William G. Home - Lawrenceville NJ, US Lesley R. Matheson - Discovery Bay CA, US Casey Sheehan - Hollister CA, US Robert E. Tarjan - Princeton NJ, US
Assignee:
InterTrust Technologies Corporation - Sunnyvale CA
International Classification:
H04L 9/00 H04L 9/32
US Classification:
713176, 713181, 713187
Abstract:
Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.
Systems And Methods For Watermarking Software And Other Media
William G. Horne - Lawrenceville NJ, US Umesh Maheshwari - San Jose CA, US Robert E. Tarjan - Princeton NJ, US James J. Horning - Palo Alto CA, US W. Olin Sibert - Lexington MA, US Lesley R. Matheson - Campbell CA, US Andrew K. Wright - Monroe Township NJ, US Susan S. Owicki - Palo Alto CA, US
Assignee:
Intertrust Technologies Corp. - Sunnyvale CA
International Classification:
H04L 9/32 B42D 15/00 H04N 1/40
US Classification:
713176, 283113, 358 328
Abstract:
Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
Systems And Methods For Watermarking Software And Other Media
William G. Horne - Lawrenceville NJ, US Umesh Maheshwari - San Jose CA, US Robert E. Tarjan - Princeton NJ, US James J. Horning - Palo Alto CA, US W. Olin Sibert - Lexington MA, US Lesley R. Matheson - Campbell CA, US Andrew K. Wright - Monroe Township NJ, US Susan S. Owicki - Palo Alto CA, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
H04L 9/32 G06F 11/30 G06F 12/14
US Classification:
713176, 713189
Abstract:
Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
James J. Horning - Palo Alto CA, US W. Olin Sibert - Lexington MA, US Robert E. Tarjan - Princeton NJ, US Umesh Maheshwari - San Jose CA, US William G. Horne - Lawrenceville NJ, US Andrew K. Wright - Monroe Township NJ, US Lesley R. Matheson - Campbell CA, US Susan Owicki - Palo Alto CA, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
G06F 11/30
US Classification:
713187, 713189
Abstract:
Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
James J. Homing - Palo Alto CA, US W. Olin Sibert - Lexington MA, US Robert E. Tarjan - Princeton NJ, US Umesh Maheshwari - San Jose CA, US William G. Home - Lawrenceville NJ, US Andrew K. Wright - Monroe Township NJ, US Lesley R. Matheson - Campbell CA, US Susan Owicki - Palo Alto CA, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
G06F 9/45 G06F 21/00 G06F 11/30
US Classification:
717136, 717140, 726 23, 726 26, 713182, 713187
Abstract:
Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
James J. Horning - Palo Alto CA, US W. Olin Sibert - Lexington MA, US Robert E. Tarjan - Princeton NJ, US Umesh Maheshwari - San Jose CA, US William G. Horne - Lawrenceville NJ, US Andrew K. Wright - Monroe Township NJ, US Lesley R. Matheson - Campbell CA, US Susan Owicki - Palo Alto CA, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
G06F 9/44
US Classification:
717127, 717126, 713187, 713188, 713189, 713190
Abstract:
Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
William G. Home - Lawrenceville NJ, US Lesley R. Matheson - Discovery Bay CA, US Casey Sheehan - Hollister CA, US Robert E. Tarjan - Princeton NJ, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
H04L 9/32 H04L 9/00
US Classification:
713187, 713176, 726 26
Abstract:
Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.
Systems And Methods For Watermarking Software And Other Media
William G. Horne - Lawrenceville NJ, US Umesh Maheshwari - San Jose CA, US Robert E. Tarjan - Princeton NJ, US James J. Horning - Palo Alto CA, US W. Olin Sibert - Lexington MA, US Lesley R. Matheson - Campbell CA, US Andrew K. Wright - Monroe Township NJ, US Susan S. Owicki - Palo Alto CA, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
H04L 9/32 G06F 9/44 H04N 1/40 B42D 15/00
US Classification:
713176, 717114, 358 328, 283113
Abstract:
Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
Name / Title
Company / Classification
Phones & Addresses
Lesley Matheson Managing
37 South 4th Street Partners, LLC Own and Hold Real Estate Investments · Business Consulting Services · Business Services