IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0679077
(1996-07-12)
|
우선권정보 |
AU-0009866 (1996-05-15) |
발명자
/ 주소 |
- Drake Christopher Nathan,AUX
|
출원인 / 주소 |
- Drake
- Christopher N., GBX
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
431 인용 특허 :
10 |
초록
▼
A software-based computer security enhancing process and graphical software-authenticity method, and a method to apply aspects of the two are disclosed. The process provides protection against certain attacks on executable software by persons or other software used on the computer. Software using th
A software-based computer security enhancing process and graphical software-authenticity method, and a method to apply aspects of the two are disclosed. The process provides protection against certain attacks on executable software by persons or other software used on the computer. Software using this process is protected against eavesdropping (the monitoring of software, applications, the operating system, disks, keyboard, or other devices to record (steal) identification, authentication or sensitive data such as passwords, User-ID's, credit-card numbers and expiry dates, bank account and PIN numbers, smart-card data, biometric information (for example: the data comprising a retina or fingerprint scan), or encryption keys), local and remote tampering (altering software to remove, disable, or compromise security features of the altered software) examination (viewing the executable program, usually with the intent of devising security attacks upon it), tracing (observing the operating of an executable program step-by-step), and spoofing (substituting counterfeit software to emulate the interface of authentic software in order to subvert security) by rogues (eg: Trojan Horses, Hackers, Viruses, Terminate-and-stay-resident programs, co-resident software, multi-threaded operating system processes, Worms, Spoof programs, key-press password capturers, macro recorders, sniffers, and other software or subversions). Aspects include executable encryption, obfuscation, anti-tracing, anti-tamper & self-verification, runtime self-monitoring, and audiovisual authentication (math, encryption, and graphics based method permitting users to immediately recognise the authenticity and integrity of software). FIG. 5 in the specification depicts the many components and their interaction.
대표청구항
▼
[ I claim:] [2.] A method of altering an original executable program to form an altered executable program having increased security, said method comprising the steps of:(a) inserting obfuscating code into a first number of predetermined areas of said executable program; and,(b) encrypting portions
[ I claim:] [2.] A method of altering an original executable program to form an altered executable program having increased security, said method comprising the steps of:(a) inserting obfuscating code into a first number of predetermined areas of said executable program; and,(b) encrypting portions of said executable program for later decryption upon execution; such that, upon execution of said altered executable program, said execution includes the steps of;(c) decrypting the altered executable program; and(d) restoring said altered executable program to said original executable program.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.