-
公开(公告)号:US07739511B2
公开(公告)日:2010-06-15
申请号:US11927220
申请日:2007-10-29
申请人: William G. Horne , Umesh Maheshwari , Robert E. Tarjan , James J. Horning , W. Olin Sibert , Lesley R. Matheson , Andrew K. Wright , Susan S. Owicki
发明人: William G. Horne , Umesh Maheshwari , Robert E. Tarjan , James J. Horning , W. Olin Sibert , Lesley R. Matheson , Andrew K. Wright , Susan S. Owicki
CPC分类号: G06F21/16 , G06F11/3604 , G06F17/30424 , G06F2221/0737 , G06N7/005 , H04K1/00 , H04K1/02 , H04L9/3226 , H04L9/3247 , H04L2209/608
摘要: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
-
公开(公告)号:US07779394B2
公开(公告)日:2010-08-17
申请号:US11128097
申请日:2005-05-11
申请人: James J. Homing , W. Olin Sibert , Robert E. Tarjan , Umesh Maheshwari , William G. Home , Andrew K. Wright , Lesley R. Matheson , Susan Owicki
发明人: James J. Homing , W. Olin Sibert , Robert E. Tarjan , Umesh Maheshwari , William G. Home , Andrew K. Wright , Lesley R. Matheson , Susan Owicki
CPC分类号: G06F21/14 , G06F21/125 , G06F2221/07
摘要: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
-
公开(公告)号:US08387022B2
公开(公告)日:2013-02-26
申请号:US12854685
申请日:2010-08-11
申请人: James J. Horning , W. Olin Sibert , Robert E. Tarjan , Umesh Maheshwari , William G. Home , Andrew K. Wright , Lesley R. Matheson , Susan S. Owicki
发明人: James J. Horning , W. Olin Sibert , Robert E. Tarjan , Umesh Maheshwari , William G. Home , Andrew K. Wright , Lesley R. Matheson , Susan S. Owicki
IPC分类号: G06F9/44
CPC分类号: G06F21/14 , G06F21/125 , G06F2221/07
摘要: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
-
公开(公告)号:US08335924B2
公开(公告)日:2012-12-18
申请号:US12826179
申请日:2010-06-29
申请人: William G. Home , Umesh Maheshwari , Robert E. Tarjan , James J. Horning , W. Olin Sibert , Lesley R. Matheson , Andrew K. Wright , Susan S. Owicki
发明人: William G. Home , Umesh Maheshwari , Robert E. Tarjan , James J. Horning , W. Olin Sibert , Lesley R. Matheson , Andrew K. Wright , Susan S. Owicki
CPC分类号: G06F21/16 , G06F11/3604 , G06F17/30424 , G06F2221/0737 , G06N7/005 , H04K1/00 , H04K1/02 , H04L9/3226 , H04L9/3247 , H04L2209/608
摘要: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
摘要翻译: 公开了用于在软件和/或其他电子内容中嵌入信息的系统和方法,使得该信息对于未授权方难以检测,移除,插入,伪造和/或损坏。 嵌入式信息可以通过识别内容的来源来保护电子内容,从而使未经授权的副本或衍生品被可靠地追踪,从而促进内容所有者的有效法律追索。 还公开了用于保护,检测,去除和解码嵌入在电子内容中的信息的系统和方法,以及使用嵌入信息来保护软件或其他媒体免遭未经授权的分析,攻击和/或修改。
-
公开(公告)号:US20120266000A1
公开(公告)日:2012-10-18
申请号:US13531322
申请日:2012-06-22
IPC分类号: G06F12/14
CPC分类号: H04L63/0428 , G06F21/6218 , G06F21/80 , G06F21/805 , G06F2211/007 , H04L9/0643
摘要: Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of untrusted storage. Data are encrypted and validated to prevent unauthorized modification or access. Encryption and hashing are integrated with a low-level data model in which data and meta-data are secured uniformly. Synergies between data validation and log-structured storage are exploited.
摘要翻译: 公开了用于提供可靠的数据库系统的系统和方法,该数据库系统利用少量的可信存储来保护更大量的不可信存储。 数据被加密和验证,以防止未经授权的修改或访问。 加密和散列与低级数据模型集成在一起,数据和元数据被均匀地保护。 利用数据验证和日志结构存储之间的协同作用。
-
公开(公告)号:US07752455B2
公开(公告)日:2010-07-06
申请号:US11340326
申请日:2006-01-25
IPC分类号: H04L9/32
CPC分类号: G06F21/6218 , G06F17/30943
摘要: Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of untrusted storage. Data are encrypted and validated to prevent unauthorized modification or access. Encryption and hashing are integrated with a low-level data model in which data and meta-data are secured uniformly. Synergies between data validation and log-structured storage are exploited.
-
公开(公告)号:US20100228999A1
公开(公告)日:2010-09-09
申请号:US12785343
申请日:2010-05-21
IPC分类号: G06F12/14
CPC分类号: H04L63/0428 , G06F21/6218 , G06F21/80 , G06F21/805 , G06F2211/007 , H04L9/0643
摘要: Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of untrusted storage. Data are encrypted and validated to prevent unauthorized modification or access. Encryption and hashing are integrated with a low-level data model in which data and meta-data are secured uniformly. Synergies between data validation and log-structured storage are exploited.
摘要翻译: 公开了用于提供可靠的数据库系统的系统和方法,该数据库系统利用少量的可信存储来保护更大量的不可信存储。 数据被加密和验证,以防止未经授权的修改或访问。 加密和散列与低级数据模型集成在一起,其中数据和元数据被均匀地保护。 利用数据验证和日志结构存储之间的协同作用。
-
公开(公告)号:US07681240B2
公开(公告)日:2010-03-16
申请号:US11338187
申请日:2006-01-23
IPC分类号: H04L9/32
CPC分类号: G06F21/6218 , G06F17/30943
摘要: Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of untrusted storage. Data are encrypted and validated to prevent unauthorized modification or access. Encryption and hashing are integrated with a low-level data model in which data and meta-data are secured uniformly. Synergies between data validation and log-structured storage are exploited.
摘要翻译: 公开了用于提供可靠的数据库系统的系统和方法,该数据库系统利用少量的可信存储来保护更大量的不可信存储。 数据被加密和验证,以防止未经授权的修改或访问。 加密和散列与低级数据模型集成在一起,其中数据和元数据被均匀地保护。 利用数据验证和日志结构存储之间的协同作用。
-
公开(公告)号:US08464071B2
公开(公告)日:2013-06-11
申请号:US13531322
申请日:2012-06-22
IPC分类号: H04L9/32
CPC分类号: H04L63/0428 , G06F21/6218 , G06F21/80 , G06F21/805 , G06F2211/007 , H04L9/0643
摘要: Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of untrusted storage. Data are encrypted and validated to prevent unauthorized modification or access. Encryption and hashing are integrated with a low-level data model in which data and meta-data are secured uniformly. Synergies between data validation and log-structured storage are exploited.
摘要翻译: 公开了用于提供可靠的数据库系统的系统和方法,该数据库系统利用少量的可信存储来保护更大量的不可信存储。 数据被加密和验证,以防止未经授权的修改或访问。 加密和散列与低级数据模型集成在一起,其中数据和元数据被均匀地保护。 利用数据验证和日志结构存储之间的协同作用。
-
公开(公告)号:US08209544B2
公开(公告)日:2012-06-26
申请号:US12785343
申请日:2010-05-21
IPC分类号: H04L9/32
CPC分类号: H04L63/0428 , G06F21/6218 , G06F21/80 , G06F21/805 , G06F2211/007 , H04L9/0643
摘要: Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of untrusted storage. Data are encrypted and validated to prevent unauthorized modification or access. Encryption and hashing are integrated with a low-level data model in which data and meta-data are secured uniformly. Synergies between data validation and log-structured storage are exploited.
摘要翻译: 公开了用于提供可靠的数据库系统的系统和方法,该数据库系统利用少量的可信存储来保护更大量的不可信存储。 数据被加密和验证,以防止未经授权的修改或访问。 加密和散列与低级数据模型集成在一起,其中数据和元数据被均匀地保护。 利用数据验证和日志结构存储之间的协同作用。
-
-
-
-
-
-
-
-
-