×

Detection and identification methods for software

  • US 7,287,159 B2
  • Filed: 04/01/2004
  • Issued: 10/23/2007
  • Est. Priority Date: 04/01/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for creating a superfingerprint for identifying a protected software comprising:

  • creating a superfingerprint for said protected software by;

    executing said protected software at least once;

    in each execution, using a supervising program, selecting specified portions of the executing image of at least one of said executing software and of results of executing said protected software;

    in each execution, using a supervising program, performing computations on said selected portions to obtain a collection of fingerprints; and

    combining, using the supervising program, said collections of fingerprints found in each execution into the superfingerprint of said protected software according to a combining rule;

    at a later time, detecting execution of an unidentified software; and

    using the superfingerprint of the protected software to identify the executing unidentified software, where the executing unidentified software is identified as the protected software using the superfingerprint even if the executing unidentified software and the protected software are not exactly the same by;

    selecting by a supervising program specified portions of the executing image of at least one of said executing unidentified software and of the results of executing said executing unidentified first software on each execution;

    performing by said supervising program specified computations on said selected portions to obtain a collection of fingerprints from the executing unidentified software;

    comparing said collection of fingerprints from the executing unidentified software to a previously computed superfingerprint of the protected software to determine whether there is an approximate match; and

    declaring said the executing unidentified software to be the same as said the protected software if an approximate match is found.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×