JP4729575B2 - ソフトウェアのセキュリティ確保 - Google Patents
ソフトウェアのセキュリティ確保 Download PDFInfo
- Publication number
- JP4729575B2 JP4729575B2 JP2007527785A JP2007527785A JP4729575B2 JP 4729575 B2 JP4729575 B2 JP 4729575B2 JP 2007527785 A JP2007527785 A JP 2007527785A JP 2007527785 A JP2007527785 A JP 2007527785A JP 4729575 B2 JP4729575 B2 JP 4729575B2
- Authority
- JP
- Japan
- Prior art keywords
- software
- checksum
- dynamic link
- computer
- link library
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (21)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US57893704P | 2004-06-12 | 2004-06-12 | |
| US60/578,937 | 2004-06-12 | ||
| US11/061,399 US7721340B2 (en) | 2004-06-12 | 2005-02-17 | Registry protection |
| US11/061,792 | 2005-02-17 | ||
| US11/061,280 | 2005-02-17 | ||
| US11/061,791 | 2005-02-17 | ||
| US11/061,791 US7584509B2 (en) | 2004-06-12 | 2005-02-17 | Inhibiting software tampering |
| US11/061,411 US7631360B2 (en) | 2004-06-12 | 2005-02-17 | Hardware protection |
| US11/061,484 US7640592B2 (en) | 2004-06-12 | 2005-02-17 | Installation setup |
| US11/061,411 | 2005-02-17 | ||
| US11/061,484 | 2005-02-17 | ||
| US11/062,238 | 2005-02-17 | ||
| US11/061,399 | 2005-02-17 | ||
| US11/061,792 US7577997B2 (en) | 2004-06-12 | 2005-02-17 | Image verification |
| US11/061,790 | 2005-02-17 | ||
| US11/061,790 US7559091B2 (en) | 2004-06-12 | 2005-02-17 | Software obfuscation |
| US11/062,237 US7552337B2 (en) | 2004-06-12 | 2005-02-17 | Service protection |
| US11/062,237 | 2005-02-17 | ||
| US11/062,238 US7526805B2 (en) | 2004-06-12 | 2005-02-17 | Thread protection |
| US11/061,280 US7891008B2 (en) | 2004-06-12 | 2005-02-17 | Profile protection |
| PCT/US2005/020638 WO2005125081A2 (en) | 2004-06-12 | 2005-06-10 | Securing software |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2008503014A JP2008503014A (ja) | 2008-01-31 |
| JP2008503014A5 JP2008503014A5 (enExample) | 2008-07-31 |
| JP4729575B2 true JP4729575B2 (ja) | 2011-07-20 |
Family
ID=35510448
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2007527785A Expired - Fee Related JP4729575B2 (ja) | 2004-06-12 | 2005-06-10 | ソフトウェアのセキュリティ確保 |
Country Status (5)
| Country | Link |
|---|---|
| US (8) | US7526805B2 (enExample) |
| EP (1) | EP1757008B1 (enExample) |
| JP (1) | JP4729575B2 (enExample) |
| KR (3) | KR101187521B1 (enExample) |
| WO (1) | WO2005125081A2 (enExample) |
Families Citing this family (115)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US2778053A (en) * | 1954-09-13 | 1957-01-22 | Duro Metal Products Co | Separable hinged mounting for motors or the like |
| CA2435624C (en) * | 2000-09-22 | 2013-05-07 | Richard B. Levine | Systems and methods for preventing unauthorized use of digital content |
| US8103592B2 (en) * | 2003-10-08 | 2012-01-24 | Microsoft Corporation | First computer process and second computer process proxy-executing code on behalf of first process |
| US8271803B2 (en) * | 2003-10-08 | 2012-09-18 | Microsoft Corporation | Anti-debugging protection of binaries with proxy code execution |
| US7788496B2 (en) | 2003-10-08 | 2010-08-31 | Microsoft Corporation | First computer process and second computer process proxy-executing code on behalf thereof |
| US7979911B2 (en) | 2003-10-08 | 2011-07-12 | Microsoft Corporation | First computer process and second computer process proxy-executing code from third computer process on behalf of first process |
| US7860239B2 (en) * | 2004-07-07 | 2010-12-28 | International Business Machines Corporation | Method and apparatus for metering usage of software products using multiple signatures |
| US7841009B1 (en) * | 2004-07-09 | 2010-11-23 | Angel Secure Networks | System and method for defending against reverse engineering of software, firmware and hardware |
| US20060021066A1 (en) * | 2004-07-26 | 2006-01-26 | Ray Clayton | Data encryption system and method |
| US20060259903A1 (en) * | 2005-05-12 | 2006-11-16 | Xerox Corporation | Method for creating unique identification for copies of executable code and management thereof |
| US20060259900A1 (en) * | 2005-05-12 | 2006-11-16 | Xerox Corporation | Method for creating unique identification for copies of executable code and management thereof |
| GB0516471D0 (en) * | 2005-08-10 | 2005-09-14 | Symbian Software Ltd | Protected software identifiers for improving security in a computing device |
| US20070192824A1 (en) * | 2006-02-14 | 2007-08-16 | Microsoft Corporation | Computer hosting multiple secure execution environments |
| US8214296B2 (en) * | 2006-02-14 | 2012-07-03 | Microsoft Corporation | Disaggregated secure execution environment |
| US8020001B2 (en) * | 2006-02-23 | 2011-09-13 | Qualcomm Incorporated | Trusted code groups |
| US8010947B2 (en) | 2006-05-23 | 2011-08-30 | International Business Machines Corporation | Discovering multi-component software products based on weighted scores |
| US7814544B1 (en) * | 2006-06-22 | 2010-10-12 | Symantec Corporation | API-profile guided unpacking |
| US7805289B2 (en) * | 2006-07-10 | 2010-09-28 | Microsoft Corporation | Aligning hierarchal and sequential document trees to identify parallel data |
| CN101491000B (zh) * | 2006-07-12 | 2011-12-28 | 耶德托公司 | 用于混淆密码函数的方法和系统 |
| US8392996B2 (en) * | 2006-08-08 | 2013-03-05 | Symantec Corporation | Malicious software detection |
| US20080099141A1 (en) * | 2006-10-26 | 2008-05-01 | Ashland Inc. | Method of producing flexible laminates |
| US8584109B2 (en) * | 2006-10-27 | 2013-11-12 | Microsoft Corporation | Virtualization for diversified tamper resistance |
| US8356356B2 (en) * | 2007-01-30 | 2013-01-15 | Microsoft Corporation | Anti-debugger comprising spatially and temporally separate detection and response portions |
| US8286138B2 (en) * | 2007-01-30 | 2012-10-09 | Microsoft Corporation | Multi-threaded detection of a game software debugger |
| JP4903071B2 (ja) * | 2007-03-15 | 2012-03-21 | 株式会社リコー | 情報処理装置、ソフトウェア更新方法及び画像処理装置 |
| US20080229115A1 (en) * | 2007-03-16 | 2008-09-18 | Microsoft Corporation | Provision of functionality via obfuscated software |
| US20080263366A1 (en) * | 2007-04-19 | 2008-10-23 | Microsoft Corporation | Self-verifying software to prevent reverse engineering and piracy |
| US8336107B2 (en) * | 2007-04-27 | 2012-12-18 | Angel Secure Networks, Inc. | System and methods for defending against root |
| US8176473B2 (en) * | 2007-05-14 | 2012-05-08 | Microsoft Corporation | Transformations for software obfuscation and individualization |
| US9545258B2 (en) | 2007-05-17 | 2017-01-17 | Boston Scientific Scimed, Inc. | Tissue aperture securing and sealing apparatuses and related methods of use |
| KR100938672B1 (ko) * | 2007-11-20 | 2010-01-25 | 한국전자통신연구원 | 악성 코드에 의해 삽입된 동적 연결 라이브러리 검출 장치 및 방법 |
| US10552701B2 (en) * | 2008-02-01 | 2020-02-04 | Oath Inc. | System and method for detecting the source of media content with application to business rules |
| WO2009098630A1 (en) | 2008-02-06 | 2009-08-13 | Nxp B.V. | Data processing device and method for executing obfuscated programs |
| CN101939749A (zh) | 2008-02-11 | 2011-01-05 | Nxp股份有限公司 | 程序模糊方法和用于执行模糊程序的处理设备 |
| US8208900B2 (en) * | 2008-03-04 | 2012-06-26 | Apple Inc. | Secure device configuration profiles |
| US8176337B2 (en) * | 2008-03-12 | 2012-05-08 | Apple Inc. | Computer object code obfuscation using boot installation |
| WO2009123630A1 (en) * | 2008-04-02 | 2009-10-08 | Hewlett-Packard Development Company, L.P. | Disk drive data encryption |
| US8752185B2 (en) * | 2008-05-01 | 2014-06-10 | Yahoo! Inc. | Method for media fingerprinting |
| EP2234031A1 (en) * | 2009-03-24 | 2010-09-29 | SafeNet, Inc. | Obfuscation |
| US8474052B2 (en) * | 2009-12-09 | 2013-06-25 | Microsoft Corporation | User-administered license state verification |
| US20110225649A1 (en) * | 2010-03-11 | 2011-09-15 | International Business Machines Corporation | Protecting Computer Systems From Malicious Software |
| EP2438511B1 (en) | 2010-03-22 | 2019-07-03 | LRDC Systems, LLC | A method of identifying and protecting the integrity of a set of source data |
| US11297045B2 (en) | 2010-03-26 | 2022-04-05 | Kioxia Corporation | Information recording apparatus with shadow boot program for authentication with a server |
| JP5380604B2 (ja) | 2010-03-26 | 2014-01-08 | 株式会社東芝 | 情報記録装置 |
| JP5585257B2 (ja) * | 2010-07-16 | 2014-09-10 | 株式会社リコー | 画像形成装置、機器システム、プログラム管理方法、プログラム |
| US9647984B2 (en) * | 2010-08-05 | 2017-05-09 | Gemalto Sa | System and method for securely using multiple subscriber profiles with a security component and a mobile telecommunications device |
| TWI420339B (zh) | 2010-11-10 | 2013-12-21 | Ind Tech Res Inst | 軟體授權系統及方法 |
| US8499173B2 (en) * | 2010-11-23 | 2013-07-30 | Lockheed Martin Corporation | Apparatus and method for protection of circuit boards from tampering |
| US8683452B1 (en) * | 2010-12-21 | 2014-03-25 | Emc Corporation | Dynamically obfuscated javascript |
| GB2501433B (en) | 2011-01-19 | 2014-06-04 | Ibm | Ensuring the integrity of software |
| US8930717B2 (en) | 2011-03-01 | 2015-01-06 | Angel Secure Networks, Inc. | Secure processing module and method for making the same |
| US9058482B2 (en) | 2011-03-01 | 2015-06-16 | Angel Secure Networks, Inc. | Controlling user access to electronic resources without password |
| CN103299270B (zh) * | 2011-04-29 | 2017-03-08 | 中天安泰(北京)信息技术有限公司 | 运行时指令重组方法及装置 |
| US8516273B2 (en) * | 2011-05-31 | 2013-08-20 | Asobe Systems Incorporated | Porting digital rights management service to multiple computing platforms |
| US8181035B1 (en) | 2011-06-22 | 2012-05-15 | Media Patents, S.L. | Methods, apparatus and systems to improve security in computer systems |
| US8595510B2 (en) | 2011-06-22 | 2013-11-26 | Media Patents, S.L. | Methods, apparatus and systems to improve security in computer systems |
| US8261085B1 (en) * | 2011-06-22 | 2012-09-04 | Media Patents, S.L. | Methods, apparatus and systems to improve security in computer systems |
| US9111072B1 (en) * | 2011-08-23 | 2015-08-18 | Tectonic Labs, LLC | Anti-reverse engineering unified process |
| US9519648B2 (en) * | 2011-09-27 | 2016-12-13 | International Business Machines Corporation | Software detection |
| US20140032733A1 (en) | 2011-10-11 | 2014-01-30 | Citrix Systems, Inc. | Policy-Based Application Management |
| US9280377B2 (en) | 2013-03-29 | 2016-03-08 | Citrix Systems, Inc. | Application with multiple operation modes |
| US9215225B2 (en) | 2013-03-29 | 2015-12-15 | Citrix Systems, Inc. | Mobile device locking with context |
| US8886925B2 (en) | 2011-10-11 | 2014-11-11 | Citrix Systems, Inc. | Protecting enterprise data through policy-based encryption of message attachments |
| US8640242B2 (en) * | 2011-12-01 | 2014-01-28 | Mcafee, Inc. | Preventing and detecting print-provider startup malware |
| US9052824B2 (en) * | 2012-01-26 | 2015-06-09 | Upthere, Inc. | Content addressable stores based on sibling groups |
| US9608881B2 (en) * | 2012-04-13 | 2017-03-28 | International Business Machines Corporation | Service compliance enforcement using user activity monitoring and work request verification |
| US8997230B1 (en) | 2012-06-15 | 2015-03-31 | Square, Inc. | Hierarchical data security measures for a mobile device |
| CN102799815B (zh) * | 2012-06-29 | 2015-07-29 | 安科智慧城市技术(中国)有限公司 | 一种安全加载程序库的方法和装置 |
| CN104408333B (zh) * | 2012-09-24 | 2017-06-13 | 江苏理工学院 | 一种基于片上系统多核融合的软件保护装置 |
| US8726343B1 (en) | 2012-10-12 | 2014-05-13 | Citrix Systems, Inc. | Managing dynamic policies and settings in an orchestration framework for connected devices |
| US9774658B2 (en) | 2012-10-12 | 2017-09-26 | Citrix Systems, Inc. | Orchestration framework for connected devices |
| US9516022B2 (en) | 2012-10-14 | 2016-12-06 | Getgo, Inc. | Automated meeting room |
| US20140109176A1 (en) | 2012-10-15 | 2014-04-17 | Citrix Systems, Inc. | Configuring and providing profiles that manage execution of mobile applications |
| US8910239B2 (en) | 2012-10-15 | 2014-12-09 | Citrix Systems, Inc. | Providing virtualized private network tunnels |
| US20140108793A1 (en) | 2012-10-16 | 2014-04-17 | Citrix Systems, Inc. | Controlling mobile device access to secure data |
| EP2909715B1 (en) | 2012-10-16 | 2022-12-14 | Citrix Systems, Inc. | Application wrapping for application management framework |
| US9606774B2 (en) | 2012-10-16 | 2017-03-28 | Citrix Systems, Inc. | Wrapping an application with field-programmable business logic |
| US9971585B2 (en) | 2012-10-16 | 2018-05-15 | Citrix Systems, Inc. | Wrapping unmanaged applications on a mobile device |
| GB2505531B (en) * | 2012-11-16 | 2015-01-07 | F Secure Corp | Methods, systems and apparatus for managing data entries on a database |
| US9270660B2 (en) | 2012-11-25 | 2016-02-23 | Angel Secure Networks, Inc. | System and method for using a separate device to facilitate authentication |
| EP2933292B1 (en) * | 2012-12-12 | 2019-08-28 | Zeon Corporation | Vinyl chloride resin composition for powder molding, vinyl chloride resin molded article and laminate |
| US9183391B2 (en) * | 2013-03-13 | 2015-11-10 | Intel Corporation | Managing device driver cross ring accesses |
| US8875247B2 (en) | 2013-03-14 | 2014-10-28 | Facebook, Inc. | Instant personalization security |
| US9985850B2 (en) | 2013-03-29 | 2018-05-29 | Citrix Systems, Inc. | Providing mobile device management functionalities |
| US9355223B2 (en) | 2013-03-29 | 2016-05-31 | Citrix Systems, Inc. | Providing a managed browser |
| US9455886B2 (en) | 2013-03-29 | 2016-09-27 | Citrix Systems, Inc. | Providing mobile device management functionalities |
| US8849978B1 (en) | 2013-03-29 | 2014-09-30 | Citrix Systems, Inc. | Providing an enterprise application store |
| US10284627B2 (en) | 2013-03-29 | 2019-05-07 | Citrix Systems, Inc. | Data management for an application with multiple operation modes |
| US8943592B1 (en) * | 2013-07-15 | 2015-01-27 | Eset, Spol. S.R.O. | Methods of detection of software exploitation |
| KR101471589B1 (ko) * | 2013-08-22 | 2014-12-10 | (주)잉카엔트웍스 | 공통중간언어 기반 프로그램을 위한 보안 제공 방법 |
| KR101503785B1 (ko) * | 2013-10-10 | 2015-03-18 | (주)잉카엔트웍스 | 동적 라이브러리를 보호하는 방법 및 장치 |
| DE102014204417A1 (de) | 2014-03-11 | 2015-09-17 | Siemens Aktiengesellschaft | Vorrichtung und Verfahren zum Detektieren einer Manipulation an einem Programmcode |
| US9639673B2 (en) | 2014-06-17 | 2017-05-02 | Apple Inc. | Protecting software through a fake cryptographic layer |
| CN104217137B (zh) * | 2014-08-29 | 2017-09-29 | 广东欧珀移动通信有限公司 | 一种识别智能终端系统是否被更改的方法及装置 |
| SI3197953T1 (sl) * | 2014-09-24 | 2018-10-30 | Evonik Roehm Gmbh | Na udarce odporen material za ulivanje z izboljšanim profilom značilnosti |
| US9483381B2 (en) * | 2014-12-15 | 2016-11-01 | Dell Products L.P. | Obfuscating debugging filenames |
| US10733594B1 (en) | 2015-05-11 | 2020-08-04 | Square, Inc. | Data security measures for mobile devices |
| CN104933332B (zh) * | 2015-06-10 | 2018-07-13 | 北京北信源软件股份有限公司 | 一种防止软件被非法卸载的方法及装置 |
| KR20170010574A (ko) | 2015-07-20 | 2017-02-01 | 삼성전자주식회사 | 정보처리장치, 영상처리장치 및 그들의 제어방법 |
| WO2017146721A1 (en) | 2016-02-26 | 2017-08-31 | Hewlett Packard Enterprise Development Lp | Fault isolation in transaction logs |
| US10594731B2 (en) | 2016-03-24 | 2020-03-17 | Snowflake Inc. | Systems, methods, and devices for securely managing network connections |
| US10546302B2 (en) | 2016-06-30 | 2020-01-28 | Square, Inc. | Logical validation of devices against fraud and tampering |
| US10373167B2 (en) | 2016-06-30 | 2019-08-06 | Square, Inc. | Logical validation of devices against fraud |
| US10474446B2 (en) * | 2016-09-16 | 2019-11-12 | Bank Of America Corporation | Installation tool for adhering to enterprise requirements |
| US10404667B2 (en) | 2016-11-17 | 2019-09-03 | Bank Of America Corporation | Secure, autonomous file encryption and decryption |
| US20180187335A1 (en) | 2017-01-01 | 2018-07-05 | Lummus Corporation | Materials segregating seed cotton extractor cleaner |
| US10496993B1 (en) | 2017-02-15 | 2019-12-03 | Square, Inc. | DNS-based device geolocation |
| US10552308B1 (en) | 2017-06-23 | 2020-02-04 | Square, Inc. | Analyzing attributes of memory mappings to identify processes running on a device |
| US10715536B2 (en) | 2017-12-29 | 2020-07-14 | Square, Inc. | Logical validation of devices against fraud and tampering |
| US11005971B2 (en) * | 2018-08-02 | 2021-05-11 | Paul Swengler | System and method for user device authentication or identity validation without passwords or matching tokens |
| US11494762B1 (en) | 2018-09-26 | 2022-11-08 | Block, Inc. | Device driver for contactless payments |
| US11507958B1 (en) | 2018-09-26 | 2022-11-22 | Block, Inc. | Trust-based security for transaction payments |
| JP7084273B2 (ja) * | 2018-10-10 | 2022-06-14 | 株式会社Nttドコモ | 難読化判定装置 |
| EP4004773B1 (en) | 2019-07-29 | 2023-09-06 | Intertrust Technologies Corporation | Systems and methods for managing state |
| US11610004B2 (en) * | 2021-04-14 | 2023-03-21 | Bank Of America Corporation | System for implementing enhanced file encryption technique |
Family Cites Families (39)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH04107631A (ja) * | 1990-08-28 | 1992-04-09 | Seiko Epson Corp | 情報処理装置 |
| JPH06242957A (ja) * | 1993-02-16 | 1994-09-02 | Fujitsu Ltd | プログラム実行制御装置 |
| GB9422389D0 (en) | 1994-11-05 | 1995-01-04 | Int Computers Ltd | Authenticating access control for sensitive functions |
| JPH08263438A (ja) * | 1994-11-23 | 1996-10-11 | Xerox Corp | ディジタルワークの配給及び使用制御システム並びにディジタルワークへのアクセス制御方法 |
| EP1515216B1 (en) * | 1995-02-13 | 2014-09-24 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
| US6006328A (en) | 1995-07-14 | 1999-12-21 | Christopher N. Drake | Computer software authentication, protection, and security system |
| US5802368A (en) * | 1995-09-29 | 1998-09-01 | Informix Software, Inc. | Dynamic Library Task Switching |
| US5794232A (en) * | 1996-03-15 | 1998-08-11 | Novell, Inc. | Catalog services for distributed directories |
| US5845129A (en) * | 1996-03-22 | 1998-12-01 | Philips Electronics North America Corporation | Protection domains in a single address space |
| US6668325B1 (en) | 1997-06-09 | 2003-12-23 | Intertrust Technologies | Obfuscation techniques for enhancing software security |
| US20040107368A1 (en) * | 1998-06-04 | 2004-06-03 | Z4 Technologies, Inc. | Method for digital rights management including self activating/self authentication software |
| US20020002678A1 (en) * | 1998-08-14 | 2002-01-03 | Stanley T. Chow | Internet authentication technology |
| US20020062451A1 (en) | 1998-09-01 | 2002-05-23 | Scheidt Edward M. | System and method of providing communication security |
| US7140005B2 (en) | 1998-12-21 | 2006-11-21 | Intel Corporation | Method and apparatus to test an instruction sequence |
| DE59800949D1 (de) * | 1998-12-29 | 2001-08-02 | Swisscom Mobile Ag | Verfahren und system, um benutzern eines telekommunikationsnetzes objekte zur verfügung zu stellen |
| US6421768B1 (en) * | 1999-05-04 | 2002-07-16 | First Data Corporation | Method and system for authentication and single sign on using cryptographically assured cookies in a distributed computer environment |
| US7146505B1 (en) * | 1999-06-01 | 2006-12-05 | America Online, Inc. | Secure data exchange between date processing systems |
| US6731756B1 (en) * | 1999-06-21 | 2004-05-04 | Elisar Software Corporation, Inc. | Method for securing video images |
| AU6607000A (en) * | 1999-07-22 | 2001-02-13 | Open Security Solutions, Llc | A computer system and process for accessing an encrypted and self-decrypting digital information product |
| ATE365944T1 (de) | 1999-10-26 | 2007-07-15 | Iontas Ltd | Überwachung von rechnerbenutzung |
| US6898707B1 (en) * | 1999-11-30 | 2005-05-24 | Accela, Inc. | Integrating a digital signature service into a database |
| WO2001041081A2 (en) * | 1999-12-03 | 2001-06-07 | First Hop Oy | A method and a system for obtaining services using a cellular telecommunication system |
| US7539875B1 (en) * | 2000-06-27 | 2009-05-26 | Microsoft Corporation | Secure repository with layers of tamper resistance and system and method for providing same |
| MX237690B (es) * | 2000-07-25 | 2006-06-12 | Macrovision Corp | Sistema y metodo de verificacion de la autenticidad de imagenes ejecutables conectables dinamicamente. |
| US7181017B1 (en) * | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
| US7000100B2 (en) * | 2001-05-31 | 2006-02-14 | Hewlett-Packard Development Company, L.P. | Application-level software watchdog timer |
| NL1018494C2 (nl) | 2001-07-09 | 2003-01-10 | Koninkl Kpn Nv | Methode en systeem voor het door een dienstproces aan een client leveren van een dienst. |
| US7424615B1 (en) | 2001-07-30 | 2008-09-09 | Apple Inc. | Mutually authenticated secure key exchange (MASKE) |
| US20040054952A1 (en) * | 2002-09-13 | 2004-03-18 | Morrow James W. | Device verification system and method |
| US7320075B2 (en) | 2001-11-20 | 2008-01-15 | Safenet, Inc. | Software protection method utilizing hidden application code in a protection dynamic link library object |
| US7249262B2 (en) | 2002-05-06 | 2007-07-24 | Browserkey, Inc. | Method for restricting access to a web site by remote users |
| EP1508091A4 (en) * | 2002-05-28 | 2005-12-21 | Toshiba Corp | SYSTEM UPDATE PROTOCOL AND BOOTABLE CD CONTROL WITH EMBEDDED OPERATING SYSTEM |
| JP2004013608A (ja) * | 2002-06-07 | 2004-01-15 | Hitachi Ltd | プログラムの実行および転送の制御 |
| US7318235B2 (en) * | 2002-12-16 | 2008-01-08 | Intel Corporation | Attestation using both fixed token and portable token |
| US7607009B2 (en) * | 2003-02-10 | 2009-10-20 | International Business Machines Corporation | Method for distributing and authenticating public keys using time ordered exchanges |
| US7251732B2 (en) | 2003-06-18 | 2007-07-31 | Microsoft Corporation | Password synchronization in a sign-on management system |
| US7281271B1 (en) | 2003-09-25 | 2007-10-09 | Symantec Corporation | Exception handling validation system and method |
| US7478146B2 (en) * | 2003-11-03 | 2009-01-13 | Nokia Corporation | System, apparatus, and method for communicating capabilities of a mobile device |
| US7555568B2 (en) * | 2004-02-28 | 2009-06-30 | Huang Evan S | Method and apparatus for operating a host computer from a portable apparatus |
-
2005
- 2005-02-17 US US11/062,238 patent/US7526805B2/en not_active Expired - Fee Related
- 2005-02-17 US US11/061,411 patent/US7631360B2/en not_active Expired - Fee Related
- 2005-02-17 US US11/061,484 patent/US7640592B2/en not_active Expired - Fee Related
- 2005-02-17 US US11/061,792 patent/US7577997B2/en not_active Expired - Fee Related
- 2005-02-17 US US11/062,237 patent/US7552337B2/en not_active Expired - Fee Related
- 2005-02-17 US US11/061,791 patent/US7584509B2/en not_active Expired - Fee Related
- 2005-02-17 US US11/061,280 patent/US7891008B2/en not_active Expired - Fee Related
- 2005-02-17 US US11/061,790 patent/US7559091B2/en not_active Expired - Fee Related
- 2005-06-10 KR KR1020117021881A patent/KR101187521B1/ko not_active Expired - Fee Related
- 2005-06-10 WO PCT/US2005/020638 patent/WO2005125081A2/en not_active Ceased
- 2005-06-10 JP JP2007527785A patent/JP4729575B2/ja not_active Expired - Fee Related
- 2005-06-10 EP EP05773235.6A patent/EP1757008B1/en not_active Expired - Lifetime
- 2005-06-10 KR KR1020117021880A patent/KR101187554B1/ko not_active Expired - Fee Related
- 2005-06-10 KR KR1020117021882A patent/KR101159487B1/ko not_active Expired - Fee Related
Also Published As
| Publication number | Publication date |
|---|---|
| US7526805B2 (en) | 2009-04-28 |
| US20060005252A1 (en) | 2006-01-05 |
| US7631360B2 (en) | 2009-12-08 |
| EP1757008A2 (en) | 2007-02-28 |
| EP1757008B1 (en) | 2018-09-26 |
| US20050278553A1 (en) | 2005-12-15 |
| US7640592B2 (en) | 2009-12-29 |
| US20050278535A1 (en) | 2005-12-15 |
| WO2005125081A2 (en) | 2005-12-29 |
| US7559091B2 (en) | 2009-07-07 |
| KR20110119809A (ko) | 2011-11-02 |
| WO2005125081A3 (en) | 2006-03-23 |
| KR20110119808A (ko) | 2011-11-02 |
| US7552337B2 (en) | 2009-06-23 |
| US20060005250A1 (en) | 2006-01-05 |
| US20050278782A1 (en) | 2005-12-15 |
| US20060005251A1 (en) | 2006-01-05 |
| JP2008503014A (ja) | 2008-01-31 |
| KR101187521B1 (ko) | 2012-10-02 |
| US7891008B2 (en) | 2011-02-15 |
| US7577997B2 (en) | 2009-08-18 |
| KR101159487B1 (ko) | 2012-06-22 |
| KR101187554B1 (ko) | 2012-10-02 |
| US7584509B2 (en) | 2009-09-01 |
| US20050278791A1 (en) | 2005-12-15 |
| KR20110110866A (ko) | 2011-10-07 |
| US20060005249A1 (en) | 2006-01-05 |
| EP1757008A4 (en) | 2012-11-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP4729575B2 (ja) | ソフトウェアのセキュリティ確保 | |
| JP4702957B2 (ja) | 耐タンパ・トラステッド仮想マシン | |
| JP4796340B2 (ja) | 状態検証を使用した保護されたオペレーティングシステムブートのためのシステムおよび方法 | |
| US20030196096A1 (en) | Microcode patch authentication | |
| US20050289067A1 (en) | System and method for secure storage of data using a key | |
| US20050060549A1 (en) | Controlling access to content based on certificates and access predicates | |
| CN1969500B (zh) | 防护软件 | |
| US20090199017A1 (en) | One time settable tamper resistant software repository | |
| KR101203245B1 (ko) | 소프트웨어 보안 | |
| CN112685697A (zh) | 一种防止安卓应用被破解篡改的方法及终端 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20080610 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20080610 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20101221 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20110322 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20110412 |
|
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20110418 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 4729575 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20140422 Year of fee payment: 3 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| S111 | Request for change of ownership or part of ownership |
Free format text: JAPANESE INTERMEDIATE CODE: R313113 |
|
| R350 | Written notification of registration of transfer |
Free format text: JAPANESE INTERMEDIATE CODE: R350 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| LAPS | Cancellation because of no payment of annual fees |