Movatterモバイル変換


[0]ホーム

URL:


US20160132317A1 - Secure Application Distribution Systems and Methods - Google Patents

Secure Application Distribution Systems and Methods
Download PDF

Info

Publication number
US20160132317A1
US20160132317A1US14/935,230US201514935230AUS2016132317A1US 20160132317 A1US20160132317 A1US 20160132317A1US 201514935230 AUS201514935230 AUS 201514935230AUS 2016132317 A1US2016132317 A1US 2016132317A1
Authority
US
United States
Prior art keywords
application
instance
code
instances
mobile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/935,230
Inventor
Stephen G. MITCHELL
Gilles Boccon-Gibod
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intertrust Technologies Corp
Original Assignee
Intertrust Technologies Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intertrust Technologies CorpfiledCriticalIntertrust Technologies Corp
Priority to US14/935,230priorityCriticalpatent/US20160132317A1/en
Publication of US20160132317A1publicationCriticalpatent/US20160132317A1/en
Priority to US15/660,201prioritypatent/US11080042B2/en
Assigned to ORIGIN FUTURE ENERGY PTY LTD.reassignmentORIGIN FUTURE ENERGY PTY LTD.SECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: INTERTRUST TECHNOLOGIES CORPORATION
Assigned to INTERTRUST TECHNOLOGIES CORPORATIONreassignmentINTERTRUST TECHNOLOGIES CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: MITCHELL, STEPHEN G, BOCCON-GIBOD, GILLES
Priority to US17/384,252prioritypatent/US12050904B2/en
Assigned to INTERTRUST TECHNOLOGIES CORPORATIONreassignmentINTERTRUST TECHNOLOGIES CORPORATIONRELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: ORIGIN FUTURE ENERGY PTY LTD.
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Systems and methods are described that use software diversification techniques to improve the security of mobile applications. Embodiments of the disclosed systems and methods may, among other things, facilitate secure application distribution through deployment of diverse of applications in an application distribution channel. Software diversification consistent with certain disclosed embodiments may mitigate large-scale automated circumvention of security protections by presenting attacking malware moving and/or otherwise unpredictable diverse targets.

Description

Claims (13)

What is claimed is:
1. A method for generating and distributing diverse application instances performed by a system comprising a processor and a non-transitory computer-readable storage medium storing instructions that, when executed, cause the system to perform the method, the method comprising:
generating a first instance of an application;
transmitting the first instance of the application to an application store system for distribution to one or more user devices;
generating a second instance of the application, the second instance of the application being different, at least in part, than the first instance of the application;
accessing a policy associated with a release of the second instance of the application to the application store system; and
transmitting the second instance of the application to the application store system at a time determined based on the accessed policy, the second instance of the application being configured to replace the first instance of the application in the application store system for distribution to the one or more user devices.
2. The method ofclaim 1, wherein generating the first instance of the application comprises embedding code in the application unique to the first instance of the application.
3. The method ofclaim 2, wherein the code is embedded in a subcomponent of the application.
4. The method ofclaim 1, wherein generating the first instance of the application comprises embedding data in the application unique to the first instance of the application.
5. The method ofclaim 4, wherein the data is embedded in a subcomponent of the application.
6. The method ofclaim 4, wherein the embedded data comprises at least one of a key, a nonce, and random salt data.
7. The method ofclaim 1, wherein generating the second instance of the application comprises embedding code in the application unique to the second instance of the application.
8. The method ofclaim 7, wherein the code is embedded in a subcomponent of the application.
9. The method ofclaim 1, wherein generating the second instance of the application comprises embedding data in the application unique to the second instance of the application.
10. The method ofclaim 9, wherein the data is embedded in a subcomponent of the application.
11. The method ofclaim 9, wherein the embedded data comprises at least one of a key, a nonce, and random salt data.
12. The method ofclaim 1, wherein the policy associated with the release of the second instance of the application specifies an instance release time period following transmission of the first instance of the application to the application store system and the determined time is based on the instance release time period.
13. The method ofclaim 1, wherein the policy associated with the release of the second instance of the application specifies a randomly determined release time period and the determined time is randomly determined.
US14/935,2302014-11-062015-11-06Secure Application Distribution Systems and MethodsAbandonedUS20160132317A1 (en)

Priority Applications (3)

Application NumberPriority DateFiling DateTitle
US14/935,230US20160132317A1 (en)2014-11-062015-11-06Secure Application Distribution Systems and Methods
US15/660,201US11080042B2 (en)2014-11-062017-07-26Secure application distribution systems and methods
US17/384,252US12050904B2 (en)2014-11-062021-07-23Secure application distribution systems and methods

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US201462076354P2014-11-062014-11-06
US14/935,230US20160132317A1 (en)2014-11-062015-11-06Secure Application Distribution Systems and Methods

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US15/660,201ContinuationUS11080042B2 (en)2014-11-062017-07-26Secure application distribution systems and methods

Publications (1)

Publication NumberPublication Date
US20160132317A1true US20160132317A1 (en)2016-05-12

Family

ID=55912276

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US14/935,230AbandonedUS20160132317A1 (en)2014-11-062015-11-06Secure Application Distribution Systems and Methods
US15/660,201Active2036-03-09US11080042B2 (en)2014-11-062017-07-26Secure application distribution systems and methods
US17/384,252ActiveUS12050904B2 (en)2014-11-062021-07-23Secure application distribution systems and methods

Family Applications After (2)

Application NumberTitlePriority DateFiling Date
US15/660,201Active2036-03-09US11080042B2 (en)2014-11-062017-07-26Secure application distribution systems and methods
US17/384,252ActiveUS12050904B2 (en)2014-11-062021-07-23Secure application distribution systems and methods

Country Status (2)

CountryLink
US (3)US20160132317A1 (en)
WO (1)WO2016118216A2 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106951745A (en)*2017-03-312017-07-14北京深思数盾科技股份有限公司A kind of instruction recombination method and apparatus
US20170249460A1 (en)*2014-09-232017-08-31The Regents Of The University Of CaliforniaProvably secure virus detection
CN107273142A (en)*2017-07-122017-10-20北京潘达互娱科技有限公司Method for updating program, program operating method and device
US20180351918A1 (en)*2017-06-062018-12-06Nxp B.V.Method for distributing a software application and encryption program for a white-box implementation
WO2019028547A1 (en)2017-08-082019-02-14Crypto4A Technologies Inc.Secure machine executable code deployment and execution method and system
JP2019522834A (en)*2016-07-282019-08-15ヒューレット−パッカード デベロップメント カンパニー エル.ピー.Hewlett‐Packard Development Company, L.P. Code package variant
US11080042B2 (en)2014-11-062021-08-03Intertrust Technologies CorporationSecure application distribution systems and methods
US11232195B2 (en)2019-07-292022-01-25Intertrust Technologies CorporationSystems and methods for managing state
US11366656B2 (en)*2017-09-072022-06-21Servicenow, Inc.Identifying customization changes between instances
EP4221295A1 (en)*2022-01-312023-08-02Thales Dis France SASInjection of cryptographic material during application delivery
US11768948B1 (en)*2020-11-242023-09-26Amazon Technologies, Inc.Enclave-based cryptography services in edge computing environments
US12099997B1 (en)2020-01-312024-09-24Steven Mark HoffbergTokenized fungible liabilities

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CA3134459A1 (en)*2019-03-212020-09-24Capzul LtdDetection and prevention of reverse engineering of computer programs

Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6668325B1 (en)*1997-06-092003-12-23Intertrust TechnologiesObfuscation techniques for enhancing software security
US7702322B1 (en)*2006-02-272010-04-20Good Technology, LlcMethod and system for distributing and updating software in wireless devices
US20100251231A1 (en)*2009-03-252010-09-30Microsoft CorporationDevice dependent on-demand compiling and deployment of mobile applications
US20110067012A1 (en)*2008-05-232011-03-17Irdeto Canada CorporationSystem and method for generating white-box implementations of software applications
US20130014274A1 (en)*2010-03-312013-01-10Irdeto Canada CorporationSystem and Method for Encapsulating and Enabling Protection Through Diverse Variations in Software Libraries
US20130125090A1 (en)*2010-07-292013-05-16Irdeto Canada CorporationSystem and Method for Efficiently Deploying Massively Diverse Program Instances to Resist Differential Attacks
US20140115292A1 (en)*2012-10-242014-04-24Apple Inc.Dynamic obfuscation of heap memory allocations
US20150370548A1 (en)*2014-06-232015-12-24Google Inc.Automated Mobile Application Publishing

Family Cites Families (124)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5535331A (en)1987-09-041996-07-09Texas Instruments IncorporatedProcessor condition sensing circuits, systems and methods
US5249294A (en)1990-03-201993-09-28General Instrument CorporationDetermination of time of execution of predetermined data processing routing in relation to occurrence of prior externally observable event
EP0459046A1 (en)1990-05-311991-12-04International Business Machines CorporationComputer software protection
US5297282A (en)1991-05-291994-03-22Toshiba America Information Systems, Inc.Resume processing function for the OS/2 operating system
US5193180A (en)1991-06-211993-03-09Pure Software Inc.System for modifying relocatable object code files to monitor accesses to dynamically allocated memory
US6266654B1 (en)1992-12-152001-07-24Softlock.Com, Inc.Method for tracking software lineage
US6611607B1 (en)1993-11-182003-08-26Digimarc CorporationIntegrating digital watermarks in multimedia content
US6636615B1 (en)1998-01-202003-10-21Digimarc CorporationMethods and systems using multiple watermarks
US6614914B1 (en)1995-05-082003-09-02Digimarc CorporationWatermark embedder and reader
US6345104B1 (en)1994-03-172002-02-05Digimarc CorporationDigital watermarks and methods for security documents
US6449377B1 (en)1995-05-082002-09-10Digimarc CorporationMethods and systems for watermark processing of line art images
US6122403A (en)1995-07-272000-09-19Digimarc CorporationComputer system linked by using information in data objects
US6549638B2 (en)1998-11-032003-04-15Digimarc CorporationMethods for evidencing illicit use of a computer system or device
US6522770B1 (en)1999-05-192003-02-18Digimarc CorporationManagement of documents and other objects using optical devices
JPH08263438A (en)1994-11-231996-10-11Xerox CorpDistribution and use control system of digital work and access control method to digital work
US5638443A (en)1994-11-231997-06-10Xerox CorporationSystem for controlling the distribution and use of composite digital works
US5634012A (en)1994-11-231997-05-27Xerox CorporationSystem for controlling the distribution and use of digital works having a fee reporting mechanism
US5629980A (en)1994-11-231997-05-13Xerox CorporationSystem for controlling the distribution and use of digital works
US5715403A (en)1994-11-231998-02-03Xerox CorporationSystem for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
US5646997A (en)1994-12-141997-07-08Barton; James M.Method and apparatus for embedding authentication information within digital data
US5745569A (en)1996-01-171998-04-28The Dice CompanyMethod for stega-cipher protection of computer code
US6157721A (en)1996-08-122000-12-05Intertrust Technologies Corp.Systems and methods using cryptography to protect secure computing environments
US5943422A (en)1996-08-121999-08-24Intertrust Technologies Corp.Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US7143290B1 (en)1995-02-132006-11-28Intertrust Technologies CorporationTrusted and secure techniques, systems and methods for item delivery and execution
CN101398871B (en)1995-02-132011-05-18英特特拉斯特技术公司Systems and methods for secure transaction management and electronic rights protection
US5892900A (en)1996-08-301999-04-06Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US5530235A (en)1995-02-161996-06-25Xerox CorporationInteractive contents revealing storage device
US5701452A (en)1995-04-201997-12-23Ncr CorporationComputer generated structure
US6728390B2 (en)1995-05-082004-04-27Digimarc CorporationMethods and systems using multiple watermarks
US7054462B2 (en)1995-05-082006-05-30Digimarc CorporationInferring object status based on detected watermark data
US5534975A (en)1995-05-261996-07-09Xerox CorporationDocument processing system utilizing document service cards to provide document processing services
US6006328A (en)1995-07-141999-12-21Christopher N. DrakeComputer software authentication, protection, and security system
US7562392B1 (en)1999-05-192009-07-14Digimarc CorporationMethods of interacting with audio and ambient music
US7003731B1 (en)1995-07-272006-02-21Digimare CorporationUser control and activation of watermark enabled objects
US6650761B1 (en)1999-05-192003-11-18Digimarc CorporationWatermarked business cards and methods
JP2000503154A (en)1996-01-112000-03-14エムアールジェイ インコーポレイテッド System for controlling access and distribution of digital ownership
US5930768A (en)1996-02-061999-07-27Supersonic Boom, Inc.Method and system for remote user controlled manufacturing
US6088452A (en)1996-03-072000-07-11Northern Telecom LimitedEncoding technique for software and hardware
US5664018A (en)1996-03-121997-09-02Leighton; Frank ThomsonWatermarking process resilient to collusion attacks
US5949885A (en)1996-03-121999-09-07Leighton; F. ThomsonMethod for protecting content using watermarking
US5892899A (en)1996-06-131999-04-06Intel CorporationTamper resistant methods and apparatus
US5889868A (en)1996-07-021999-03-30The Dice CompanyOptimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US6272634B1 (en)1996-08-302001-08-07Regents Of The University Of MinnesotaDigital watermarking to resolve multiple claims of ownership
US5915027A (en)1996-11-051999-06-22Nec Research InstituteDigital watermarking
EP0971345B1 (en)1996-12-192006-05-03Matsushita Electric Industrial Co., Ltd.Optical disk and method for recording onto an optical disk
US6185312B1 (en)1997-01-282001-02-06Nippon Telegraph And Telephone CorporationMethod for embedding and reading watermark-information in digital form, and apparatus thereof
US5920861A (en)1997-02-251999-07-06Intertrust Technologies Corp.Techniques for defining using and manipulating rights management data structures
US6233684B1 (en)1997-02-282001-05-15Contenaguard Holdings, Inc.System for controlling the distribution and use of rendered digital works through watermaking
US6192475B1 (en)1997-03-312001-02-20David R. WallaceSystem and method for cloaking software
US6092147A (en)1997-04-152000-07-18Sun Microsystems, Inc.Virtual machine with securely distributed bytecode verification
US6101605A (en)1997-05-152000-08-08Vlsi Technology, Inc.Method and apparatus for performing a secure operation
US6272631B1 (en)1997-06-302001-08-07Microsoft CorporationProtected storage of core data secrets
DE69836455T2 (en)1997-08-202007-03-29Canon K.K. Electronic watermarking system, electronic information distribution system and device for storing images
US6055503A (en)1997-08-292000-04-25Preview SystemsSoftware program self-modification
JP4064506B2 (en)1997-09-172008-03-19パイオニア株式会社 Digital watermark superimposing method, detecting method and apparatus
US6119230A (en)1997-10-012000-09-12Novell, Inc.Distributed dynamic security capabilities
US6085249A (en)1997-10-242000-07-04Pictra, Inc.Method and apparatuses for transferring data for multiple applications through a single communication link in response to authentication information
US6167358A (en)1997-12-192000-12-26Nowonder, Inc.System and method for remotely monitoring a plurality of computer-based systems
US6088814A (en)1997-12-302000-07-11Emc CorporationMethod and apparatus for reading a non-configured disc drive in an AS/400 system
US6513118B1 (en)1998-01-272003-01-28Canon Kabushiki KaishaElectronic watermarking method, electronic information distribution system, image filing apparatus and storage medium therefor
DE19816356C2 (en)1998-04-032001-01-25Deutsche Telekom Ag Process for inserting tamper-proof digital fingerprints into electronic documents
JP3358532B2 (en)1998-04-272002-12-24日本電気株式会社 Receiving device using electronic watermark
US7236610B1 (en)1998-04-302007-06-26Fraunhofer GesellschaftAuthenticating executable code and executions thereof
US6243480B1 (en)1998-04-302001-06-05Jian ZhaoDigital authentication with analog documents
US6504941B2 (en)1998-04-302003-01-07Hewlett-Packard CompanyMethod and apparatus for digital watermarking of images
US6754822B1 (en)1998-04-302004-06-22Fraunhofer-Gesellschaft Zur Forderung Der Angewandten Forshung E.V.Active watermarks and watermark agents
US6957341B2 (en)1998-05-142005-10-18Purdue Research FoundationMethod and system for secure computational outsourcing and disguise
JP3156667B2 (en)1998-06-012001-04-16日本電気株式会社 Digital watermark insertion system, digital watermark characteristic table creation device
US6363486B1 (en)1998-06-052002-03-26Intel CorporationMethod of controlling usage of software components
US6523113B1 (en)1998-06-092003-02-18Apple Computer, Inc.Method and apparatus for copy protection
AU4535699A (en)1998-06-101999-12-30Auckland Uniservices LimitedSoftware watermarking techniques
US6263493B1 (en)1998-07-082001-07-17International Business Machines CorporationMethod and system for controlling the generation of program statements
US6694040B2 (en)1998-07-282004-02-17Canon Kabushiki KaishaData processing apparatus and method, and memory medium
US6324569B1 (en)1998-09-232001-11-27John W. L. OgilvieSelf-removing email verified or designated as such by a message distributor for the convenience of a recipient
US8332478B2 (en)1998-10-012012-12-11Digimarc CorporationContext sensitive connected content
US6499137B1 (en)1998-10-022002-12-24Microsoft CorporationReversible load-time dynamic linking
JP3397157B2 (en)1999-01-132003-04-14日本電気株式会社 Digital watermark insertion system
CA2260094C (en)1999-01-192002-10-01Nec CorporationA method for inserting and detecting electronic watermark data into a digital image and a device for the same
US6317834B1 (en)1999-01-292001-11-13International Business Machines CorporationBiometric authentication system with encrypted models
DE69902221T2 (en)1999-02-232003-03-06Taiwan Semiconductor Mfg. Co., Ltd. Memory circuits with built-in self-test
US6522766B1 (en)1999-03-152003-02-18Seiko Epson CorporationWatermarking with random zero-mean patches for copyright protection
US6442284B1 (en)1999-03-192002-08-27Digimarc CorporationWatermark detection utilizing regions with higher probability of success
US6553497B1 (en)1999-03-252003-04-22International Business Machines CorporationElectromagnetic field tamper alarm
US7360252B1 (en)1999-04-302008-04-15Macrovision CorporationMethod and apparatus for secure distribution of software
US6966002B1 (en)1999-04-302005-11-15Trymedia Systems, Inc.Methods and apparatus for secure distribution of software
US7263722B1 (en)1999-05-122007-08-28Fraunhofer Crcg, Inc.Obfuscation of executable code
US7421586B2 (en)1999-05-122008-09-02Fraunhofer GesselschaftProtecting mobile code against malicious hosts
US6801999B1 (en)1999-05-202004-10-05Microsoft CorporationPassive and active software objects containing bore resistant watermarking
US6898706B1 (en)1999-05-202005-05-24Microsoft CorporationLicense-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer
US6834343B1 (en)1999-05-272004-12-21Microsoft CorporationMethod for watermarking computer programs
US6785815B1 (en)1999-06-082004-08-31Intertrust Technologies Corp.Methods and systems for encoding and protecting data using digital signature and watermarking techniques
US6594761B1 (en)1999-06-092003-07-15Cloakware CorporationTamper resistant software encoding
US6385603B1 (en)1999-06-142002-05-07International Business Machines CorporationJoined table expression optimization by query transformation
US6874087B1 (en)1999-07-132005-03-29International Business Machines CorporationIntegrity checking an executable module and associated protected service provider module
US7430670B1 (en)1999-07-292008-09-30Intertrust Technologies Corp.Software self-defense systems and methods
US7770016B2 (en)1999-07-292010-08-03Intertrust Technologies CorporationSystems and methods for watermarking software and other media
US6779114B1 (en)1999-08-192004-08-17Cloakware CorporationTamper resistant software-control flow encoding
US7124170B1 (en)1999-08-202006-10-17Intertrust Technologies Corp.Secure processing unit systems and methods
US7757097B2 (en)1999-09-032010-07-13Purdue Research FoundationMethod and system for tamperproofing software
US7287166B1 (en)1999-09-032007-10-23Purdue Research FoundationGuards for application in software tamperproofing
US6807634B1 (en)1999-11-302004-10-19International Business Machines CorporationWatermarks for customer identification
US6832316B1 (en)1999-12-222004-12-14Intertrust Technologies, Corp.Systems and methods for protecting data secrecy and integrity
US6829710B1 (en)2000-03-142004-12-07Microsoft CorporationTechnique for producing, through watermarking, highly tamper-resistant executable code and resulting “watermarked” code so formed
US7269845B1 (en)*2000-06-092007-09-11Aramira CorporationMobile application security system and method
US7047413B2 (en)2001-04-232006-05-16Microsoft CorporationCollusion-resistant watermarking and fingerprinting
US7249176B1 (en)*2001-04-302007-07-24Sun Microsystems, Inc.Managing user access of distributed resources on application servers
CA2350029A1 (en)2001-06-082002-12-08Cloakware CorporationSustainable digital watermarking via tamper-resistant software
US7895522B2 (en)*2001-09-282011-02-22Ntt Docomo, Inc.Layout of platform specific graphical user interface widgets migrated between heterogeneous device platforms
US6880149B2 (en)2002-04-012005-04-12Pace Anti-PiracyMethod for runtime code integrity validation using code block checksums
CA2502232C (en)2002-10-152013-10-01Trent J. BrundageIdentification document and related methods
AU2004264582B2 (en)2003-06-052010-05-13Intertrust Technologies CorporationInteroperable systems and methods for peer-to-peer service orchestration
US8301893B2 (en)2003-08-132012-10-30Digimarc CorporationDetecting media areas likely of hosting watermarks
US7353499B2 (en)2003-09-252008-04-01Sun Microsystems, Inc.Multiple instruction dispatch tables for application program obfuscation
US7363620B2 (en)2003-09-252008-04-22Sun Microsystems, Inc.Non-linear execution of application program instructions for application program obfuscation
US7424620B2 (en)2003-09-252008-09-09Sun Microsystems, Inc.Interleaved data and instruction streams for application program obfuscation
US7603668B2 (en)2004-01-092009-10-13Hewlett-Packard Development Company, L.P.Determining the applicability of patches for installation on a computer system
US20050182966A1 (en)*2004-02-172005-08-18Duc PhamSecure interprocess communications binding system and methods
EP1943603A2 (en)2005-10-182008-07-16Intertrust Technologies CorporationMethods for digital rights management
US7926086B1 (en)*2006-10-312011-04-12Oracle America, Inc.Access control mechanism for shareable interface communication access control
US8806618B2 (en)*2008-03-312014-08-12Microsoft CorporationSecurity by construction for distributed applications
WO2013109932A1 (en)*2012-01-182013-07-25OneID Inc.Methods and systems for secure identity management
US9798763B2 (en)*2013-09-232017-10-24David D. Wright, SR.Method for using tags to manage client software across a life cycle
CN113220320B (en)*2014-10-102024-09-27维萨国际服务协会Method and system for partial personalization during mobile application updates
WO2016118216A2 (en)2014-11-062016-07-28Intertrust Technologies CorporationSecure application distribution systems and methods

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6668325B1 (en)*1997-06-092003-12-23Intertrust TechnologiesObfuscation techniques for enhancing software security
US7702322B1 (en)*2006-02-272010-04-20Good Technology, LlcMethod and system for distributing and updating software in wireless devices
US20110067012A1 (en)*2008-05-232011-03-17Irdeto Canada CorporationSystem and method for generating white-box implementations of software applications
US20100251231A1 (en)*2009-03-252010-09-30Microsoft CorporationDevice dependent on-demand compiling and deployment of mobile applications
US20130014274A1 (en)*2010-03-312013-01-10Irdeto Canada CorporationSystem and Method for Encapsulating and Enabling Protection Through Diverse Variations in Software Libraries
US20130125090A1 (en)*2010-07-292013-05-16Irdeto Canada CorporationSystem and Method for Efficiently Deploying Massively Diverse Program Instances to Resist Differential Attacks
US20140115292A1 (en)*2012-10-242014-04-24Apple Inc.Dynamic obfuscation of heap memory allocations
US20150370548A1 (en)*2014-06-232015-12-24Google Inc.Automated Mobile Application Publishing

Cited By (21)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20170249460A1 (en)*2014-09-232017-08-31The Regents Of The University Of CaliforniaProvably secure virus detection
US11080042B2 (en)2014-11-062021-08-03Intertrust Technologies CorporationSecure application distribution systems and methods
US12050904B2 (en)2014-11-062024-07-30Intertrust Technologies CorporationSecure application distribution systems and methods
JP2019522834A (en)*2016-07-282019-08-15ヒューレット−パッカード デベロップメント カンパニー エル.ピー.Hewlett‐Packard Development Company, L.P. Code package variant
CN106951745A (en)*2017-03-312017-07-14北京深思数盾科技股份有限公司A kind of instruction recombination method and apparatus
US20180351918A1 (en)*2017-06-062018-12-06Nxp B.V.Method for distributing a software application and encryption program for a white-box implementation
CN107273142A (en)*2017-07-122017-10-20北京潘达互娱科技有限公司Method for updating program, program operating method and device
US20220083322A1 (en)*2017-08-082022-03-17Crypto4A Technologies Inc.Secure cloud-based system, and security application distribution method to be automatically executed therein
US11714622B2 (en)*2017-08-082023-08-01Crypto4A Technologies Inc.Secure cloud-based system, and security application distribution method to be automatically executed therein
WO2019028547A1 (en)2017-08-082019-02-14Crypto4A Technologies Inc.Secure machine executable code deployment and execution method and system
US10678525B2 (en)*2017-08-082020-06-09Crypto4A Technologies Inc.Secure machine executable code deployment and execution method and system
US11204748B2 (en)*2017-08-082021-12-21Ciypto4A Technologies Inc.Secure machine executable code deployment and execution method and system
US11366656B2 (en)*2017-09-072022-06-21Servicenow, Inc.Identifying customization changes between instances
US11783027B2 (en)2019-07-292023-10-10Intertrust Technologies CorporationSystems and methods for managing state
US11232195B2 (en)2019-07-292022-01-25Intertrust Technologies CorporationSystems and methods for managing state
US12174944B2 (en)2019-07-292024-12-24Intertrust Technologies CorporationSystems and methods for managing state
US12099997B1 (en)2020-01-312024-09-24Steven Mark HoffbergTokenized fungible liabilities
US11768948B1 (en)*2020-11-242023-09-26Amazon Technologies, Inc.Enclave-based cryptography services in edge computing environments
US12056248B1 (en)2020-11-242024-08-06Amazon Technologies, Inc.Enclave-based cryptography services in edge computing environments
EP4221295A1 (en)*2022-01-312023-08-02Thales Dis France SASInjection of cryptographic material during application delivery
WO2023144399A1 (en)*2022-01-312023-08-03Thales Dis France SasInjection of cryptographic material during application delivery

Also Published As

Publication numberPublication date
US20210349712A1 (en)2021-11-11
WO2016118216A3 (en)2016-10-13
WO2016118216A2 (en)2016-07-28
US11080042B2 (en)2021-08-03
US12050904B2 (en)2024-07-30
US20170322800A1 (en)2017-11-09

Similar Documents

PublicationPublication DateTitle
US12050904B2 (en)Secure application distribution systems and methods
EP3479282B1 (en)Targeted secure software deployment
EP3387813B1 (en)Mobile device having trusted execution environment
CN102760219B (en)A kind of Android platform software protection system, method and apparatus
US11829469B2 (en)Software integrity checking systems and methods
CN104318135B (en)A kind of Java code Safety actuality loading method based on credible performing environment
US10027683B2 (en)Shared symmetric key encryption
CN106304040A (en)The management method of Mobile solution, device
Cilardo et al.Secure distribution infrastructure for hardware digital contents
CN107273723A (en)A kind of Android platform applied software protection method based on so file shell addings
US10474844B2 (en)Cryptographic program diversification
KR101473656B1 (en)Method and apparatus for security of mobile data
Bahaa-Eldin et al.A comprehensive software copy protection and digital rights management platform
Fuchs et al.Runtime firmware product lines using TPM2. 0
CN115437673A (en) Vehicle-mounted MCU upgrade method, vehicle-mounted MCU upgrade system and server group
Lai et al.A Holistic Approach for Securing In-app Purchase (IAP) Vulnerability in Mobile Applications

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

ASAssignment

Owner name:ORIGIN FUTURE ENERGY PTY LTD., CALIFORNIA

Free format text:SECURITY INTEREST;ASSIGNOR:INTERTRUST TECHNOLOGIES CORPORATION;REEL/FRAME:056770/0207

Effective date:20200313

Owner name:INTERTRUST TECHNOLOGIES CORPORATION, CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MITCHELL, STEPHEN G;BOCCON-GIBOD, GILLES;SIGNING DATES FROM 20210622 TO 20210623;REEL/FRAME:056765/0137

ASAssignment

Owner name:INTERTRUST TECHNOLOGIES CORPORATION, CALIFORNIA

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:ORIGIN FUTURE ENERGY PTY LTD.;REEL/FRAME:062747/0742

Effective date:20220908


[8]ページ先頭

©2009-2025 Movatter.jp