KR100405574B1 - 위조방지 방법 및 장치 - Google Patents
위조방지 방법 및 장치 Download PDFInfo
- Publication number
- KR100405574B1 KR100405574B1 KR10-2000-7002387A KR20007002387A KR100405574B1 KR 100405574 B1 KR100405574 B1 KR 100405574B1 KR 20007002387 A KR20007002387 A KR 20007002387A KR 100405574 B1 KR100405574 B1 KR 100405574B1
- Authority
- KR
- South Korea
- Prior art keywords
- confusion
- instruction cells
- execution
- programming instruction
- counterfeit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 79
- 238000001514 detection method Methods 0.000 claims description 22
- 230000008569 process Effects 0.000 claims description 21
- 238000012544 monitoring process Methods 0.000 claims description 18
- 230000001419 dependent effect Effects 0.000 claims description 11
- 238000012806 monitoring device Methods 0.000 claims 9
- 238000006243 chemical reaction Methods 0.000 claims 4
- 230000035772 mutation Effects 0.000 claims 1
- 230000002265 prevention Effects 0.000 claims 1
- 238000012795 verification Methods 0.000 description 17
- 238000010586 diagram Methods 0.000 description 6
- 230000035945 sensitivity Effects 0.000 description 5
- 238000010168 coupling process Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (32)
- 위조를 감시(monitor tampering)하기 위한 장치에 있어서,다수의 혼동(obfuscated) 프로그래밍 명령어들의 실행이 감시되고 있는지 자체-검증하도록 설계된 다수의 혼동 프로그래밍 명령어 셀들을 저장하고 있는 저장 매체; 및상기 저장 매체에 연결되어 상기 프로그래밍 명령어들을 실행하기 위한 실행 유닛을 포함하고,상기 혼동 셀은 셀간 종속 변환 프로세스(inter-cell dependent mutation process)를 통해 변환되고,상기 다수의 혼동 프로그램 명령어 셀들은 경과된 실행시간의 양이 임계치를 초과했는지 검증하도록 설계된 혼동 프로그래밍 명령어 셀들을 포함하는위조 감시 장치.
- 제 1 항에 있어서,상기 다수의 혼동 프로그램 명령어 셀들은 상기 장치가 상기 혼동 프로그래밍 명령어 셀들의 단일 단계 실행을 지원하는 모드로 동작되고 있는지 판단하도록 설계된 혼동 프로그래밍 명령어 셀들을 포함하는위조 감시 장치.
- 제 2 항에 있어서,상기 다수의 혼동 프로그램 명령어 셀들은 상기 단일 단계 실행 지원 판단을 수행하기 위해 상기 장치의 상태 변수에 억세스하도록 설계된 혼동 프로그래밍 명령어 셀들을 포함하는위조 감시 장치.
- 삭제
- 제 1 항에 있어서,상기 다수의 혼동 프로그램 명령어 셀들은 기록된 타임스탬프에 기반하여 상기 경과된 실행시간의 양을 계산하도록 설계된 혼동 프로그래밍 명령어 셀들을 더 포함하는위조 감시 장치.
- 제 5 항에 있어서,상기 다수의 혼동 프로그램 명령어 셀들은 상기 장치의 타이머의 현재값을 검색하고 상기 타이머의 검색된 현재값을 기록된 타임스탬프로서 저장하도록 설계된 혼동 프로그래밍 명령어 셀들을 더 포함하는위조 감시 장치.
- 제 6 항에 있어서,상기 타이머의 검색된 현재값을 기록된 타임스탬프로서 저장하도록 설계된 상기 혼동 프로그래밍 명령어 셀들은 적어도 하나의 다른 위조방지 기법에 의해 공유되는 저장 위치에 상기 검색된 현재값을 저장하는위조 감시 장치.
- 위조를 감시(monitor tampering)하기 위한 방법에 있어서,(a) 다수의 혼동 프로그래밍 명령어 셀들을 실행하는 단계 - 여기서, 상기 혼동 셀들은 셀간 종속 변환 프로세스를 통해 변환됨 - ;(b) 상기 실행이 감시되고 있지 않다는 것을 상기 다수의 혼동 프로그래밍 명령어 셀들에 의해 자체-검증하는 단계; 및(c) 상기 단계 (b)에서 상기 실행이 감시되고 있는 것으로 검증되면 상기 단계 (a)의 실행을 종료시키는 단계를 포함하고,상기 단계 (b)는 경과된 실행시간의 양이 임계치를 초과했는지 검증하는 단계를 포함하는위조 감시 방법.
- 제 8 항에 있어서,상기 단계 (b)는 상기 다수의 혼동 프로그래밍 명령어 셀들이 단일 단계 실행을 지원하는 모드로 실행되고 있는지 판단하는 단계를 포함하는위조 감시 방법.
- 제 9 항에 있어서,상기 단계 (b)는 상기 다수의 혼동 프로그래밍 명령어 셀들이 상기 단일 단계 실행 지원 판단을 수행하기 위해 상태 변수에 억세스하는 단계를 포함하는위조 감시 방법.
- 삭제
- 제 8 항에 있어서,상기 단계 (b)는 기록된 타임스탬프에 기반하여 상기 경과된 실행시간의 양을 계산하는 단계를 포함하는위조 감시 방법.
- 제 12 항에 있어서,상기 단계 (b)는 타이머의 현재값을 검색하고, 상기 타이머의 검색된 현재값을 기록된 타임스탬프로서 저장하는 단계를 더 포함하는위조 감시 방법.
- 제 13 항에 있어서,상기 단계 (b)는 다른 위조방지 기법에 의해 공유되는 저장 위치에 상기 검색된 현재값을 저장하는 단계를 포함하는위조 감시 방법.
- 삭제
- 삭제
- 삭제
- 삭제
- 위조를 감시(monitor tampering)하기 위한 장치에 있어서,경과된 실행시간의 양이 임계치를 초과했는지 검증하도록 설계된 다수의 혼동(obfuscated) 프로그래밍 명령어 셀들을 저장하고 있는 저장 매체; 및상기 저장 매체에 연결되어 상기 프로그래밍 명령어들을 실행하기 위한 실행 유닛을 포함하고,상기 혼동 셀은 셀간 종속 변환 프로세스를 통해 변환되고,상기 다수의 혼동 프로그램 명령어 셀들은 기록된 타임스탬프에 기반하여 상기 경과된 실행시간의 양을 계산하도록 설계된 혼동 프로그래밍 명령어 셀들을 포함하는위조 감시 장치.
- 삭제
- 제 19 항에 있어서,상기 다수의 혼동 프로그램 명령어 셀들은 상기 장치의 타이머의 현재값을 검색하고 상기 타이머의 검색된 현재값을 기록된 타임스탬프로서 저장하도록 설계된 혼동 프로그래밍 명령어 셀들을 더 포함하는위조 감시 장치.
- 제 21 항에 있어서,상기 타이머의 검색된 현재값을 기록된 타임스탬프로서 저장하도록 설계된 혼동 프로그래밍 명령어 셀들은 적어도 하나의 다른 위조방지 기법에 의해 공유되는 저장 위치에 상기 검색된 현재값을 저장하는위조 감시 장치.
- 위조를 감시(monitor tampering)하기 위한 방법에 있어서,(a) 다수의 혼동 프로그래밍 명령어 셀들을 실행하는 단계;(b) 경과된 실행시간의 양이 임계치를 초과했는지 검증하는 단계; 및(c) 상기 단계 (b)에서 상기 실행이 감시되고 있는 것으로 검증되면 상기 단계 (a)의 실행을 종료시키는 단계를 포함하고,상기 혼동 셀은 셀간 종속 변환 프로세스를 통해 변환되고,상기 단계 (b)는 기록된 타임스탬프에 기반하여 상기 경과된 실행시간의 양을 계산하는 단계를 포함하는위조 감시 방법.
- 삭제
- 제 23 항에 있어서,상기 단계 (b)는 타이머의 현재값을 검색하고 상기 타이머의 검색된 현재값을 기록된 타임스탬프로서 저장하는 단계를 더 포함하는위조 감시 방법.
- 제 25 항에 있어서,상기 단계 (b)는 다른 위조방지 기법에 의해 공유되는 저장 위치에 상기 검색된 현재값을 저장하는 단계를 포함하는위조 감시 방법.
- 제1 감시방지(anti-observation) 위조방지 기법과 감시검출 위조방지 기법을 각각 구현하도록 설계된 제1 및 제2 다수의 혼동(obfuscated) 프로그래밍 명령어 셀들을 저장하고 있는 저장 매체; 및상기 저장 매체에 연결되어 상기 프로그래밍 명령어들을 실행하기 위한 실행 유닛을 포함하고,상기 제1 및 제2 다수의 혼동 프로그래밍 명령어 셀들은 상기 제1 감시방지 및 감시검출 위조방지 기법들에 대응하는 제1 및 제2 키값을 위해 하나의 저장 위치를 공유하고,상기 혼동 셀은 셀간 종속 변환 프로세스를 통해 변환되며,상기 제1 다수의 혼동 프로그램 명령어 셀들은 키-기반 비밀 검색 기법을 구현하도록 설계되고, 상기 제2 다수의 혼동 프로그래밍 명령어 셀들은 경과된 실행시간의 양이 임계치를 초과하지 않았다는 것을 검증하도록 설계된장치.
- 삭제
- 제 27 항에 있어서,상기 저장 매체는 제2 감시방지(anti-observation) 위조방지 기법을 구현하도록 설계된 제3 다수의 혼동 프로그래밍 명령어 셀들 - 여기서, 상기 제3 다수의 혼동 프로그래밍 명령어 셀들은 상기 제2 감시방지(anti-observation) 위조방지 기법에 대응하는 제3 키값을 위해 동일한 저장 위치를 공유함 - 을 더 저장하고 있는장치.
- 제 29 항에 있어서,상기 제1 다수의 혼동 프로그램 명령어 셀들은 키-기반 비밀 검색 기법을 구현하도록 설계되고, 상기 제2 다수의 혼동 프로그래밍 명령어 셀들은 경과된 실행시간의 양이 임계치를 초과하지 않았다는 것을 검증하도록 설계되고, 상기 제3 다수의 혼동 프로그래밍 명령어 셀들은 인증 프로세스를 구현하도록 설계된장치.
- 삭제
- 삭제
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/924,740 | 1997-09-05 | ||
US08/924,740 US6205550B1 (en) | 1996-06-13 | 1997-09-05 | Tamper resistant methods and apparatus |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR10-2003-7012887A Division KR20030085085A (ko) | 1997-09-05 | 1998-07-17 | 위조방지 방법 및 장치 |
KR10-2003-7012888A Division KR20030085086A (ko) | 1997-09-05 | 1998-07-17 | 위조방지 방법 및 장치 |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20010023733A KR20010023733A (ko) | 2001-03-26 |
KR100405574B1 true KR100405574B1 (ko) | 2003-11-14 |
Family
ID=25450647
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR10-2003-7012888A Ceased KR20030085086A (ko) | 1997-09-05 | 1998-07-17 | 위조방지 방법 및 장치 |
KR10-2003-7012887A Ceased KR20030085085A (ko) | 1997-09-05 | 1998-07-17 | 위조방지 방법 및 장치 |
KR10-2000-7002387A Expired - Fee Related KR100405574B1 (ko) | 1997-09-05 | 1998-07-17 | 위조방지 방법 및 장치 |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR10-2003-7012888A Ceased KR20030085086A (ko) | 1997-09-05 | 1998-07-17 | 위조방지 방법 및 장치 |
KR10-2003-7012887A Ceased KR20030085085A (ko) | 1997-09-05 | 1998-07-17 | 위조방지 방법 및 장치 |
Country Status (6)
Country | Link |
---|---|
US (1) | US6205550B1 (ko) |
EP (1) | EP1020049A4 (ko) |
JP (1) | JP4544739B2 (ko) |
KR (3) | KR20030085086A (ko) |
AU (1) | AU8495798A (ko) |
WO (1) | WO1999013613A1 (ko) |
Families Citing this family (141)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6253323B1 (en) | 1996-11-01 | 2001-06-26 | Intel Corporation | Object-based digital signatures |
US6542610B2 (en) | 1997-01-30 | 2003-04-01 | Intel Corporation | Content protection for digital transmission systems |
US6941463B1 (en) | 1998-05-14 | 2005-09-06 | Purdue Research Foundation | Secure computational outsourcing techniques |
US6957341B2 (en) * | 1998-05-14 | 2005-10-18 | Purdue Research Foundation | Method and system for secure computational outsourcing and disguise |
US6324646B1 (en) * | 1998-09-11 | 2001-11-27 | International Business Machines Corporation | Method and system for securing confidential data in a computer network |
WO2000055962A2 (en) | 1999-03-15 | 2000-09-21 | Sony Electronics, Inc. | Electronic media system, method and device |
WO2000072112A2 (en) * | 1999-05-12 | 2000-11-30 | Fraunhofer Crcg, Inc. | Obfuscation of executable code |
US7421586B2 (en) | 1999-05-12 | 2008-09-02 | Fraunhofer Gesselschaft | Protecting mobile code against malicious hosts |
US7430670B1 (en) * | 1999-07-29 | 2008-09-30 | Intertrust Technologies Corp. | Software self-defense systems and methods |
US7757097B2 (en) * | 1999-09-03 | 2010-07-13 | Purdue Research Foundation | Method and system for tamperproofing software |
US7287166B1 (en) | 1999-09-03 | 2007-10-23 | Purdue Research Foundation | Guards for application in software tamperproofing |
US7073071B1 (en) | 2000-03-31 | 2006-07-04 | Intel Corporation | Platform and method for generating and utilizing a protected audit log |
US7013484B1 (en) | 2000-03-31 | 2006-03-14 | Intel Corporation | Managing a secure environment using a chipset in isolated execution mode |
US6996710B1 (en) | 2000-03-31 | 2006-02-07 | Intel Corporation | Platform and method for issuing and certifying a hardware-protected attestation key |
US6507904B1 (en) | 2000-03-31 | 2003-01-14 | Intel Corporation | Executing isolated mode instructions in a secure system running in privilege rings |
US7194634B2 (en) | 2000-03-31 | 2007-03-20 | Intel Corporation | Attestation key memory device and bus |
US6678825B1 (en) | 2000-03-31 | 2004-01-13 | Intel Corporation | Controlling access to multiple isolated memories in an isolated execution environment |
US6760441B1 (en) | 2000-03-31 | 2004-07-06 | Intel Corporation | Generating a key hieararchy for use in an isolated execution environment |
US7013481B1 (en) | 2000-03-31 | 2006-03-14 | Intel Corporation | Attestation key memory device and bus |
US7082615B1 (en) | 2000-03-31 | 2006-07-25 | Intel Corporation | Protecting software environment in isolated execution |
US6934817B2 (en) * | 2000-03-31 | 2005-08-23 | Intel Corporation | Controlling access to multiple memory zones in an isolated execution environment |
US7089418B1 (en) | 2000-03-31 | 2006-08-08 | Intel Corporation | Managing accesses in a processor for isolated execution |
US6754815B1 (en) | 2000-03-31 | 2004-06-22 | Intel Corporation | Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set |
US6990579B1 (en) | 2000-03-31 | 2006-01-24 | Intel Corporation | Platform and method for remote attestation of a platform |
US6957332B1 (en) | 2000-03-31 | 2005-10-18 | Intel Corporation | Managing a secure platform using a hierarchical executive architecture in isolated execution mode |
US6769058B1 (en) | 2000-03-31 | 2004-07-27 | Intel Corporation | Resetting a processor in an isolated execution environment |
US7111176B1 (en) | 2000-03-31 | 2006-09-19 | Intel Corporation | Generating isolated bus cycles for isolated execution |
US6633963B1 (en) | 2000-03-31 | 2003-10-14 | Intel Corporation | Controlling access to multiple memory zones in an isolated execution environment |
US6795905B1 (en) | 2000-03-31 | 2004-09-21 | Intel Corporation | Controlling accesses to isolated memory using a memory controller for isolated execution |
US7356817B1 (en) | 2000-03-31 | 2008-04-08 | Intel Corporation | Real-time scheduling of virtual machines |
US7000119B1 (en) | 2000-04-20 | 2006-02-14 | Realnetworks, Inc. | Instruction/data protection employing derived obscuring instruction/data |
JP4186381B2 (ja) * | 2000-05-10 | 2008-11-26 | 日本電気株式会社 | プログラムを格納する記録媒体及びその実行方法 |
US7065652B1 (en) * | 2000-06-21 | 2006-06-20 | Aladdin Knowledge Systems, Ltd. | System for obfuscating computer code upon disassembly |
US6976162B1 (en) * | 2000-06-28 | 2005-12-13 | Intel Corporation | Platform and method for establishing provable identities while maintaining privacy |
US7389427B1 (en) | 2000-09-28 | 2008-06-17 | Intel Corporation | Mechanism to secure computer output from software attack using isolated execution |
US7793111B1 (en) | 2000-09-28 | 2010-09-07 | Intel Corporation | Mechanism to handle events in a machine with isolated execution |
US7215781B2 (en) | 2000-12-22 | 2007-05-08 | Intel Corporation | Creation and distribution of a secret value between two devices |
US7818808B1 (en) | 2000-12-27 | 2010-10-19 | Intel Corporation | Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor |
US6907600B2 (en) | 2000-12-27 | 2005-06-14 | Intel Corporation | Virtual translation lookaside buffer |
US7035963B2 (en) * | 2000-12-27 | 2006-04-25 | Intel Corporation | Method for resolving address space conflicts between a virtual machine monitor and a guest operating system |
US7117376B2 (en) | 2000-12-28 | 2006-10-03 | Intel Corporation | Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations |
US7512986B2 (en) | 2001-03-28 | 2009-03-31 | Nds Limited | Digital rights management system and method |
US7096497B2 (en) * | 2001-03-30 | 2006-08-22 | Intel Corporation | File checking using remote signing authority via a network |
US20020144121A1 (en) * | 2001-03-30 | 2002-10-03 | Ellison Carl M. | Checking file integrity using signature generated in isolated execution |
US7272831B2 (en) | 2001-03-30 | 2007-09-18 | Intel Corporation | Method and apparatus for constructing host processor soft devices independent of the host processor operating system |
US20050097342A1 (en) * | 2001-05-21 | 2005-05-05 | Cyberscan Technology, Inc. | Trusted watchdog method and apparatus for securing program execution |
US7979740B2 (en) * | 2001-05-21 | 2011-07-12 | Mudalla Technology, Inc. | Gaming machine having game play suspension and resumption features using biometrically-based authentication and method of operating same |
US8515773B2 (en) | 2001-08-01 | 2013-08-20 | Sony Corporation | System and method for enabling distribution and brokering of content information |
US7191440B2 (en) | 2001-08-15 | 2007-03-13 | Intel Corporation | Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor |
US7024555B2 (en) | 2001-11-01 | 2006-04-04 | Intel Corporation | Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment |
US7103771B2 (en) | 2001-12-17 | 2006-09-05 | Intel Corporation | Connecting a virtual token to a physical token |
US7308576B2 (en) | 2001-12-31 | 2007-12-11 | Intel Corporation | Authenticated code module |
US7480806B2 (en) | 2002-02-22 | 2009-01-20 | Intel Corporation | Multi-token seal and unseal |
US7631196B2 (en) * | 2002-02-25 | 2009-12-08 | Intel Corporation | Method and apparatus for loading a trustable operating system |
US7028149B2 (en) | 2002-03-29 | 2006-04-11 | Intel Corporation | System and method for resetting a platform configuration register |
US7069442B2 (en) | 2002-03-29 | 2006-06-27 | Intel Corporation | System and method for execution of a secured environment initialization instruction |
US7058807B2 (en) | 2002-04-15 | 2006-06-06 | Intel Corporation | Validation of inclusion of a platform within a data center |
US7076669B2 (en) | 2002-04-15 | 2006-07-11 | Intel Corporation | Method and apparatus for communicating securely with a token |
US6782477B2 (en) * | 2002-04-16 | 2004-08-24 | Song Computer Entertainment America Inc. | Method and system for using tamperproof hardware to provide copy protection and online security |
US7127548B2 (en) | 2002-04-16 | 2006-10-24 | Intel Corporation | Control register access virtualization performance improvement in the virtual-machine architecture |
US6820177B2 (en) * | 2002-06-12 | 2004-11-16 | Intel Corporation | Protected configuration space in a protected environment |
US7142674B2 (en) * | 2002-06-18 | 2006-11-28 | Intel Corporation | Method of confirming a secure key exchange |
US7392415B2 (en) | 2002-06-26 | 2008-06-24 | Intel Corporation | Sleep protection |
US6996748B2 (en) | 2002-06-29 | 2006-02-07 | Intel Corporation | Handling faults associated with operation of guest software in the virtual-machine architecture |
US7124327B2 (en) | 2002-06-29 | 2006-10-17 | Intel Corporation | Control over faults occurring during the operation of guest software in the virtual-machine architecture |
US7296267B2 (en) | 2002-07-12 | 2007-11-13 | Intel Corporation | System and method for binding virtual machines to hardware contexts |
EP1795993B1 (en) * | 2002-07-30 | 2018-02-28 | Fujitsu Limited | Method and apparatus for reproducing information using a security module |
WO2004023313A1 (en) | 2002-09-04 | 2004-03-18 | Fraunhofer Crcg, Inc. | Protecting mobile code against malicious hosts cross references to related applications |
FR2845494B1 (fr) * | 2002-10-04 | 2005-08-19 | Canal Plus Technologies | Logiciel et procede d'authentification de celui-ci |
US7165181B2 (en) | 2002-11-27 | 2007-01-16 | Intel Corporation | System and method for establishing trust without revealing identity |
US7073042B2 (en) | 2002-12-12 | 2006-07-04 | Intel Corporation | Reclaiming existing fields in address translation data structures to extend control over memory accesses |
US7149900B2 (en) * | 2002-12-12 | 2006-12-12 | Intel Corporation | Method of defending software from debugger attacks |
US7318235B2 (en) * | 2002-12-16 | 2008-01-08 | Intel Corporation | Attestation using both fixed token and portable token |
US7318141B2 (en) | 2002-12-17 | 2008-01-08 | Intel Corporation | Methods and systems to control virtual machines |
US7793286B2 (en) * | 2002-12-19 | 2010-09-07 | Intel Corporation | Methods and systems to manage machine state in virtual machine operations |
US20040128345A1 (en) * | 2002-12-27 | 2004-07-01 | Robinson Scott H. | Dynamic service registry |
US7900017B2 (en) | 2002-12-27 | 2011-03-01 | Intel Corporation | Mechanism for remapping post virtual machine memory pages |
US20040128465A1 (en) * | 2002-12-30 | 2004-07-01 | Lee Micheil J. | Configurable memory bus width |
US7584354B2 (en) * | 2003-01-31 | 2009-09-01 | Intel Corporation | Implementing portable content protection to secure secrets |
JP4338989B2 (ja) * | 2003-02-20 | 2009-10-07 | パナソニック株式会社 | メモリデバイス |
US8510571B1 (en) | 2003-03-24 | 2013-08-13 | Hoi Chang | System and method for inserting security mechanisms into a software program |
KR100568228B1 (ko) * | 2003-05-20 | 2006-04-07 | 삼성전자주식회사 | 고유번호를 이용한 프로그램 탬퍼 방지 방법과 난독처리된 프로그램 업그레이드 방법, 상기 방법을 위한 장치 |
US7415708B2 (en) * | 2003-06-26 | 2008-08-19 | Intel Corporation | Virtual machine management using processor state information |
US20050044292A1 (en) * | 2003-08-19 | 2005-02-24 | Mckeen Francis X. | Method and apparatus to retain system control when a buffer overflow attack occurs |
US7366914B2 (en) * | 2003-08-29 | 2008-04-29 | Intel Corporation | Source code transformation based on program operators |
US7424709B2 (en) | 2003-09-15 | 2008-09-09 | Intel Corporation | Use of multiple virtual machine monitors to handle privileged events |
US7287197B2 (en) | 2003-09-15 | 2007-10-23 | Intel Corporation | Vectoring an interrupt or exception upon resuming operation of a virtual machine |
US7739521B2 (en) * | 2003-09-18 | 2010-06-15 | Intel Corporation | Method of obscuring cryptographic computations |
US7610611B2 (en) * | 2003-09-19 | 2009-10-27 | Moran Douglas R | Prioritized address decoder |
US7424620B2 (en) * | 2003-09-25 | 2008-09-09 | Sun Microsystems, Inc. | Interleaved data and instruction streams for application program obfuscation |
US8220058B2 (en) * | 2003-09-25 | 2012-07-10 | Oracle America, Inc. | Rendering and encryption engine for application program obfuscation |
US20050069138A1 (en) * | 2003-09-25 | 2005-03-31 | Sun Microsystems, Inc., A Delaware Corporation | Application program obfuscation |
US7353499B2 (en) * | 2003-09-25 | 2008-04-01 | Sun Microsystems, Inc. | Multiple instruction dispatch tables for application program obfuscation |
US7363620B2 (en) * | 2003-09-25 | 2008-04-22 | Sun Microsystems, Inc. | Non-linear execution of application program instructions for application program obfuscation |
US7415618B2 (en) * | 2003-09-25 | 2008-08-19 | Sun Microsystems, Inc. | Permutation of opcode values for application program obfuscation |
US20050080934A1 (en) | 2003-09-30 | 2005-04-14 | Cota-Robles Erik C. | Invalidating translation lookaside buffer entries in a virtual machine (VM) system |
US7237051B2 (en) | 2003-09-30 | 2007-06-26 | Intel Corporation | Mechanism to control hardware interrupt acknowledgement in a virtual machine system |
US7366305B2 (en) | 2003-09-30 | 2008-04-29 | Intel Corporation | Platform and method for establishing trust without revealing identity |
US7177967B2 (en) * | 2003-09-30 | 2007-02-13 | Intel Corporation | Chipset support for managing hardware interrupts in a virtual machine system |
US7636844B2 (en) * | 2003-11-17 | 2009-12-22 | Intel Corporation | Method and system to provide a trusted channel within a computer system for a SIM device |
US20050108534A1 (en) * | 2003-11-19 | 2005-05-19 | Bajikar Sundeep M. | Providing services to an open platform implementing subscriber identity module (SIM) capabilities |
US20050108171A1 (en) * | 2003-11-19 | 2005-05-19 | Bajikar Sundeep M. | Method and apparatus for implementing subscriber identity module (SIM) capabilities in an open platform |
US8156343B2 (en) | 2003-11-26 | 2012-04-10 | Intel Corporation | Accessing private data about the state of a data processing machine from storage that is publicly accessible |
US8037314B2 (en) | 2003-12-22 | 2011-10-11 | Intel Corporation | Replacing blinded authentication authority |
US20050152539A1 (en) * | 2004-01-12 | 2005-07-14 | Brickell Ernie F. | Method of protecting cryptographic operations from side channel attacks |
US7802085B2 (en) | 2004-02-18 | 2010-09-21 | Intel Corporation | Apparatus and method for distributing private keys to an entity with minimal secret, unique information |
US20050216920A1 (en) * | 2004-03-24 | 2005-09-29 | Vijay Tewari | Use of a virtual machine to emulate a hardware device |
US7356735B2 (en) * | 2004-03-30 | 2008-04-08 | Intel Corporation | Providing support for single stepping a virtual machine in a virtual machine environment |
US7620949B2 (en) | 2004-03-31 | 2009-11-17 | Intel Corporation | Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment |
US7490070B2 (en) | 2004-06-10 | 2009-02-10 | Intel Corporation | Apparatus and method for proving the denial of a direct proof signature |
US20050288056A1 (en) * | 2004-06-29 | 2005-12-29 | Bajikar Sundeep M | System including a wireless wide area network (WWAN) module with an external identity module reader and approach for certifying the WWAN module |
US7305592B2 (en) * | 2004-06-30 | 2007-12-04 | Intel Corporation | Support for nested fault in a virtual machine environment |
US7840962B2 (en) * | 2004-09-30 | 2010-11-23 | Intel Corporation | System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time |
US20060075441A1 (en) * | 2004-10-06 | 2006-04-06 | Sony Corporation | Method and system for a personal video recorder comprising multiple removable storage/tuner units |
US8768844B2 (en) * | 2004-10-06 | 2014-07-01 | Sony Corporation | Method and system for content sharing and authentication between multiple devices |
US8146078B2 (en) * | 2004-10-29 | 2012-03-27 | Intel Corporation | Timer offsetting mechanism in a virtual machine environment |
US8924728B2 (en) * | 2004-11-30 | 2014-12-30 | Intel Corporation | Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information |
US7571263B2 (en) * | 2004-12-02 | 2009-08-04 | Hitachi Global Storage Technologies Netherlands B.V. | Apparatus and method for monitoring data storage device for usage and warranty |
US20060137016A1 (en) * | 2004-12-20 | 2006-06-22 | Dany Margalit | Method for blocking unauthorized use of a software application |
US20060136705A1 (en) * | 2004-12-21 | 2006-06-22 | Motorola, Inc. | Multiple stage software verification |
US8533777B2 (en) | 2004-12-29 | 2013-09-10 | Intel Corporation | Mechanism to determine trust of out-of-band management agents |
US7395405B2 (en) | 2005-01-28 | 2008-07-01 | Intel Corporation | Method and apparatus for supporting address translation in a virtual machine environment |
JP4810846B2 (ja) * | 2005-03-15 | 2011-11-09 | 富士ゼロックス株式会社 | プログラムデータの不正利用を阻止するプログラム |
US7620987B2 (en) * | 2005-08-12 | 2009-11-17 | Microsoft Corporation | Obfuscating computer code to prevent an attack |
US7809957B2 (en) | 2005-09-29 | 2010-10-05 | Intel Corporation | Trusted platform module for generating sealed data |
WO2007055169A1 (ja) * | 2005-11-09 | 2007-05-18 | Nec Corporation | 通信端末装置、サーバ端末装置、それらを用いる通信システム |
US8014530B2 (en) | 2006-03-22 | 2011-09-06 | Intel Corporation | Method and apparatus for authenticated, recoverable key distribution with no database secrets |
KR101501418B1 (ko) | 2006-05-09 | 2015-03-10 | 인터디지탈 테크날러지 코포레이션 | 무선 장치에 대한 안전 시간 기능 |
US7818799B2 (en) * | 2006-05-30 | 2010-10-19 | Microsoft Corporation | Tamper response mechanism |
US20080104704A1 (en) * | 2006-10-27 | 2008-05-01 | Ravikumar Mohandas | Security for physically unsecured software elements |
US8286138B2 (en) * | 2007-01-30 | 2012-10-09 | Microsoft Corporation | Multi-threaded detection of a game software debugger |
US20110047630A1 (en) * | 2007-02-09 | 2011-02-24 | Agency For Science, Technology And Research | Method and system for tamper proofing a system of interconnected electronic devices |
US8010773B2 (en) * | 2008-06-24 | 2011-08-30 | Microsoft Corporation | Hardware constrained software execution |
JP2010039891A (ja) * | 2008-08-07 | 2010-02-18 | Nec Corp | 情報処理装置、プログラム実行方法、プログラムおよび情報処理システム |
KR101272028B1 (ko) * | 2011-08-18 | 2013-06-07 | 정지혜 | 해킹 여부 정보를 제공하는 통신 단말기 및 그 제어방법과, 그 통신 단말기를 포함하는 해킹 방지 시스템 및 그 제어방법 |
US8914634B2 (en) | 2012-04-10 | 2014-12-16 | Western Digital Technologies, Inc. | Digital rights management system transfer of content and distribution |
US8831217B2 (en) | 2012-04-10 | 2014-09-09 | Western Digital Technologies, Inc. | Digital rights management system and methods for accessing content from an intelligent storage |
US9792439B2 (en) | 2012-09-19 | 2017-10-17 | Nxp B.V. | Method and system for securely updating firmware in a computing device |
DE102014203095A1 (de) * | 2014-02-20 | 2015-08-20 | Rohde & Schwarz Gmbh & Co. Kg | Funkgerät-System und Verfahren mit Zeitparameter-Auswertung |
US10079686B2 (en) | 2015-07-29 | 2018-09-18 | International Business Machines Corporation | Privacy-preserving attribute-based credentials |
KR101977008B1 (ko) * | 2019-01-07 | 2019-05-09 | 동양대학교 산학협력단 | 시간정보 왜곡보정이 가능한 타임스탬프를 이용한 데이터 숨김방법 |
Family Cites Families (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4262329A (en) * | 1978-03-27 | 1981-04-14 | Computation Planning, Inc. | Security system for data processing |
US4723284A (en) * | 1983-02-14 | 1988-02-02 | Prime Computer, Inc. | Authentication system |
US4947430A (en) | 1987-11-23 | 1990-08-07 | David Chaum | Undeniable signature systems |
US4926480A (en) | 1983-08-22 | 1990-05-15 | David Chaum | Card-computer moderated systems |
US4847902A (en) | 1984-02-10 | 1989-07-11 | Prime Computer, Inc. | Digital computer system for executing encrypted programs |
JPS619740A (ja) * | 1984-06-26 | 1986-01-17 | Matsushita Electric Ind Co Ltd | プログラムの領域はみ出し検出装置 |
EP0175487A3 (en) * | 1984-08-23 | 1989-03-08 | Btg International Limited | Software protection device |
GB2197506A (en) * | 1986-10-27 | 1988-05-18 | Burr Brown Ltd | Providing and handling break points in a software monitor |
US5224160A (en) * | 1987-02-23 | 1993-06-29 | Siemens Nixdorf Informationssysteme Ag | Process for securing and for checking the integrity of the secured programs |
ES2041712T3 (es) | 1987-03-04 | 1993-12-01 | Siemens Nixdorf Informationssysteme Ag | Sistema de intercambio de datos. |
US5347579A (en) | 1989-07-05 | 1994-09-13 | Blandford Robert R | Personal computer diary |
US5136643A (en) * | 1989-10-13 | 1992-08-04 | Fischer Addison M | Public/key date-time notary facility |
US5081675A (en) | 1989-11-13 | 1992-01-14 | Kitti Kittirutsunetorn | System for protection of software in memory against unauthorized use |
US5267312A (en) | 1990-08-06 | 1993-11-30 | Nec Home Electronics, Ltd. | Audio signal cryptographic system |
US5265164A (en) | 1991-10-31 | 1993-11-23 | International Business Machines Corporation | Cryptographic facility environment backup/restore and replication in a public key cryptosystem |
US5421006A (en) | 1992-05-07 | 1995-05-30 | Compaq Computer Corp. | Method and apparatus for assessing integrity of computer system software |
US5359659A (en) * | 1992-06-19 | 1994-10-25 | Doren Rosenthal | Method for securing software against corruption by computer viruses |
US5343527A (en) | 1993-10-27 | 1994-08-30 | International Business Machines Corporation | Hybrid encryption method and system for protecting reusable software components |
US5469507A (en) * | 1994-03-01 | 1995-11-21 | International Business Machines Corporation | Secure communication and computation in an insecure environment |
US5483649A (en) * | 1994-07-01 | 1996-01-09 | Ybm Technologies, Inc. | Personal computer security system |
US5535276A (en) * | 1994-11-09 | 1996-07-09 | Bell Atlantic Network Services, Inc. | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography |
JPH0855023A (ja) * | 1994-07-25 | 1996-02-27 | Motorola Inc | データ処理システムおよびその方法 |
US5684875A (en) | 1994-10-21 | 1997-11-04 | Ellenberger; Hans | Method and apparatus for detecting a computer virus on a computer |
US5668874A (en) * | 1995-02-28 | 1997-09-16 | Lucent Technologies Inc. | Identification card verification system and method |
US5559960A (en) | 1995-04-21 | 1996-09-24 | Lettvin; Jonathan D. | Software anti-virus facility |
US5652793A (en) | 1995-05-08 | 1997-07-29 | Nvidia Corporation | Method and apparatus for authenticating the use of software |
US5768382A (en) | 1995-11-22 | 1998-06-16 | Walker Asset Management Limited Partnership | Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic and other protocols |
WO1997004394A1 (en) * | 1995-07-14 | 1997-02-06 | Christopher Nathan Drake | Computer software authentication, protection, and security system |
US6006328A (en) * | 1995-07-14 | 1999-12-21 | Christopher N. Drake | Computer software authentication, protection, and security system |
US5638446A (en) | 1995-08-28 | 1997-06-10 | Bell Communications Research, Inc. | Method for the secure distribution of electronic files in a distributed environment |
US5822431A (en) * | 1996-01-19 | 1998-10-13 | General Instrument Corporation Of Delaware | Virtual authentication network for secure processors |
US5892899A (en) * | 1996-06-13 | 1999-04-06 | Intel Corporation | Tamper resistant methods and apparatus |
US6049609A (en) | 1997-08-06 | 2000-04-11 | Intel Corporation | Cell array providing non-persistent secret storage through a mutation cycle |
US5966306A (en) * | 1997-07-07 | 1999-10-12 | Motorola Inc. | Method for verifying protocol conformance of an electrical interface |
-
1997
- 1997-09-05 US US08/924,740 patent/US6205550B1/en not_active Expired - Lifetime
-
1998
- 1998-07-17 KR KR10-2003-7012888A patent/KR20030085086A/ko not_active Ceased
- 1998-07-17 JP JP2000511282A patent/JP4544739B2/ja not_active Expired - Lifetime
- 1998-07-17 KR KR10-2003-7012887A patent/KR20030085085A/ko not_active Ceased
- 1998-07-17 KR KR10-2000-7002387A patent/KR100405574B1/ko not_active Expired - Fee Related
- 1998-07-17 AU AU84957/98A patent/AU8495798A/en not_active Abandoned
- 1998-07-17 EP EP98935776A patent/EP1020049A4/en not_active Withdrawn
- 1998-07-17 WO PCT/US1998/014858 patent/WO1999013613A1/en not_active Application Discontinuation
Also Published As
Publication number | Publication date |
---|---|
EP1020049A1 (en) | 2000-07-19 |
WO1999013613A1 (en) | 1999-03-18 |
KR20030085086A (ko) | 2003-11-01 |
AU8495798A (en) | 1999-03-29 |
EP1020049A4 (en) | 2000-10-11 |
KR20030085085A (ko) | 2003-11-01 |
US6205550B1 (en) | 2001-03-20 |
JP4544739B2 (ja) | 2010-09-15 |
JP2001516908A (ja) | 2001-10-02 |
KR20010023733A (ko) | 2001-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100405574B1 (ko) | 위조방지 방법 및 장치 | |
KR100482775B1 (ko) | 위조방지 방법 및 장치 | |
KR100479681B1 (ko) | 스크램블된 콘텐츠를 위한 위조방지 플레이어 | |
Aucsmith | Tamper resistant software: An implementation | |
US7707429B2 (en) | System and method to proactively detect software tampering | |
EP0900488B1 (en) | Tamper resistant methods and apparatus | |
US8332652B2 (en) | Computing device that securely runs authorized software | |
JP2710754B2 (ja) | チップ・カードのキーを保護する装置 | |
JP5097130B2 (ja) | 情報端末、セキュリティデバイス、データ保護方法及びデータ保護プログラム | |
WO1999031842A1 (en) | Conditional use private key distribution | |
EP1449048B1 (en) | Method, system, device and computer program for mutual authentication and content protection | |
US20060253714A1 (en) | Information processor, tamper-proof method, and tamper-proof program | |
JPWO2008093690A1 (ja) | 分散情報生成装置、復元装置、復元結果検証装置、秘密情報分散システム、方法およびプログラム | |
US7770219B2 (en) | Method and system for using shared secrets to protect access to testing keys for set-top box | |
CN117216813B (zh) | 用于读写数据的方法、装置和安全芯片 | |
AU2004218702B8 (en) | Method for verifying integrity on an apparatus | |
AU774198B2 (en) | Apparatus for tamper resistance | |
MXPA00005079A (en) | Method and apparatus for controlling access to confidential data | |
MXPA00005081A (en) | An apparatus for providing a secure processing environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
PA0105 | International application |
Patent event date: 20000306 Patent event code: PA01051R01D Comment text: International Patent Application |
|
PA0201 | Request for examination | ||
PG1501 | Laying open of application | ||
E902 | Notification of reason for refusal | ||
PE0902 | Notice of grounds for rejection |
Comment text: Notification of reason for refusal Patent event date: 20020123 Patent event code: PE09021S01D |
|
AMND | Amendment | ||
E601 | Decision to refuse application | ||
PE0601 | Decision on rejection of patent |
Patent event date: 20030107 Comment text: Decision to Refuse Application Patent event code: PE06012S01D Patent event date: 20020123 Comment text: Notification of reason for refusal Patent event code: PE06011S01I |
|
J201 | Request for trial against refusal decision | ||
PJ0201 | Trial against decision of rejection |
Patent event date: 20030407 Comment text: Request for Trial against Decision on Refusal Patent event code: PJ02012R01D Patent event date: 20030107 Comment text: Decision to Refuse Application Patent event code: PJ02011S01I Appeal kind category: Appeal against decision to decline refusal Decision date: 20031020 Appeal identifier: 2003101001362 Request date: 20030407 |
|
AMND | Amendment | ||
PB0901 | Examination by re-examination before a trial |
Comment text: Amendment to Specification, etc. Patent event date: 20030507 Patent event code: PB09011R02I Comment text: Request for Trial against Decision on Refusal Patent event date: 20030407 Patent event code: PB09011R01I Comment text: Amendment to Specification, etc. Patent event date: 20020624 Patent event code: PB09011R02I |
|
E902 | Notification of reason for refusal | ||
PE0902 | Notice of grounds for rejection |
Comment text: Notification of reason for refusal Patent event date: 20030619 Patent event code: PE09021S01D |
|
A107 | Divisional application of patent | ||
PA0104 | Divisional application for international application |
Comment text: Divisional Application for International Patent Patent event code: PA01041R01D Patent event date: 20030930 |
|
B701 | Decision to grant | ||
PB0701 | Decision of registration after re-examination before a trial |
Patent event date: 20031020 Comment text: Decision to Grant Registration Patent event code: PB07012S01D Patent event date: 20030526 Comment text: Transfer of Trial File for Re-examination before a Trial Patent event code: PB07011S01I |
|
GRNT | Written decision to grant | ||
PR0701 | Registration of establishment |
Comment text: Registration of Establishment Patent event date: 20031103 Patent event code: PR07011E01D |
|
PR1002 | Payment of registration fee |
Payment date: 20031104 End annual number: 3 Start annual number: 1 |
|
PG1601 | Publication of registration | ||
PR1001 | Payment of annual fee |
Payment date: 20061027 Start annual number: 4 End annual number: 4 |
|
PR1001 | Payment of annual fee |
Payment date: 20071105 Start annual number: 5 End annual number: 5 |
|
PR1001 | Payment of annual fee |
Payment date: 20081030 Start annual number: 6 End annual number: 6 |
|
FPAY | Annual fee payment |
Payment date: 20091028 Year of fee payment: 7 |
|
PR1001 | Payment of annual fee |
Payment date: 20091028 Start annual number: 7 End annual number: 7 |
|
LAPS | Lapse due to unpaid annual fee | ||
PC1903 | Unpaid annual fee |