JP4702957B2 - 耐タンパ・トラステッド仮想マシン - Google Patents
耐タンパ・トラステッド仮想マシン Download PDFInfo
- Publication number
- JP4702957B2 JP4702957B2 JP2006540435A JP2006540435A JP4702957B2 JP 4702957 B2 JP4702957 B2 JP 4702957B2 JP 2006540435 A JP2006540435 A JP 2006540435A JP 2006540435 A JP2006540435 A JP 2006540435A JP 4702957 B2 JP4702957 B2 JP 4702957B2
- Authority
- JP
- Japan
- Prior art keywords
- trusted
- java
- application
- dictionary
- virtual machine
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 claims description 72
- 238000004590 computer program Methods 0.000 claims description 4
- 230000006870 function Effects 0.000 description 10
- 230000008569 process Effects 0.000 description 10
- KDLHZDBZIXYQEI-UHFFFAOYSA-N Palladium Chemical compound [Pd] KDLHZDBZIXYQEI-UHFFFAOYSA-N 0.000 description 8
- 238000004422 calculation algorithm Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 8
- 230000007246 mechanism Effects 0.000 description 8
- 230000008901 benefit Effects 0.000 description 7
- 238000013459 approach Methods 0.000 description 5
- 238000004364 calculation method Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 230000006399 behavior Effects 0.000 description 4
- 238000013461 design Methods 0.000 description 4
- 229910052763 palladium Inorganic materials 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 239000000284 extract Substances 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 238000009877 rendering Methods 0.000 description 3
- 238000003860 storage Methods 0.000 description 3
- 244000035744 Hura crepitans Species 0.000 description 2
- 230000027455 binding Effects 0.000 description 2
- 238000009739 binding Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 230000002427 irreversible effect Effects 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Description
15:サーバ
20、25、30:コンピュータ
35:ネットワーク
40、45、50、55:通信リンク
210:Java(登録商標)ベースクラス
215:Java(登録商標)アプリケーション
220:バイトコードインタプリタ
225:ネイティブメソッド
240:トラステッドバンドル
245:アプリケーションメイン
250:アプレットINIT
265、267:トラステッドディクショナリ
270、275、280、285:インテグリティエンベロープ
292:デバイス鍵
Claims (2)
- データを保護するトラステッドディクショナリと、プログラミングコードを保護するトラステッドバンドルと、を少なくとも含むアプリケーションと、前記アプリケーションの改ざんの有無と前記トラステッドディクショナリへアクセスするための鍵の有無とを検証するためのトラステッド仮想マシンと、から少なくとも構成されるトラステッド仮想マシン環境において、前記アプリケーションを動作する方法であって、
前記トラステッドバンドルの電子署名をチェックし、前記アプリケーションが改ざんされているか否かを確認するステップと、
前記アプリケーションが改ざんされている場合、前記トラステッドバンドルが前記トラステッドディクショナリへアクセスすることを許可しないステップと、
前記アプリケーションが改ざんされていない場合、前記トラステッドバンドルが前記トラステッドディクショナリへアクセスするための鍵を前記アプリケーションが有しているか否かを検証するステップと、
前記アプリケーションが前記アクセスするための鍵を有していない場合、前記トラステッドバンドルの前記トラステッドディクショナリへのアクセスを許可しないステップと、
前記アプリケーションが前記アクセスするための鍵を有している場合、前記トラステッドバンドルの前記トラステッドディクショナリへのアクセスを許可し、前記トラステッドディクショナリからメディアを再生するための鍵を取得するステップと、を含む方法。 - 実行時に前記請求項1記載の方法ステップを履行する命令コードを有するコンピュータプログラム。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/723,725 | 2003-11-26 | ||
US10/723,725 US7516331B2 (en) | 2003-11-26 | 2003-11-26 | Tamper-resistant trusted java virtual machine and method of using the same |
PCT/EP2004/052884 WO2005052841A2 (en) | 2003-11-26 | 2004-11-09 | Tamper-resistant trusted virtual machine |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2007514994A JP2007514994A (ja) | 2007-06-07 |
JP4702957B2 true JP4702957B2 (ja) | 2011-06-15 |
Family
ID=34592355
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2006540435A Expired - Fee Related JP4702957B2 (ja) | 2003-11-26 | 2004-11-09 | 耐タンパ・トラステッド仮想マシン |
Country Status (8)
Country | Link |
---|---|
US (2) | US7516331B2 (ja) |
EP (1) | EP1687688A2 (ja) |
JP (1) | JP4702957B2 (ja) |
KR (1) | KR100946042B1 (ja) |
CN (1) | CN101305333A (ja) |
CA (1) | CA2543572C (ja) |
IL (1) | IL175595A0 (ja) |
WO (1) | WO2005052841A2 (ja) |
Families Citing this family (99)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100965437B1 (ko) * | 2003-06-05 | 2010-06-24 | 인터트러스트 테크놀로지즈 코포레이션 | P2p 서비스 편성을 위한 상호운용 시스템 및 방법 |
US8271803B2 (en) * | 2003-10-08 | 2012-09-18 | Microsoft Corporation | Anti-debugging protection of binaries with proxy code execution |
US8103592B2 (en) * | 2003-10-08 | 2012-01-24 | Microsoft Corporation | First computer process and second computer process proxy-executing code on behalf of first process |
US7788496B2 (en) | 2003-10-08 | 2010-08-31 | Microsoft Corporation | First computer process and second computer process proxy-executing code on behalf thereof |
US7979911B2 (en) | 2003-10-08 | 2011-07-12 | Microsoft Corporation | First computer process and second computer process proxy-executing code from third computer process on behalf of first process |
US7516331B2 (en) | 2003-11-26 | 2009-04-07 | International Business Machines Corporation | Tamper-resistant trusted java virtual machine and method of using the same |
FI120638B (fi) * | 2003-12-17 | 2009-12-31 | Nokia Corp | Java-sovellusten käyttämän datan suojausjärjestelmä |
CA2563786A1 (en) * | 2004-04-28 | 2005-11-10 | Openlogic, Inc. | Tools for stacking uncoordinated software projects |
US20060048223A1 (en) * | 2004-08-31 | 2006-03-02 | Lee Michael C | Method and system for providing tamper-resistant software |
TWI277870B (en) * | 2004-11-22 | 2007-04-01 | Toshiba Corp | Copyright management method, information recording/reproducing method and device, and information recording medium and method of manufacturing the medium |
JP4688591B2 (ja) * | 2005-07-08 | 2011-05-25 | 日本電信電話株式会社 | オブジェクト制御装置とその制御方法 |
US8020156B2 (en) * | 2005-09-12 | 2011-09-13 | Oracle International Corporation | Bulk loading system and method |
US7954096B2 (en) * | 2005-09-12 | 2011-05-31 | Oracle International Corporation | Shared loader system and method |
US7644403B2 (en) * | 2005-09-12 | 2010-01-05 | Oracle International Corporation | Method and system for automated root-cause analysis for class loading failures in java |
US7784043B2 (en) * | 2005-09-12 | 2010-08-24 | Oracle International Corporation | Method and system for automated code-source indexing in Java Virtual Machine environment |
US7814472B2 (en) * | 2005-09-12 | 2010-10-12 | Oracle International Corporation | System and method for shared code-sourcing in a Java Virtual Machine environment |
JP2009512096A (ja) * | 2005-10-18 | 2009-03-19 | インタートラスト テクノロジーズ コーポレイション | デジタル著作権管理エンジンのシステムおよび方法 |
US9626667B2 (en) * | 2005-10-18 | 2017-04-18 | Intertrust Technologies Corporation | Digital rights management engine systems and methods |
US20070204078A1 (en) * | 2006-02-09 | 2007-08-30 | Intertrust Technologies Corporation | Digital rights management engine systems and methods |
GB0603781D0 (en) * | 2006-02-24 | 2006-04-05 | Nokia Corp | Application verification |
US8886929B2 (en) * | 2006-03-29 | 2014-11-11 | Intel Corporation | Generating a chain of trust for a virtual endpoint |
WO2008018055A2 (en) * | 2006-08-09 | 2008-02-14 | Neocleus Ltd | Extranet security |
US8584109B2 (en) | 2006-10-27 | 2013-11-12 | Microsoft Corporation | Virtualization for diversified tamper resistance |
US7613915B2 (en) * | 2006-11-09 | 2009-11-03 | BroadOn Communications Corp | Method for programming on-chip non-volatile memory in a secure processor, and a device so programmed |
JP2008177683A (ja) * | 2007-01-16 | 2008-07-31 | Kyocera Mita Corp | データ提供システム、データ受領システム、データ提供方法、データ提供プログラム及びデータ受領プログラム |
TWI328747B (en) * | 2007-03-16 | 2010-08-11 | Ind Tech Res Inst | System and method for sharing e-service resource of digital home |
EP2130322B1 (en) * | 2007-03-21 | 2014-06-25 | Intel Corporation | Protection against impersonation attacks |
WO2008114256A2 (en) * | 2007-03-22 | 2008-09-25 | Neocleus Ltd. | Trusted local single sign-on |
US8108856B2 (en) | 2007-03-30 | 2012-01-31 | Intel Corporation | Method and apparatus for adaptive integrity measurement of computer software |
US9703576B2 (en) * | 2007-04-05 | 2017-07-11 | International Business Machines Corporation | Aspect scoping in a modularity runtime |
US7984483B2 (en) | 2007-04-25 | 2011-07-19 | Acxess, Inc. | System and method for working in a virtualized computing environment through secure access |
US7886162B2 (en) * | 2007-05-29 | 2011-02-08 | International Business Machines Corporation | Cryptographic secure program overlays |
US8422674B2 (en) * | 2007-05-29 | 2013-04-16 | International Business Machines Corporation | Application-specific secret generation |
US8433927B2 (en) * | 2007-05-29 | 2013-04-30 | International Business Machines Corporation | Cryptographically-enabled privileged mode execution |
US8332635B2 (en) * | 2007-05-29 | 2012-12-11 | International Business Machines Corporation | Updateable secure kernel extensions |
DE102007045743A1 (de) * | 2007-09-25 | 2009-04-02 | Siemens Ag | Verfahren und System zum Schutz gegen einen Zugriff auf einen Maschinencode eines Gerätes |
US8332636B2 (en) * | 2007-10-02 | 2012-12-11 | International Business Machines Corporation | Secure policy differentiation by secure kernel design |
US20110035601A1 (en) * | 2007-12-21 | 2011-02-10 | University Of Virginia Patent Foundation | System, method and computer program product for protecting software via continuous anti-tampering and obfuscation transforms |
KR100939210B1 (ko) * | 2007-12-27 | 2010-01-28 | 주식회사 안철수연구소 | 가상 환경에서의 디버깅 방지 장치 및 방법 |
US8474037B2 (en) | 2008-01-07 | 2013-06-25 | Intel Corporation | Stateless attestation system |
US9262594B2 (en) * | 2008-01-18 | 2016-02-16 | Microsoft Technology Licensing, Llc | Tamper evidence per device protected identity |
US20090281949A1 (en) * | 2008-05-12 | 2009-11-12 | Appsware Wireless, Llc | Method and system for securing a payment transaction |
US20090307705A1 (en) * | 2008-06-05 | 2009-12-10 | Neocleus Israel Ltd | Secure multi-purpose computing client |
CN101452397B (zh) * | 2008-11-27 | 2012-08-22 | 上海交通大学 | 虚拟化环境中的强制访问控制方法及装置 |
US8375377B2 (en) * | 2009-03-06 | 2013-02-12 | International Business Machines Corporation | Controlling java virtual machine component behavior on a per-classloader basis |
EP2415003A4 (en) * | 2009-03-30 | 2013-05-01 | Apriva Llc | METHOD AND SYSTEM FOR SECURING PAYMENT TRANSACTION USING CODE OF TRUST BASE |
US20100250441A1 (en) * | 2009-03-30 | 2010-09-30 | Appsware Wireless, Llc | Method and system for securing a payment transaction with trusted code base on a removable system module |
US20100250442A1 (en) * | 2009-03-30 | 2010-09-30 | Appsware Wireless, Llc | Method and system for securing a payment transaction with a trusted code base |
CN101567893A (zh) * | 2009-05-26 | 2009-10-28 | 中兴通讯股份有限公司 | 一种实现在web应用中文件上传的方法及系统 |
US9846789B2 (en) | 2011-09-06 | 2017-12-19 | International Business Machines Corporation | Protecting application programs from malicious software or malware |
US8954752B2 (en) | 2011-02-23 | 2015-02-10 | International Business Machines Corporation | Building and distributing secure object software |
US8578175B2 (en) | 2011-02-23 | 2013-11-05 | International Business Machines Corporation | Secure object having protected region, integrity tree, and unprotected region |
US9954875B2 (en) | 2009-06-26 | 2018-04-24 | International Business Machines Corporation | Protecting from unintentional malware download |
US9298894B2 (en) | 2009-06-26 | 2016-03-29 | International Business Machines Corporation | Cache structure for a computer system providing support for secure objects |
US8819446B2 (en) | 2009-06-26 | 2014-08-26 | International Business Machines Corporation | Support for secure objects in a computer system |
US8812959B2 (en) * | 2009-06-30 | 2014-08-19 | International Business Machines Corporation | Method and system for delivering digital content |
CA2774728C (en) * | 2009-11-13 | 2019-02-12 | Irdeto Canada Corporation | System and method to protect java bytecode code against static and dynamic attacks within hostile execution environments |
DE102009054114A1 (de) * | 2009-11-20 | 2011-05-26 | Siemens Aktiengesellschaft | Verfahren und Vorrichtung zum Zugreifen auf Steuerungsdaten gemäß einer bereitgestellten Rechteinformation |
US8495154B2 (en) * | 2010-01-25 | 2013-07-23 | International Business Machines Corporation | Content usage tracking in superdistribution |
EP2438511B1 (en) | 2010-03-22 | 2019-07-03 | LRDC Systems, LLC | A method of identifying and protecting the integrity of a set of source data |
CN102200925B (zh) * | 2010-03-22 | 2015-04-29 | 联想(北京)有限公司 | 应用虚拟域数据访问的方法、虚拟机管理器及计算机 |
CN101814124A (zh) * | 2010-04-20 | 2010-08-25 | 浪潮电子信息产业股份有限公司 | 一种基于Java的软件安全性加强的方法 |
US8498982B1 (en) | 2010-07-07 | 2013-07-30 | Openlogic, Inc. | Noise reduction for content matching analysis results for protectable content |
JP5318830B2 (ja) * | 2010-08-25 | 2013-10-16 | 株式会社日立ソリューションズ | WebAPIサーバプログラム、WebAPI公開方法 |
US9087196B2 (en) * | 2010-12-24 | 2015-07-21 | Intel Corporation | Secure application attestation using dynamic measurement kernels |
US9864853B2 (en) | 2011-02-23 | 2018-01-09 | International Business Machines Corporation | Enhanced security mechanism for authentication of users of a system |
US8631480B2 (en) | 2011-03-28 | 2014-01-14 | Canon Kabushiki Kaisha | Systems and methods for implementing security services |
US8732811B2 (en) | 2011-03-28 | 2014-05-20 | Canon Kabushiki Kaisha | Systems and methods for implementing security services |
US9460281B2 (en) * | 2011-03-31 | 2016-10-04 | Irdeto B.V. | Method of securing non-native code |
JP6047553B2 (ja) | 2011-04-11 | 2016-12-21 | インタートラスト テクノロジーズ コーポレイション | 情報セキュリティのためのシステムと方法 |
US8850593B2 (en) | 2011-05-12 | 2014-09-30 | Hewlett-Packard Development Company, L.P. | Data management using a virtual machine-data image |
SG189388A1 (en) | 2011-11-16 | 2013-05-31 | V Key Inc | Cryptographic system and methodology for securing software cryptography |
CN102411690B (zh) * | 2011-12-31 | 2014-07-23 | 中国信息安全测评中心 | 一种Android平台下应用软件的安全漏洞挖掘方法和装置 |
US8638935B2 (en) | 2012-01-12 | 2014-01-28 | Apple Inc. | System and method for key space division and sub-key derivation for mixed media digital rights management content |
US9992024B2 (en) * | 2012-01-25 | 2018-06-05 | Fujitsu Limited | Establishing a chain of trust within a virtual machine |
CN102984229B (zh) * | 2012-11-16 | 2015-08-19 | 北京奇虎科技有限公司 | 用于配置信任机的方法和系统 |
CN102999357B (zh) * | 2012-11-16 | 2015-11-25 | 北京奇虎科技有限公司 | 一种信任机的配置方法和系统 |
US9292673B2 (en) * | 2013-03-15 | 2016-03-22 | International Business Machines Corporation | Virtual key management and isolation of data deployments in multi-tenant environments |
KR101471589B1 (ko) * | 2013-08-22 | 2014-12-10 | (주)잉카엔트웍스 | 공통중간언어 기반 프로그램을 위한 보안 제공 방법 |
US9740854B2 (en) | 2013-10-25 | 2017-08-22 | Red Hat, Inc. | System and method for code protection |
US20170024230A1 (en) * | 2014-03-31 | 2017-01-26 | Yunpeng Li | Method, apparatus, and computer-readable medium for ofuscating execution of an application on a virtual machine |
CN105022936A (zh) * | 2014-04-30 | 2015-11-04 | 北京畅游天下网络技术有限公司 | 一种类class文件加密解密方法和装置 |
US9906493B1 (en) * | 2014-05-07 | 2018-02-27 | Skyport Systems, Inc. | Method and system for verifying the integrity of computing devices |
CN105446709B (zh) * | 2014-07-29 | 2019-06-21 | 阿里巴巴集团控股有限公司 | 一种Java应用处理方法及装置 |
US9628279B2 (en) * | 2014-09-30 | 2017-04-18 | Microsoft Technology Licensing, Llc | Protecting application secrets from operating system attacks |
KR102490331B1 (ko) * | 2014-12-16 | 2023-01-18 | 킨디 인코포레이티드 | 컴퓨터 인스트럭션 세트, 메모리 레지스터 및 포인터를 랜덤화하기 위한 방법 및 장치 |
US10205710B2 (en) * | 2015-01-08 | 2019-02-12 | Intertrust Technologies Corporation | Cryptographic systems and methods |
US10931455B2 (en) * | 2015-09-28 | 2021-02-23 | EyeVerify Inc. | Secure image pipeline |
US10601593B2 (en) | 2016-09-23 | 2020-03-24 | Microsoft Technology Licensing, Llc | Type-based database confidentiality using trusted computing |
US10379894B1 (en) * | 2016-09-27 | 2019-08-13 | Amazon Technologies, Inc. | Lineage-based trust for virtual machine images |
CN108932429B (zh) * | 2017-05-27 | 2023-02-03 | 腾讯科技(深圳)有限公司 | 应用程序的分析方法、终端及存储介质 |
KR102575665B1 (ko) | 2018-04-10 | 2023-09-06 | 비자 인터네셔널 서비스 어소시에이션 | 모바일 장치용 변조 방지 데이터 인코딩 |
CN109325343B (zh) * | 2018-09-17 | 2021-08-10 | 北京深思数盾科技股份有限公司 | Java程序执行方法及装置 |
EP3861671A4 (en) | 2018-10-02 | 2021-11-24 | Visa International Service Association | NON-MALLEABLE CODES DELIMITED BY CONTINUOUS SPACE FROM STRONGER SPACE EVIDENCE |
US11194695B2 (en) * | 2020-01-07 | 2021-12-07 | Supercell Oy | Method for blocking external debugger application from analysing code of software program |
US11550883B2 (en) | 2020-09-08 | 2023-01-10 | Assured Information Security, Inc. | Code protection |
US11520895B2 (en) * | 2020-12-07 | 2022-12-06 | Samsung Electronics Co., Ltd. | System and method for dynamic verification of trusted applications |
US20230094125A1 (en) * | 2021-09-24 | 2023-03-30 | Nvidia Corporation | Implementing trusted executing environments across multiple processor devices |
CN114327776A (zh) * | 2021-12-30 | 2022-04-12 | 支付宝(杭州)信息技术有限公司 | 用于智能合约的调试方法、调试设备和调试系统 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002251326A (ja) * | 2001-02-22 | 2002-09-06 | Hitachi Ltd | 耐タンパ計算機システム |
JP2005528665A (ja) * | 2001-09-27 | 2005-09-22 | インテル コーポレイション | システムインテグリティとレガシー環境とを提供するための方法 |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0686916A1 (en) * | 1994-06-07 | 1995-12-13 | Digital Equipment Corporation | Method and apparatus for testing software |
CN1312549C (zh) | 1995-02-13 | 2007-04-25 | 英特特拉斯特技术公司 | 用于安全交易管理和电子权利保护的系统和方法 |
US5757915A (en) | 1995-08-25 | 1998-05-26 | Intel Corporation | Parameterized hash functions for access control |
US6067575A (en) | 1995-12-08 | 2000-05-23 | Sun Microsystems, Inc. | System and method for generating trusted, architecture specific, compiled versions of architecture neutral programs |
US5692047A (en) | 1995-12-08 | 1997-11-25 | Sun Microsystems, Inc. | System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources |
US5920861A (en) | 1997-02-25 | 1999-07-06 | Intertrust Technologies Corp. | Techniques for defining using and manipulating rights management data structures |
US6092147A (en) * | 1997-04-15 | 2000-07-18 | Sun Microsystems, Inc. | Virtual machine with securely distributed bytecode verification |
JPH10301773A (ja) | 1997-04-30 | 1998-11-13 | Sony Corp | 情報処理装置および情報処理方法、並びに記録媒体 |
US7404175B2 (en) * | 2000-10-10 | 2008-07-22 | Bea Systems, Inc. | Smart generator |
US6961855B1 (en) * | 1999-12-16 | 2005-11-01 | International Business Machines Corporation | Notification of modifications to a trusted computing base |
AU2001243365A1 (en) * | 2000-03-02 | 2001-09-12 | Alarity Corporation | System and method for process protection |
US20020167902A1 (en) * | 2001-04-27 | 2002-11-14 | Foster Michael S. | Method and system for performing security via virtual addressing in a communications network |
US20020184520A1 (en) | 2001-05-30 | 2002-12-05 | Bush William R. | Method and apparatus for a secure virtual machine |
GB2376765B (en) | 2001-06-19 | 2004-12-29 | Hewlett Packard Co | Multiple trusted computing environments with verifiable environment identities |
US6976167B2 (en) | 2001-06-26 | 2005-12-13 | Intel Corporation | Cryptography-based tamper-resistant software design mechanism |
US7526654B2 (en) | 2001-10-16 | 2009-04-28 | Marc Charbonneau | Method and system for detecting a secure state of a computer system |
US7496757B2 (en) | 2002-01-14 | 2009-02-24 | International Business Machines Corporation | Software verification system, method and computer program element |
US7469346B2 (en) * | 2003-06-27 | 2008-12-23 | Disney Enterprises, Inc. | Dual virtual machine architecture for media devices |
US7516331B2 (en) | 2003-11-26 | 2009-04-07 | International Business Machines Corporation | Tamper-resistant trusted java virtual machine and method of using the same |
-
2003
- 2003-11-26 US US10/723,725 patent/US7516331B2/en not_active Expired - Fee Related
-
2004
- 2004-11-09 EP EP04804522A patent/EP1687688A2/en not_active Ceased
- 2004-11-09 CN CNA2004800343862A patent/CN101305333A/zh active Pending
- 2004-11-09 JP JP2006540435A patent/JP4702957B2/ja not_active Expired - Fee Related
- 2004-11-09 WO PCT/EP2004/052884 patent/WO2005052841A2/en active Application Filing
- 2004-11-09 CA CA2543572A patent/CA2543572C/en active Active
- 2004-11-09 KR KR1020067011019A patent/KR100946042B1/ko not_active IP Right Cessation
-
2006
- 2006-05-11 IL IL175595A patent/IL175595A0/en unknown
-
2009
- 2009-02-02 US US12/363,876 patent/US7747877B2/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002251326A (ja) * | 2001-02-22 | 2002-09-06 | Hitachi Ltd | 耐タンパ計算機システム |
JP2005528665A (ja) * | 2001-09-27 | 2005-09-22 | インテル コーポレイション | システムインテグリティとレガシー環境とを提供するための方法 |
Also Published As
Publication number | Publication date |
---|---|
US20050114683A1 (en) | 2005-05-26 |
CN101305333A (zh) | 2008-11-12 |
IL175595A0 (en) | 2006-10-05 |
JP2007514994A (ja) | 2007-06-07 |
US20090138731A1 (en) | 2009-05-28 |
WO2005052841A3 (en) | 2005-08-11 |
CA2543572A1 (en) | 2005-06-09 |
US7516331B2 (en) | 2009-04-07 |
KR20070001893A (ko) | 2007-01-04 |
WO2005052841A9 (en) | 2006-07-20 |
CA2543572C (en) | 2012-01-17 |
EP1687688A2 (en) | 2006-08-09 |
KR100946042B1 (ko) | 2010-03-09 |
US7747877B2 (en) | 2010-06-29 |
WO2005052841A2 (en) | 2005-06-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4702957B2 (ja) | 耐タンパ・トラステッド仮想マシン | |
Naumovich et al. | Preventing piracy, reverse engineering, and tampering | |
US20210294879A1 (en) | Securing executable code integrity using auto-derivative key | |
US7546587B2 (en) | Run-time call stack verification | |
AU2005201995B2 (en) | System and method for protected operating system boot using state validation | |
US7228426B2 (en) | Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context | |
US7181603B2 (en) | Method of secure function loading | |
JP4689945B2 (ja) | リソースアクセス方法 | |
JP5636371B2 (ja) | 汎用コンピューティングデバイスにおけるコード実行制御および再帰的セキュリティプロトコルでのコード実行制御のための方法およびシステム | |
US20050060568A1 (en) | Controlling access to data | |
US20050144448A1 (en) | Transferring application secrets in a trusted operating system environment | |
US20080263366A1 (en) | Self-verifying software to prevent reverse engineering and piracy | |
KR20030082485A (ko) | 대칭 키 암호화에 기초한 데이터의 저장 및 검색 | |
WO2003090021A2 (en) | Security framework for protecting rights in computer software | |
US20090328003A1 (en) | Systems And Methods For Regulating Execution Of Computer Software | |
US20060015860A1 (en) | System and method for storing attributes in a file for processing an operating system | |
US20060015723A1 (en) | System and method for authorizing the use of stored information in an operating system | |
KR101265887B1 (ko) | 보호 컴퓨팅 환경을 제공하는 방법 및 장치 내에 보호 환경을 설정하는 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20071101 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20100831 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20101130 |
|
RD12 | Notification of acceptance of power of sub attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7432 Effective date: 20101130 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A821 Effective date: 20101202 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20110118 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20110127 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20110222 |
|
RD14 | Notification of resignation of power of sub attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7434 Effective date: 20110224 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20110307 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 4702957 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
LAPS | Cancellation because of no payment of annual fees |