William G. Home - Lawrenceville NJ, US Lesley R. Matheson - Discovery Bay CA, US Casey Sheehan - Hollister CA, US Robert E. Tarjan - Princeton NJ, US
Assignee:
InterTrust Technologies Corporation - Sunnyvale CA
International Classification:
H04L 9/00 H04L 9/32
US Classification:
713176, 713181, 713187
Abstract:
Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.
James J. Horning - Palo Alto CA, US W. Olin Sibert - Lexington MA, US Robert E. Tarjan - Princeton NJ, US Umesh Maheshwari - San Jose CA, US William G. Horne - Lawrenceville NJ, US Andrew K. Wright - Monroe Township NJ, US Lesley R. Matheson - Campbell CA, US Susan Owicki - Palo Alto CA, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
G06F 11/30
US Classification:
713187, 713189
Abstract:
Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
James J. Homing - Palo Alto CA, US W. Olin Sibert - Lexington MA, US Robert E. Tarjan - Princeton NJ, US Umesh Maheshwari - San Jose CA, US William G. Home - Lawrenceville NJ, US Andrew K. Wright - Monroe Township NJ, US Lesley R. Matheson - Campbell CA, US Susan Owicki - Palo Alto CA, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
G06F 9/45 G06F 21/00 G06F 11/30
US Classification:
717136, 717140, 726 23, 726 26, 713182, 713187
Abstract:
Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
James J. Horning - Palo Alto CA, US W. Olin Sibert - Lexington MA, US Robert E. Tarjan - Princeton NJ, US Umesh Maheshwari - San Jose CA, US William G. Horne - Lawrenceville NJ, US Andrew K. Wright - Monroe Township NJ, US Lesley R. Matheson - Campbell CA, US Susan Owicki - Palo Alto CA, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
G06F 9/44
US Classification:
717127, 717126, 713187, 713188, 713189, 713190
Abstract:
Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
William G. Home - Lawrenceville NJ, US Lesley R. Matheson - Discovery Bay CA, US Casey Sheehan - Hollister CA, US Robert E. Tarjan - Princeton NJ, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
H04L 9/32 H04L 9/00
US Classification:
713187, 713176, 726 26
Abstract:
Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.
William G. Horne - Lawrenceville NJ, US Lesley R. Matheson - Discovery Bay CA, US Casey Sheehan - Hollister CA, US Robert E. Tarjan - Princeton NJ, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
H04L 9/32
US Classification:
713187, 713176, 726 26
Abstract:
Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that they are compatible with copy-specific static watermarking and other tamper-resistance techniques.
James J. Horning - Palo Alto CA, US W. Olin Sibert - Lexington MA, US Robert E. Tarjan - Princeton NJ, US Umesh Maheshwari - San Jose CA, US William G. Home - Lawrenceville NJ, US Andrew K. Wright - Monroe Township NJ, US Lesley R. Matheson - Campbell CA, US Susan S. Owicki - Palo Alto CA, US
Assignee:
Intertrust Technologies Corp. - Sunnyvale CA
International Classification:
G06F 9/44
US Classification:
717127, 713190, 713194
Abstract:
Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
James Horning - Palo Alto CA, US W. Sibert - Lexington MA, US Robert Tarjan - Princeton NJ, US Urnesh Maheshwari - San Jose CA, US William Horne - Lawrenceville NJ, US Andrew Wright - Monroe Township NJ, US Lesley Matheson - Campbell CA, US Susan Owicki - Palo Alto CA, US
Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.