+

WO2002001333A2 - Organe d'archivage sur personnalise, et systeme et procede de mise en oeuvre dudit organe d'archivage - Google Patents

Organe d'archivage sur personnalise, et systeme et procede de mise en oeuvre dudit organe d'archivage Download PDF

Info

Publication number
WO2002001333A2
WO2002001333A2 PCT/US2001/040898 US0140898W WO0201333A2 WO 2002001333 A2 WO2002001333 A2 WO 2002001333A2 US 0140898 W US0140898 W US 0140898W WO 0201333 A2 WO0201333 A2 WO 0201333A2
Authority
WO
WIPO (PCT)
Prior art keywords
code
data
computer
computing device
black box
Prior art date
Application number
PCT/US2001/040898
Other languages
English (en)
Other versions
WO2002001333A3 (fr
Inventor
John L. Manferdelli
Michael David Marr
Vinay Krishnaswamy
Mariusz H. Jakubowski
Original Assignee
Microsoft Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corporation filed Critical Microsoft Corporation
Priority to AU2001267055A priority Critical patent/AU2001267055A1/en
Publication of WO2002001333A2 publication Critical patent/WO2002001333A2/fr
Publication of WO2002001333A3 publication Critical patent/WO2002001333A3/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Definitions

  • FIG. 1 is a block diagram showing an exemplary computing environment in which aspects of the invention may be implemented
  • FIG. 3 is a block diagram showing a relationship between a computer that requests a secure repository and a computer that generates a secure repository;
  • FIG. 4 is a block diagram of an exemplary secure repository generator according to aspects of the invention;
  • FIG. 5 is a block diagram of a cryptographic code generator according to aspects of the invention;
  • Code generator 440 includes a healing code generator 420.
  • Healing code generator 420 creates code that uses "error-correction" principles to detect “patches” (i.e., additions or modifications to the code of black box 240 that were not part of that code as originally constituted).
  • Healing code generator 420 may also create code that can be used to "repair” those patches by dynamically “re-modifying" the code of black box 240 to restore it to its original configuration (or to some intermediate state that exists (or should exist) during the execution of the black box 240 program).
  • step 709 postprocessing of the executable code produced at step 708 is performed. Specifically, sections of code delimited for encryption are encrypted, and sections of code marked for integrity checks are hashed.
  • the keys used for encrypted code may be selected at step 709. The keys may be based in part on hardware ID 224 and/or random number 432. The particular method of performing an integrity check may be based in part on hardware ID 432.
  • black box generator 37a proceeds to step 603 shown in FIG. 6.
  • the steps of FIG. 7 are depicted as taking place in a certain order, certain of the steps shown may, take place in a different order.
  • the code generated at step 703 through 705 could be generated in sequences other than that depicted in FIG. 7.
  • the reorganization of code at step 707 could take place either before or after the compilation performed at step 708.
  • Other modification may be made to the order of steps without departing from the spirit and scope of the invention.
  • Example Architecture Incorporating Black Box 240 and Decoupling Interface 220 As noted above in connection with FIG. 2, black box 240 and application program 244 may communicate either directly or through a decoupling interface 220.
  • FIG. 1 black box 240 and application program 244 may communicate either directly or through a decoupling interface 220.
  • Decoupling interface 220 may, for example, be or comprise an application programmer interface (API) having an "initialization” call and a "bind to license” call. (Licenses are explained in further detail below; briefly, a license permits the use of content protected by black box 240.)
  • API application programmer interface
  • the API may be provided in the form of a dynamic-link library (.DLL) file that is loaded with application program 244 and executes in the process (i.e., in the address space) of application program 244.
  • .DLL dynamic-link library
  • the process may include using an operating system call to check a software image (e.g. , of the decoupling interface 220 DLL), checking the certificate of application program 244, and isolating the code and data space of application program 244.
  • a software image e.g. , of the decoupling interface 220 DLL
  • checking the certificate of application program 244 e.g., the certificate of application program 244
  • an open platform such as where application program 244 runs on a typical personal computer using one of the MICROSOFT WINDOWS 95/98/NT/2000 operating systems
  • the process of authenticating decoupling interface 220 and preparing a secure environment may include the following actions.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention concerne un organe d'archivage sûr, qui est personnalisé pour une configuration matérielle, ainsi qu'un procédé et un système de mise en oeuvre dudit organe d'archivage. L'organe d'archivage comprend une clé de chiffrement cachée et un code qui utilise la clé sans demander l'accès à une copie de la clé. Le code qui met en oeuvre l'organe d'archivage est produit selon un procédé au moins partiellement basé sur un identificateur du matériel associé à la configuration matérielle dans laquelle l'organe d'archivage doit être installé; le procédé peut aussi être basé sur un nombre aléatoire. Les fonctions cryptographiques mises en oeuvre par l'organe d'archivage comprennent le déchiffrement des données chiffrées et la validation des données accompagnées d'une signature cryptographique. L'organe d'archivage peut être associé à un programme d'application qui exploite les services cryptographiques offerts par l'organe d'archivage au moyen d'une interface de découplage présentant une interface commune de communication et d'authentification pour divers types d'organes d'archivage sûrs. L'interface de découplage peut se présenter sous la forme d'une interface de programme d'application (API) simple utilisable avec plusieurs bibliothèques possédant des liens dynamiques.
PCT/US2001/040898 2000-06-27 2001-06-08 Organe d'archivage sur personnalise, et systeme et procede de mise en oeuvre dudit organe d'archivage WO2002001333A2 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2001267055A AU2001267055A1 (en) 2000-06-27 2001-06-08 System and method for providing an individualized secure repository

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US60454300A 2000-06-27 2000-06-27
US09/604,543 2000-06-27

Publications (2)

Publication Number Publication Date
WO2002001333A2 true WO2002001333A2 (fr) 2002-01-03
WO2002001333A3 WO2002001333A3 (fr) 2003-09-25

Family

ID=24420015

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/040898 WO2002001333A2 (fr) 2000-06-27 2001-06-08 Organe d'archivage sur personnalise, et systeme et procede de mise en oeuvre dudit organe d'archivage

Country Status (2)

Country Link
AU (1) AU2001267055A1 (fr)
WO (1) WO2002001333A2 (fr)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1362295A2 (fr) * 2001-02-20 2003-11-19 Sony Computer Entertainment America Inc. Appareil et procede pour utiliser un systeme de points de motivation base sur l'identification de disque et d'utilisateur
EP1376307A3 (fr) * 2002-06-28 2005-02-09 Microsoft Corporation Modèle de confiance pour un système DRM
WO2005106621A1 (fr) * 2004-04-19 2005-11-10 Syphermedia International, Inc. Prevention du clonage de logiciel de grande valeur au moyen d'une fonctionnalite materielle et logicielle integree
EP1810171A2 (fr) * 2004-09-17 2007-07-25 Uecker & Associates, Inc. Procede et systeme de distribution electronique de logiciels au moyen d'un procede de gestion des droits numeriques base sur l'identification materielle
EP2098938A1 (fr) * 2002-03-25 2009-09-09 NEC Corporation Un programme source dissimulé, procédé et dispositif de conversion d'un programme source, et le programme de conversion de source
US7970138B2 (en) 2006-05-26 2011-06-28 Syphermedia International Method and apparatus for supporting broadcast efficiency and security enhancements
US8243925B2 (en) 2004-10-18 2012-08-14 Syphermedia International, Inc. Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
US8761393B2 (en) 2006-10-13 2014-06-24 Syphermedia International, Inc. Method and apparatus for providing secure internet protocol media services
US9277259B2 (en) 2006-10-13 2016-03-01 Syphermedia International, Inc. Method and apparatus for providing secure internet protocol media services
US9613147B2 (en) 2012-12-03 2017-04-04 Sony Interactive Entertainment Inc. Collection of telemetry data by a telemetry library within a client device
US10061902B2 (en) 2001-02-20 2018-08-28 Sony Interactive Entertainment America Llc Method, medium, and system for managing transfer of content
CN109211239A (zh) * 2018-08-30 2019-01-15 中体彩科技发展有限公司 一种关联产品定位系统及其使用方法
EP3316160A4 (fr) * 2015-06-29 2019-02-27 ZTE Corporation Procédé et appareil d'authentification pour logiciel renforcé
US10325266B2 (en) 2009-05-28 2019-06-18 Sony Interactive Entertainment America Llc Rewarding classes of purchasers
US10477151B2 (en) 2004-10-18 2019-11-12 Inside Secure Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
WO2023110025A1 (fr) * 2021-12-13 2023-06-22 Continental Automotive Technologies GmbH Procédé et circuit de processeur pour sécuriser un code contre une manipulation par un logiciel d'application, unité de commande de véhicule à moteur et véhicule à moteur doté d'une unité de commande de ce type
CN117611059A (zh) * 2024-01-03 2024-02-27 北京亿家老小科技有限公司 一种存储结构动态调整的库存管理方法及系统

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8458754B2 (en) 2001-01-22 2013-06-04 Sony Computer Entertainment Inc. Method and system for providing instant start multimedia content
US8996409B2 (en) 2007-06-06 2015-03-31 Sony Computer Entertainment Inc. Management of online trading services using mediated communications
US9483405B2 (en) 2007-09-20 2016-11-01 Sony Interactive Entertainment Inc. Simplified run-time program translation for emulating complex processor pipelines
US20110016182A1 (en) 2009-07-20 2011-01-20 Adam Harris Managing Gifts of Digital Media
US8504487B2 (en) 2010-09-21 2013-08-06 Sony Computer Entertainment America Llc Evolution of a user interface based on learned idiosyncrasies and collected data of a user

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5359659A (en) * 1992-06-19 1994-10-25 Doren Rosenthal Method for securing software against corruption by computer viruses
WO1999001815A1 (fr) * 1997-06-09 1999-01-14 Intertrust, Incorporated Techniques d'obscurcissement pour augmenter la securite de logiciels
WO1999026123A1 (fr) * 1997-11-18 1999-05-27 Christopher Benjamin Wakely Perfectionnements apportes a des systemes de protection de logiciel
US5991399A (en) * 1997-12-18 1999-11-23 Intel Corporation Method for securely distributing a conditional use private key to a trusted entity on a remote system
US6049612A (en) * 1997-03-10 2000-04-11 The Pacid Group File encryption method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5359659A (en) * 1992-06-19 1994-10-25 Doren Rosenthal Method for securing software against corruption by computer viruses
US6049612A (en) * 1997-03-10 2000-04-11 The Pacid Group File encryption method and system
WO1999001815A1 (fr) * 1997-06-09 1999-01-14 Intertrust, Incorporated Techniques d'obscurcissement pour augmenter la securite de logiciels
WO1999026123A1 (fr) * 1997-11-18 1999-05-27 Christopher Benjamin Wakely Perfectionnements apportes a des systemes de protection de logiciel
US5991399A (en) * 1997-12-18 1999-11-23 Intel Corporation Method for securely distributing a conditional use private key to a trusted entity on a remote system

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1362295A2 (fr) * 2001-02-20 2003-11-19 Sony Computer Entertainment America Inc. Appareil et procede pour utiliser un systeme de points de motivation base sur l'identification de disque et d'utilisateur
US10061902B2 (en) 2001-02-20 2018-08-28 Sony Interactive Entertainment America Llc Method, medium, and system for managing transfer of content
EP1362295A4 (fr) * 2001-02-20 2007-01-17 Sony Comp Entertainment Us Appareil et procede pour utiliser un systeme de points de motivation base sur l'identification de disque et d'utilisateur
US7228342B2 (en) 2001-02-20 2007-06-05 Sony Computer Entertainment America Inc. System for utilizing an incentive point system based on disc and user identification
US7539737B2 (en) 2001-02-20 2009-05-26 Sony Computer Entertainment America Inc. Utilizing an incentive point system based on disc and user identification
EP2098938A1 (fr) * 2002-03-25 2009-09-09 NEC Corporation Un programme source dissimulé, procédé et dispositif de conversion d'un programme source, et le programme de conversion de source
US7523310B2 (en) 2002-06-28 2009-04-21 Microsoft Corporation Domain-based trust models for rights management of content
EP1376307A3 (fr) * 2002-06-28 2005-02-09 Microsoft Corporation Modèle de confiance pour un système DRM
WO2005106621A1 (fr) * 2004-04-19 2005-11-10 Syphermedia International, Inc. Prevention du clonage de logiciel de grande valeur au moyen d'une fonctionnalite materielle et logicielle integree
EP1810171A4 (fr) * 2004-09-17 2010-06-02 Inventec Appliances Corp Procede et systeme de distribution electronique de logiciels au moyen d'un procede de gestion des droits numeriques base sur l'identification materielle
EP1810171A2 (fr) * 2004-09-17 2007-07-25 Uecker & Associates, Inc. Procede et systeme de distribution electronique de logiciels au moyen d'un procede de gestion des droits numeriques base sur l'identification materielle
US10477151B2 (en) 2004-10-18 2019-11-12 Inside Secure Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
US9712786B2 (en) 2004-10-18 2017-07-18 Syphermedia International, Inc. Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
US9014375B2 (en) 2004-10-18 2015-04-21 Syphermedia International, Inc. Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
US8243925B2 (en) 2004-10-18 2012-08-14 Syphermedia International, Inc. Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
US8879729B2 (en) 2006-05-26 2014-11-04 Syphermedia International Method and apparatus for supporting broadcast efficiency and security enhancements
US7970138B2 (en) 2006-05-26 2011-06-28 Syphermedia International Method and apparatus for supporting broadcast efficiency and security enhancements
US9277259B2 (en) 2006-10-13 2016-03-01 Syphermedia International, Inc. Method and apparatus for providing secure internet protocol media services
US8761393B2 (en) 2006-10-13 2014-06-24 Syphermedia International, Inc. Method and apparatus for providing secure internet protocol media services
US10325266B2 (en) 2009-05-28 2019-06-18 Sony Interactive Entertainment America Llc Rewarding classes of purchasers
US9613147B2 (en) 2012-12-03 2017-04-04 Sony Interactive Entertainment Inc. Collection of telemetry data by a telemetry library within a client device
EP3316160A4 (fr) * 2015-06-29 2019-02-27 ZTE Corporation Procédé et appareil d'authentification pour logiciel renforcé
CN109211239A (zh) * 2018-08-30 2019-01-15 中体彩科技发展有限公司 一种关联产品定位系统及其使用方法
CN109211239B (zh) * 2018-08-30 2022-09-16 中体彩科技发展有限公司 一种关联产品定位系统
WO2023110025A1 (fr) * 2021-12-13 2023-06-22 Continental Automotive Technologies GmbH Procédé et circuit de processeur pour sécuriser un code contre une manipulation par un logiciel d'application, unité de commande de véhicule à moteur et véhicule à moteur doté d'une unité de commande de ce type
CN117611059A (zh) * 2024-01-03 2024-02-27 北京亿家老小科技有限公司 一种存储结构动态调整的库存管理方法及系统
CN117611059B (zh) * 2024-01-03 2024-05-03 北京亿家老小科技有限公司 一种存储结构动态调整的库存管理方法及系统

Also Published As

Publication number Publication date
WO2002001333A3 (fr) 2003-09-25
AU2001267055A1 (en) 2002-01-08

Similar Documents

Publication Publication Date Title
US7051200B1 (en) System and method for interfacing a software process to secure repositories
US8417968B2 (en) Secure repository with layers of tamper resistance and system and method for providing same
WO2002001333A2 (fr) Organe d'archivage sur personnalise, et systeme et procede de mise en oeuvre dudit organe d'archivage
US7254586B2 (en) Secure and opaque type library providing secure data protection of variables
US8332636B2 (en) Secure policy differentiation by secure kernel design
US7996685B2 (en) Method for effective tamper resistance
US6961852B2 (en) System and method for authenticating software using hidden intermediate keys
US7475254B2 (en) Method for authenticating software using protected master key
US7277541B1 (en) Method and system for using a portion of a digital good as a substitution box
US6480959B1 (en) Software system and associated methods for controlling the use of computer programs
US20160364707A1 (en) Potentate: A Cryptography-Obfuscating, Self-Policing, Pervasive Distribution System For Digital Content
US20050021968A1 (en) Method for performing a trusted firmware/bios update
US7814551B2 (en) System and method for manifest generation
EP0875814A2 (fr) Appareil et procédé de traitement d'information et support d'enregistrement
CN115048652A (zh) 针对运行已验证软件的硬件的端到端安全性
EP0875815A2 (fr) Appareil et procédé de traitement d'information et support d'enregistrement
JP2004537786A (ja) オペレーティングシステムおよびカスタマイズされた制御プログラムとインタフェースする安全なマシンプラットフォーム
US20040139341A1 (en) Method for using shared library in tamper resistant microprocessor
JP2023512428A (ja) ハードウェアエンクレーブを使用して商用オフザシェルフプログラムバイナリを盗用から保護すること
Yang et al. Arm pointer authentication based forward-edge and backward-edge control flow integrity for kernels
Crăciun et al. Malware in the SGX supply chain: Be careful when signing enclaves!
RU2812867C1 (ru) Защита двоичных файлов типовых коммерческих программ от пиратства с использованием аппаратных анклавов
Gadellaa et al. Fault attacks on java card
Valdez Protecting executable software
Cryptographic FIPS 140-2 Security Policy for INTEGRITY Security Services High Assurance Embedded Cryptographic Toolkit Module Version 1.0. 5

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase in:

Ref country code: JP

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载