privacy-aware machine learning method and apparatus |
| CN113158184B (zh) * | 2021-03-03 | 2023-05-19 | 中国人民解放军战略支援部队信息工程大学 | 基于有限状态自动机的攻击脚本生成方法及相关装置 |
| US12190131B2 (en) * | 2021-03-25 | 2025-01-07 | Tata Consultancy Services Limited | Method and system for function call and variable access based relaxed backward slicing |
| CN113014439B (zh) * | 2021-04-19 | 2021-10-26 | 广州大一互联网络科技有限公司 | 一种数据中心带宽的虚拟弹性管理方法 |
| CN113268455B (zh) * | 2021-04-26 | 2022-07-26 | 卡斯柯信号(成都)有限公司 | 基于布尔逻辑的联锁数据自动配置方法及系统 |
| WO2023287437A1 (en) * | 2021-07-16 | 2023-01-19 | Lattice Semiconductor Corporation | Communication systems and methods |
| CN113626841B (zh) * | 2021-08-10 | 2024-10-29 | 萨思数字科技(北京)有限公司 | 基于多方安全计算的选择问题处理方法 |
| US11755772B2 (en) | 2021-09-20 | 2023-09-12 | Crown Sterling Limited, LLC | Securing data in a blockchain with a one-time pad |
| TW202324967A (zh) * | 2021-11-03 | 2023-06-16 | 美商艾銳勢企業有限責任公司 | 用大整數值進行編碼的白箱處理 |
| US11943336B2 (en) | 2021-11-22 | 2024-03-26 | Theon Technology Llc | Use of gradient decent function in cryptography |
| US11791988B2 (en) | 2021-11-22 | 2023-10-17 | Theon Technology Llc | Use of random entropy in cryptography |
| US11902420B2 (en) | 2021-11-23 | 2024-02-13 | Theon Technology Llc | Partial cryptographic key transport using one-time pad encryption |
| US11762762B1 (en) * | 2022-03-24 | 2023-09-19 | Xilinx, Inc. | Static and automatic inference of inter-basic block burst transfers for high-level synthesis |
| US12395353B2 (en) | 2022-09-21 | 2025-08-19 | Winkk, Inc. | Authentication process with an exposed and unregistered public certificate |
| US12261952B2 (en) | 2022-11-04 | 2025-03-25 | Crown Sterling Limited, LLC | Multiple vector one-time key pad |
| US12488166B2 (en) | 2022-11-28 | 2025-12-02 | Xilinx, Inc. | Implementing burst transfers for predicated memory accesses in loop bodies for high-level synthesis |
| US12250310B2 (en) | 2023-01-09 | 2025-03-11 | Crown Sterling Limited, LLC | Use of irrational numbers in elliptic curve cryptography |
| US12210644B2 (en) * | 2023-06-09 | 2025-01-28 | Content Square SAS | Obfuscation |
| EP4524785A1 (en) * | 2023-09-13 | 2025-03-19 | Thales Dis France Sas | Method to secure a software code |
| EP4575846A1 (en) * | 2023-12-21 | 2025-06-25 | Nagravision Sàrl | Method and device for obfuscating code control flow |
| CN119011628B (zh) * | 2024-09-06 | 2025-07-04 | 桂林理工大学 | 一种物联网中多维数据的聚合方法、系统、设备及介质 |
Family Cites Families (28)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| BE1003932A6 (fr) | 1989-04-28 | 1992-07-22 | Musyck Emile | Systeme cryptographique par bloc de donnees binaires. |
| US6088452A (en) * | 1996-03-07 | 2000-07-11 | Northern Telecom Limited | Encoding technique for software and hardware |
| US5892899A (en) * | 1996-06-13 | 1999-04-06 | Intel Corporation | Tamper resistant methods and apparatus |
| CN1155700A (zh) * | 1996-09-08 | 1997-07-30 | 周跃平 | 计算机软件保护方法 |
| US6192475B1 (en) * | 1997-03-31 | 2001-02-20 | David R. Wallace | System and method for cloaking software |
| US6668325B1 (en) * | 1997-06-09 | 2003-12-23 | Intertrust Technologies | Obfuscation techniques for enhancing software security |
| US6594761B1 (en) * | 1999-06-09 | 2003-07-15 | Cloakware Corporation | Tamper resistant software encoding |
| US7430670B1 (en) * | 1999-07-29 | 2008-09-30 | Intertrust Technologies Corp. | Software self-defense systems and methods |
| US6779114B1 (en) * | 1999-08-19 | 2004-08-17 | Cloakware Corporation | Tamper resistant software-control flow encoding |
| US7287166B1 (en) * | 1999-09-03 | 2007-10-23 | Purdue Research Foundation | Guards for application in software tamperproofing |
| US7757097B2 (en) * | 1999-09-03 | 2010-07-13 | Purdue Research Foundation | Method and system for tamperproofing software |
| CA2298990A1 (en) * | 2000-02-18 | 2001-08-18 | Cloakware Corporation | Method and system for resistance to power analysis |
| CA2305078A1 (en) * | 2000-04-12 | 2001-10-12 | Cloakware Corporation | Tamper resistant software - mass data encoding |
| CA2327911A1 (en) * | 2000-12-08 | 2002-06-08 | Cloakware Corporation | Obscuring functions in computer software |
| FR2820914A1 (fr) * | 2001-02-15 | 2002-08-16 | Bull Cp8 | Procede de securisation d'un ensemble electronique mettant en oeuvre en algorithme cryptographique utilisant des operations booleennes et des operations arithmetiques, et systeme embarque correspondant |
| CA2348355A1 (en) * | 2001-05-24 | 2002-11-24 | Cloakware Corporation | General scheme of using encodings in computations |
| US7243340B2 (en) * | 2001-11-15 | 2007-07-10 | Pace Anti-Piracy | Method and system for obfuscation of computer program execution flow to increase computer program security |
| CA2363795A1 (en) | 2001-11-26 | 2003-05-26 | Cloakware Corporation | Computer system protection by communication diversity |
| CA2369304A1 (en) * | 2002-01-30 | 2003-07-30 | Cloakware Corporation | A protocol to hide cryptographic private keys |
| EP1709517A2 (en) | 2004-01-27 | 2006-10-11 | Livo Technologies S.A. | System, method and apparatus for electronic authentication |
| US7966499B2 (en) * | 2004-01-28 | 2011-06-21 | Irdeto Canada Corporation | System and method for obscuring bit-wise and two's complement integer computations in software |
| WO2005101975A2 (en) | 2004-04-22 | 2005-11-03 | Fortress Gb Ltd. | Accelerated throughput synchronized word stream cipher, message authenticator and zero-knowledge output random number generator |
| JP4622807B2 (ja) | 2005-03-25 | 2011-02-02 | ソニー株式会社 | 暗号処理装置、および暗号処理方法、並びにコンピュータ・プログラム |
| US8036274B2 (en) | 2005-08-12 | 2011-10-11 | Microsoft Corporation | SIMD lapped transform-based digital media encoding/decoding |
| DE602006007029D1 (de) * | 2006-12-21 | 2009-07-09 | Ericsson Telefon Ab L M | Verschleierung von Computerprogrammcodes |
| US8752032B2 (en) * | 2007-02-23 | 2014-06-10 | Irdeto Canada Corporation | System and method of interlocking to protect software-mediated program and device behaviours |
| US8185749B2 (en) * | 2008-09-02 | 2012-05-22 | Apple Inc. | System and method for revising boolean and arithmetic operations |
| CN103858128B (zh) * | 2011-03-24 | 2017-06-16 | 爱迪德技术有限公司 | 提供用于抗攻击的遍及应用的相依性网络的系统和方法 |
-
2007
- 2007-02-23 US US11/709,654 patent/US8752032B2/en active Active
- 2007-10-31 US US11/980,392 patent/US8161463B2/en active Active
-
2008
- 2008-02-21 EP EP08714653.6A patent/EP2126775B1/en active Active
- 2008-02-21 EP EP08714655.1A patent/EP2126776B1/en active Active
- 2008-02-21 IN IN5762DEN2009 patent/IN2009DN05762A/en unknown
- 2008-02-21 CA CA2678953A patent/CA2678953C/en not_active Expired - Fee Related
- 2008-02-21 WO PCT/CA2008/000333 patent/WO2008101341A1/en not_active Ceased
- 2008-02-21 CN CN2008800059421A patent/CN101627394B/zh active Active
- 2008-02-21 CA CA2678951A patent/CA2678951C/en not_active Expired - Fee Related
- 2008-02-21 CN CN2008800060715A patent/CN101622627B/zh active Active
- 2008-02-22 AR ARP080100743A patent/AR065443A1/es unknown
- 2008-02-22 TW TW097106229A patent/TW200905559A/zh unknown
-
2014
- 2014-04-30 US US14/266,252 patent/US20150074803A1/en not_active Abandoned
-
2015
- 2015-04-08 US US14/682,073 patent/US10402547B2/en active Active
-
2016
- 2016-01-12 US US14/993,887 patent/US9910971B2/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| US10402547B2 (en) | 2019-09-03 |
| TW200905559A (en) | 2009-02-01 |
| EP2126776A4 (en) | 2011-02-09 |
| US8752032B2 (en) | 2014-06-10 |
| CA2678951C (en) | 2020-03-24 |
| US20150074803A1 (en) | 2015-03-12 |
| WO2008101341A1 (en) | 2008-08-28 |
| AR065443A1 (es) | 2009-06-10 |
| CN101622627B (zh) | 2012-05-09 |
| EP2126775A4 (en) | 2011-02-09 |
| US20150213239A1 (en) | 2015-07-30 |
| US20080208560A1 (en) | 2008-08-28 |
| CA2678953C (en) | 2017-10-03 |
| US8161463B2 (en) | 2012-04-17 |
| CA2678953A1 (en) | 2008-08-28 |
| US20160239647A1 (en) | 2016-08-18 |
| US9910971B2 (en) | 2018-03-06 |
| CN101627394A (zh) | 2010-01-13 |
| EP2126775A1 (en) | 2009-12-02 |
| IN2009DN05762A (enExample) | 2015-07-24 |
| EP2126776A1 (en) | 2009-12-02 |
| CN101622627A (zh) | 2010-01-06 |
| EP2126776B1 (en) | 2017-11-15 |
| CA2678951A1 (en) | 2008-08-28 |
| US20080216051A1 (en) | 2008-09-04 |
| EP2126775B1 (en) | 2017-11-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN101627394B (zh) | 保护以软件为媒介的程序和装置性态的联锁系统和方法 | |
| US9906360B2 (en) | Securing accessible systems using variable dependent coding | |
| WO2008101340A1 (en) | System and method for interlocking to protect software-mediated program and device behaviours | |
| Filiol | Malicious cryptography techniques for unreversable (malicious or not) binaries | |
| Plasmans | White-box cryptography for digital content protection | |
| Mercadier et al. | OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element | |
| Löfström et al. | Hiding Information in Software With Respect to a White-box Security Model |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| C56 | Change in the name or address of the patentee |
Owner name: IRDETO CANADA CORP. Free format text: FORMER NAME: CLOAKWARE CORP. |
|
| CP01 | Change in the name or title of a patent holder |
Address after: Ontario Patentee after: Irdeto Canada Corp Address before: Ontario Patentee before: Cloakware Corp. |
|
| ASS | Succession or assignment of patent right |
Owner name: IRDETO B. V. Free format text: FORMER OWNER: IRDETO CANADA CORP. Effective date: 20150601 |
|
| C41 | Transfer of patent application or patent right or utility model | ||
| TR01 | Transfer of patent right |
Effective date of registration: 20150601 Address after: Holland Hoofddorp Patentee after: Ai Dide Technology Co., Ltd. Address before: Ontario Patentee before: Irdeto Canada Corp |