-
公开(公告)号:US5940619A
公开(公告)日:1999-08-17
申请号:US738150
申请日:1996-10-25
申请人: Martin Abadi , James J. Horning , Butler W. Lampson , Roy Levin , Jean-Jacques Levy , Yuan Yu
发明人: Martin Abadi , James J. Horning , Butler W. Lampson , Roy Levin , Jean-Jacques Levy , Yuan Yu
CPC分类号: G06F8/311 , G06F8/433 , G06F9/45508
摘要: In a computerized method, a computer program is analyzed while the program is interpreted. The program is expressed in a first memory as input values and functions. Some of the input values are complex values which can have a plurality of component values. Each function operates on combinations of the input values and the functions of the program. The program is interpreted in a processor connected to the first memory. The processor is also connected to a second memory to store result values produced during the interpretation. Selected input values, components of the complex values, and functions are named only if the selected values, components, and functions are necessary to produce a selected result value. For each function of the program, the function which is interpreted, the input values on which the function depends, and the result value produced by the function during interpretation, are recorded in the second memory to dynamically perform a precise dependency analysis of the program.
摘要翻译: 在计算机化方法中,在解释程序时分析计算机程序。 该程序在第一个存储器中表示为输入值和函数。 一些输入值是可以具有多个分量值的复数值。 每个功能按照程序的输入值和功能的组合进行操作。 该程序在连接到第一存储器的处理器中解释。 处理器还连接到第二存储器以存储在解释期间产生的结果值。 选定的输入值,复数值的组成部分和功能仅在选定的值,组件和功能需要产生选定的结果值时进行命名。 对于程序的每个功能,解释的功能,功能所依赖的输入值和解释期间由功能产生的结果值被记录在第二存储器中以动态地执行程序的精确的依赖性分析。
-
公开(公告)号:US20080301452A1
公开(公告)日:2008-12-04
申请号:US11927200
申请日:2007-10-29
申请人: William G. Horne , Umeshi Maheshwari , Robert E. Tarjan , James J. Horning , W. Olin Sibert , Lesley R. Matheson , Andrew K. Wright , Susan S. Owicki
发明人: William G. Horne , Umeshi Maheshwari , Robert E. Tarjan , James J. Horning , W. Olin Sibert , Lesley R. Matheson , Andrew K. Wright , Susan S. Owicki
IPC分类号: H04L9/00
CPC分类号: G06F21/16 , G06F11/3604 , G06F16/245 , G06F2221/0737 , G06N7/005 , H04K1/00 , H04K1/02 , H04L9/3226 , H04L9/3247 , H04L2209/608
摘要: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
摘要翻译: 公开了用于在软件和/或其他电子内容中嵌入信息的系统和方法,使得该信息对于未授权方难以检测,移除,插入,伪造和/或损坏。 嵌入式信息可以通过识别内容的来源来保护电子内容,从而使未经授权的副本或衍生品被可靠地追踪,从而促进内容所有者的有效法律追索。 还公开了用于保护,检测,去除和解码嵌入在电子内容中的信息的系统和方法,以及使用嵌入信息来保护软件或其他媒体免遭未经授权的分析,攻击和/或修改。
-
公开(公告)号:US07770016B2
公开(公告)日:2010-08-03
申请号:US11737428
申请日:2007-04-19
申请人: William G. Horne , Umesh Maheshwari , Robert E. Tarjan , James J. Horning , W. Olin Sibert , Lesley R. Matheson , Andrew K. Wright , Susan S. Owicki
发明人: William G. Horne , Umesh Maheshwari , Robert E. Tarjan , James J. Horning , W. Olin Sibert , Lesley R. Matheson , Andrew K. Wright , Susan S. Owicki
CPC分类号: G06F21/16 , G06F11/3604 , G06F17/30424 , G06F2221/0737 , G06N7/005 , H04K1/00 , H04K1/02 , H04L9/3226 , H04L9/3247 , H04L2209/608
摘要: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
摘要翻译: 公开了用于在软件和/或其他电子内容中嵌入信息的系统和方法,使得该信息对于未授权方难以检测,移除,插入,伪造和/或损坏。 嵌入式信息可以通过识别内容的来源来保护电子内容,从而使未经授权的副本或衍生品被可靠地追踪,从而促进内容所有者的有效法律追索。 还公开了用于保护,检测,去除和解码嵌入在电子内容中的信息的系统和方法,以及使用嵌入信息来保护软件或其他媒体免遭未经授权的分析,攻击和/或修改。
-
公开(公告)号:US08140850B2
公开(公告)日:2012-03-20
申请号:US12330482
申请日:2008-12-08
申请人: William G. Horne , Umesh Maheshwari , Robert E. Tarjan , James J. Horning , W. Olin Sibert , Lesley R. Matheson , Andrew K. Wright , Susan S. Owicki
发明人: William G. Horne , Umesh Maheshwari , Robert E. Tarjan , James J. Horning , W. Olin Sibert , Lesley R. Matheson , Andrew K. Wright , Susan S. Owicki
CPC分类号: G06F21/16 , G06F11/3604 , G06F17/30424 , G06F2221/0737 , G06N7/005 , H04K1/00 , H04K1/02 , H04L9/3226 , H04L9/3247 , H04L2209/608
摘要: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
-
公开(公告)号:US07823135B2
公开(公告)日:2010-10-26
申请号:US11102306
申请日:2005-04-07
申请人: James J. Horning , W. Olin Sibert , Robert E. Tarjan , Umesh Maheshwari , William G. Horne , Andrew K. Wright , Lesley R. Matheson , Susan Owicki
发明人: James J. Horning , W. Olin Sibert , Robert E. Tarjan , Umesh Maheshwari , William G. Horne , Andrew K. Wright , Lesley R. Matheson , Susan Owicki
IPC分类号: G06F9/44
CPC分类号: G06F21/14 , G06F21/125 , G06F2221/07
摘要: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
摘要翻译: 公开了用于保护计算机程序免于未经授权的分析和修改的系统和方法。 混淆变换可以应用于计算机程序的本地结构,控制图和/或数据结构,以使程序更难于理解和/或修改。 防篡改机制可以并入计算机程序中,以检测篡改程序操作的尝试。 一旦检测到篡改计算机程序的尝试,则计算机程序将其报告给外部代理,停止正常操作,和/或反转由所尝试的篡改所做的任何修改。 计算机程序也可以加水印以便于其所有者的识别。 混淆,防篡改和水印变换可以应用于计算机程序的源代码,目标代码或可执行映像。
-
公开(公告)号:US08335924B2
公开(公告)日:2012-12-18
申请号:US12826179
申请日:2010-06-29
申请人: William G. Home , Umesh Maheshwari , Robert E. Tarjan , James J. Horning , W. Olin Sibert , Lesley R. Matheson , Andrew K. Wright , Susan S. Owicki
发明人: William G. Home , Umesh Maheshwari , Robert E. Tarjan , James J. Horning , W. Olin Sibert , Lesley R. Matheson , Andrew K. Wright , Susan S. Owicki
CPC分类号: G06F21/16 , G06F11/3604 , G06F17/30424 , G06F2221/0737 , G06N7/005 , H04K1/00 , H04K1/02 , H04L9/3226 , H04L9/3247 , H04L2209/608
摘要: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
摘要翻译: 公开了用于在软件和/或其他电子内容中嵌入信息的系统和方法,使得该信息对于未授权方难以检测,移除,插入,伪造和/或损坏。 嵌入式信息可以通过识别内容的来源来保护电子内容,从而使未经授权的副本或衍生品被可靠地追踪,从而促进内容所有者的有效法律追索。 还公开了用于保护,检测,去除和解码嵌入在电子内容中的信息的系统和方法,以及使用嵌入信息来保护软件或其他媒体免遭未经授权的分析,攻击和/或修改。
-
公开(公告)号:US20100268958A1
公开(公告)日:2010-10-21
申请号:US12826179
申请日:2010-06-29
申请人: William G. Home , Umesh Maheshwan , Robert E. Tarjan , James J. Horning , W. Olin Sibert , Lesley R. Matheson , Andrew K. Wright , Susan S. Owicki
发明人: William G. Home , Umesh Maheshwan , Robert E. Tarjan , James J. Horning , W. Olin Sibert , Lesley R. Matheson , Andrew K. Wright , Susan S. Owicki
IPC分类号: H04L9/32
CPC分类号: G06F21/16 , G06F11/3604 , G06F17/30424 , G06F2221/0737 , G06N7/005 , H04K1/00 , H04K1/02 , H04L9/3226 , H04L9/3247 , H04L2209/608
摘要: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
摘要翻译: 公开了用于在软件和/或其他电子内容中嵌入信息的系统和方法,使得该信息对于未授权方难以检测,移除,插入,伪造和/或损坏。 嵌入式信息可以通过识别内容的来源来保护电子内容,从而使未经授权的副本或衍生品被可靠地追踪,从而促进内容所有者的有效法律追索。 还公开了用于保护,检测,去除和解码嵌入在电子内容中的信息的系统和方法,以及使用嵌入信息来保护软件或其他媒体免遭未经授权的分析,攻击和/或修改。
-
公开(公告)号:US07739511B2
公开(公告)日:2010-06-15
申请号:US11927220
申请日:2007-10-29
申请人: William G. Horne , Umesh Maheshwari , Robert E. Tarjan , James J. Horning , W. Olin Sibert , Lesley R. Matheson , Andrew K. Wright , Susan S. Owicki
发明人: William G. Horne , Umesh Maheshwari , Robert E. Tarjan , James J. Horning , W. Olin Sibert , Lesley R. Matheson , Andrew K. Wright , Susan S. Owicki
CPC分类号: G06F21/16 , G06F11/3604 , G06F17/30424 , G06F2221/0737 , G06N7/005 , H04K1/00 , H04K1/02 , H04L9/3226 , H04L9/3247 , H04L2209/608
摘要: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
-
公开(公告)号:US08387022B2
公开(公告)日:2013-02-26
申请号:US12854685
申请日:2010-08-11
申请人: James J. Horning , W. Olin Sibert , Robert E. Tarjan , Umesh Maheshwari , William G. Home , Andrew K. Wright , Lesley R. Matheson , Susan S. Owicki
发明人: James J. Horning , W. Olin Sibert , Robert E. Tarjan , Umesh Maheshwari , William G. Home , Andrew K. Wright , Lesley R. Matheson , Susan S. Owicki
IPC分类号: G06F9/44
CPC分类号: G06F21/14 , G06F21/125 , G06F2221/07
摘要: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
-
公开(公告)号:US20110035733A1
公开(公告)日:2011-02-10
申请号:US12854685
申请日:2010-08-11
申请人: James J. Horning , W. Olin Sibert , Robert E. Tarjan , Umesh Maheshwari , William G. Horne , Andrew K. Wright , Lesley R. Matheson , Susan S. Owicki
发明人: James J. Horning , W. Olin Sibert , Robert E. Tarjan , Umesh Maheshwari , William G. Horne , Andrew K. Wright , Lesley R. Matheson , Susan S. Owicki
CPC分类号: G06F21/14 , G06F21/125 , G06F2221/07
摘要: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
摘要翻译: 公开了用于保护计算机程序免于未经授权的分析和修改的系统和方法。 混淆变换可以应用于计算机程序的本地结构,控制图和/或数据结构,以使程序更难于理解和/或修改。 防篡改机制可以并入计算机程序中,以检测篡改程序操作的尝试。 一旦检测到篡改计算机程序的尝试,则计算机程序将其报告给外部代理,停止正常操作,和/或反转由所尝试的篡改所做的任何修改。 计算机程序也可以加水印以便于其所有者的识别。 混淆,防篡改和水印变换可以应用于计算机程序的源代码,目标代码或可执行映像。
-
-
-
-
-
-
-
-
-