18032110. MONITORING RANGE DETERMINATION DEVICE, MONITORING RANGE DETERMINATION METHOD, AND COMPUTER READABLE MEDIUM simplified abstract (NEC Corporation)

From WikiPatents
Jump to navigation Jump to search

MONITORING RANGE DETERMINATION DEVICE, MONITORING RANGE DETERMINATION METHOD, AND COMPUTER READABLE MEDIUM

Organization Name

NEC Corporation

Inventor(s)

Yuto Hayaki of Tokyo (JP)

Norio Yamagaki of Tokyo (JP)

MONITORING RANGE DETERMINATION DEVICE, MONITORING RANGE DETERMINATION METHOD, AND COMPUTER READABLE MEDIUM - A simplified explanation of the abstract

This abstract first appeared for US patent application 18032110 titled 'MONITORING RANGE DETERMINATION DEVICE, MONITORING RANGE DETERMINATION METHOD, AND COMPUTER READABLE MEDIUM

Simplified Explanation

The patent application describes a device that monitors software for tampering by embedding tamper detection features and calling functions within the software binary. The device includes an input/output unit, a CFG generation unit, and an allowed list creation unit.

  • The input/output unit receives input of the software binary and embedded tamper detection features.
  • The CFG generation unit generates a Control Flow Graph (CFG) based on the software binary.
  • The allowed list creation unit determines the monitoring range for the tamper detection feature calling functions based on the CFG.

Potential applications of this technology:

  • Software security: The device can be used to monitor software for tampering, ensuring the integrity and security of the software.
  • Anti-piracy measures: By embedding tamper detection features, the device can detect and prevent unauthorized copying or modification of software.
  • Digital rights management: The device can be used to protect digital content by monitoring the software used to access and distribute the content.

Problems solved by this technology:

  • Tampering detection: The device provides a mechanism to detect any unauthorized modifications or tampering of the software.
  • Software integrity: By monitoring the tamper detection feature calling functions, the device ensures the integrity of the software and prevents any malicious activities.
  • Protection against piracy: The embedded tamper detection features help in preventing unauthorized copying or modification of the software.

Benefits of this technology:

  • Enhanced software security: The device provides an additional layer of security by monitoring the software for tampering.
  • Improved software integrity: By detecting any tampering attempts, the device ensures the integrity of the software and prevents any malicious activities.
  • Protection against piracy: The embedded tamper detection features help in preventing unauthorized copying or modification of the software, protecting the intellectual property rights of the software developers.


Original Abstract Submitted

A device includes: an input/output unit configured to receive input of the binary of the software to be monitored in which a tamper detection feature and tamper detection feature calling functions are embedded; a CFG generation unit configured to generate a CFG based on the binary; and an allowed list creation unit configured to determine the monitoring range for the tamper detection feature calling functions based on the CFG. The allowed list creation unit sequentially selects the tamper detection feature calling functions on the CFG, adds a node to the monitoring range for the selected tamper detection feature calling functions according to a predetermined rule, searches for the tamper detection feature calling function that may be executed next to the added node according to the predetermined rule, and adds the found tamper detection feature calling function to the monitoring range for the selected tamper detection feature calling functions.