Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020112206 - SECURE CALLING CONVENTION SYSTEM AND METHODS

Publication Number WO/2020/112206
Publication Date 04.06.2020
International Application No. PCT/US2019/050446
International Filing Date 10.09.2019
IPC
G06F 21/14 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
12Protecting executable software
14against software analysis or reverse engineering, e.g. by obfuscation
G06F 21/60 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
H04L 9/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
06the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
CPC
G06F 21/14
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
12Protecting executable software
14against software analysis or reverse engineering, e.g. by obfuscation
G06F 21/602
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
602Providing cryptographic facilities or services
G06F 2221/0748
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
2221Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
07Indexing scheme relating to G06F21/10, protecting distributed programs or content
0748Hiding
G06F 9/54
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
9Arrangements for program control, e.g. control units
06using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
46Multiprogramming arrangements
54Interprogram communication
H04L 9/0861
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
08Key distribution ; or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
Applicants
  • AVEVA SOFTWARE, LLC [US]/[US]
Inventors
  • STEELE, Ian Peter George
Agents
  • FELLOWS, Gerald L.
Priority Data
62/729,33410.09.2018US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) SECURE CALLING CONVENTION SYSTEM AND METHODS
(FR) SYSTÈME ET PROCÉDÉS DE CONVENTION D'APPEL SÉCURISÉE
Abstract
(EN)
The present disclosure is directed to systems and methods for protecting software application information that is passed between a caller of an API and the logic contained within the API by using a Secure Calling Convention (SCC). The SCC involves performing a cryptographic operation on the information such that the true nature of the information is obfuscated. The SCC prevents a hacker from using the information to reverse-engineer the software application to behave as desired.
(FR)
La présente invention concerne des systèmes et des procédés de protection d'informations d'application logicielle qui sont passées entre un appelant d'une API et la logique contenue dans l'API en utilisant une convention d'appel sécurisée (SCC). La SCC implique l'exécution d'une opération cryptographique sur les informations de sorte que la nature réelle des informations soit obscurcie. La SCC empêche qu'un pirate utilise les informations pour rétroconcevoir l'application logicielle pour qu'elle se comporte comme souhaité.
Latest bibliographic data on file with the International Bureau