Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for distributing software application and encryption program for white-box implementation

A software application, program technology, applied in the field of data processing

Inactive Publication Date: 2018-12-14
NXP BV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the disadvantage is that such applications run in an unprotected environment, where the most realistic attack model is the so-called white-box attack model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for distributing software application and encryption program for white-box implementation
  • Method for distributing software application and encryption program for white-box implementation
  • Method for distributing software application and encryption program for white-box implementation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In general, a method for distributing application software with an encryption procedure to protect the application software is provided. According to the method, application software is distributed without white-box tables, binding keys, derived encoding keys, and other user-specific components. Application software may be distributed over the Internet using, for example, one of the commonly used distribution media. During installation of the program, or when the program is used for the first time, the program may connect to a backend server in the cloud, for example, to receive the user-specific white box form, derived encoding key, and binding key. These are unique to each user. After successful registration or authentication, the user will receive the application from the backend server. This allows application software to be distributed without having to create a program for every user who wants to install the application software.

[0037] In one embodiment, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for distributing a software application having an encryption program is provided. In the method, the encryption program is generated for securing the software application, the encryption program being implemented by applying user diversification data that is unique to a user device having the encryption program and software application. The encryption program with the software applicationis distributed to a plurality of users without including the user diversification data. The user diversification data is made available for downloading from a computer server by each of the pluralityof users. The user diversification data is downloaded separately from the encryption program, and the user diversification data is unique to, and generated specifically for, each of the plurality ofusers. This allows the distribution of application software without having to create a unique program for every user.

Description

technical field [0001] The present disclosure relates generally to data processing and, more particularly, to methods for distributing software applications and encryption programs of white-box encryption implementations. Background technique [0002] More and more functionality in electronic devices is implemented as software rather than hardware. The advantage of software is that it is less expensive, more scalable, easier to personalize, and easier to update. The same is true for security-sensitive applications. An important development for security-sensitive applications is the addition of Host Card Emulation (HCE) to the Android operating system used on many mobile devices. This makes it possible to fully implement contactless payment cards, such as transport payment cards and other smart cards, through applications running on the mobile phone's applications processor. However, the disadvantage is that such applications run in an unprotected environment, where the mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/54
CPCG06F21/54G06F21/12H04L9/002H04L2209/16H04L63/0428H04L9/0822G06F8/60H04L2209/80G06Q20/352
Inventor 简·胡格布鲁格W·P·A·J·米歇尔斯乔普·威廉·波斯
Owner NXP BV