SYSTEM AND METHODS FOR CPU COPY PROTECTION OF A COMPUTING DEVICE
    1.
    发明申请
    SYSTEM AND METHODS FOR CPU COPY PROTECTION OF A COMPUTING DEVICE 有权
    用于CPU复制保护计算设备的系统和方法

    公开(公告)号:US20150149732A1

    公开(公告)日:2015-05-28

    申请号:US14088405

    申请日:2013-11-24

    IPC分类号: G06F12/14 G06F12/08

    摘要: The present disclosure relates to techniques for system and methods for software-based management of protected data-blocks insertion into the memory cache mechanism of a computerized device. In particular the disclosure relates to preventing protected data blocks from being altered and evicted from the CPU cache coupled with buffered software execution. The technique is based upon identifying at least one conflicting data-block having a memory mapping indication to a designated memory cache-line and preventing the conflicting data-block from being cached. Functional characteristics of the software product of a vendor, such as gaming or video, may be partially encrypted to allow for protected and functional operability and avoid hacking and malicious usage of non-licensed user.

    摘要翻译: 本公开涉及用于基于软件的管理被保护的数据块插入到计算机化设备的存储器缓存机构中的系统和方法的技术。 具体地,本公开涉及防止受保护的数据块被从缓存的软件执行与CPU缓存改变和驱逐。 该技术基于将至少一个具有存储器映射指示的冲突数据块识别到指定的存储器高速缓存行并且防止冲突的数据块被高速缓存。 供应商的软件产品(例如游戏或视频)的功能特征可以被部分地加密,以允许受保护和功能可操作性,并且避免非许可用户的黑客和恶意使用。

    SYSTEM AND METHODS FOR REMOTE SOFTWARE AUTHENTICATION OF A COMPUTING DEVICE
    2.
    发明申请
    SYSTEM AND METHODS FOR REMOTE SOFTWARE AUTHENTICATION OF A COMPUTING DEVICE 有权
    用于远程软件认证的计算机系统和方法

    公开(公告)号:US20150150084A1

    公开(公告)日:2015-05-28

    申请号:US14088406

    申请日:2013-11-24

    IPC分类号: G06F21/44

    摘要: The current disclosure relates to techniques for system and methods for software-based management of remote software authentication of at least one entity machine, addressing various vulnerabilities of software authentication based upon the genuinity based scheme. The disclosure is using challenge execution on at least one suspect machine, providing a technique for CPU event monitoring of a combined count of at least two events monitored on the entity machine during execution of the authentication challenge. The authentication challenge allows further detection functionality of virtual machine or a hypervisor installed. The techniques measures execution time of authentication challenge, comparing the received challenge result with the expected challenge result and accordingly rejects or allows the entity machine through the authentication process.

    摘要翻译: 本公开涉及用于至少一个实体机器的远程软件认证的基于软件的管理的系统和方法的技术,基于基于天赋的方案来解决软件认证的各种脆弱性。 本公开是在至少一个可疑机器上使用挑战执行,在执行认证挑战期间提供用于在事件机器上监视的至少两个事件的组合计数的CPU事件监视的技术。 验证挑战允许安装虚拟机或管理程序的进一步检测功能。 这些技术测量认证挑战的执行时间,将接收的质询结果与预期挑战结果进行比较,从而通过认证过程拒绝或允许实体机器。