Traitement en cours

Veuillez attendre...

Paramétrages

Paramétrages

Aller à Demande

1. CA2405742 - LOGICIEL INVIOLABLE - CODAGE DE DONNEES DE MASSE

Office Canada
Numéro de la demande 2405742
Date de la demande
Numéro de publication 2405742
Date de publication 25.10.2001
Type de publication A1
CPC
G06F 21/14
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
12Protecting executable software
14against software analysis or reverse engineering, e.g. by obfuscation
G06F 12/1408
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
12Accessing, addressing or allocating within memory systems or architectures
14Protection against unauthorised use of memory ; or access to memory
1408by using cryptography
G06F 21/62
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
Déposants CLOAKWARE CORPORATION
Inventeurs JOHNSON, HAROLD J.
CHOW, STANLEY T.
GU, YUAN
Données relatives à la priorité 2,305,078 12.04.2000 CA
Titre
(EN) TAMPER RESISTANT SOFTWARE - MASS DATA ENCODING
(FR) LOGICIEL INVIOLABLE - CODAGE DE DONNEES DE MASSE
Abrégé
(EN)
Mass data (the contents of arrays, large data structures, linked data structures and similar data structures stored in memory) are common targets for attack. The invention presents a method and system of protecting mass data by mapping virtual addresses onto randomly or pseudo-randomly selected actual addresses. This mapping distributes data values throughout the memory so an attacker cannot locate the data he is seeking, or identify patterns which might allow him to obtain information about his target (such as how the software operates, encryption keys, biometric data or passwords stored therein, or algorithms it uses). Additional layers of protection are described, as well as efficient techniques for generating the necessary transforms to perform the invention.

Également publié en tant que