USE OF HARDWARE-SUPPORTED SECURED ISOLATED AREA FOR PREVENTING PIRACY AND FRAUD IN ELECTRONIC DEVICES Russian patent published in 2021 - IPC G06F21/74 

Abstract RU 2744849 C2

FIELD: computer engineering.
SUBSTANCE: invention relates to computer engineering. The method for protecting an electronic device against piracy and fraud consists in storing the first part of an application in the computer memory of an electronic device; in storing the second part of the application in the secured isolated area of the computer memory of an electronic device, with the second part of the application comprising an encrypted part and a part with an open text; a secure encrypted communication channel with the server is installed using an open text part; and data is transmitted to the server using a secure encrypted communication channel; the decryption key from the server via a secure encrypted communication channel is received; the encrypted part using the decryption key is decrypted; and the first part of the application from the computer memory of the electronic device and both of the open-text and encrypted part two of the application from the secured isolated area of computer memory as a reaction to decrypting the encrypted part is executed.
EFFECT: technical result consists in protecting the electronic device against piracy and fraud.

15 cl, 11 dwg

Similar patents RU2744849C2

Title Year Author Number
PROTECTING BINARY FILES OF TYPICAL COMMERCIAL PROGRAMS FROM PIRACY USING HARDWARE ENCLAVES 2020
  • Ge, Xinyang
  • Cui, Weidong
  • Niu, Ben
  • Chen, Ling Tony
RU2812867C1
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING ENCRYPTION KEY 2017
  • Novak, Mark, F.
RU2756048C2
IMPLEMENTING SECURE INFORMATION EXCHANGE IN RUNTIME SYSTEM 2012
  • Rot Gregori B.
  • Krakhen Erik D.
  • Ber Grem D.
  • Brenduajn Erik Dzh.
  • Fitch Natan R.
RU2584570C2
METHOD OF SHARING THE PROTECTED DATA 2017
  • Golubev Andrej Anatolevich
  • Lebedev Anatolij Nikolaevich
RU2659730C1
SECURE DATA HANDLING BY VIRTUAL MACHINE 2013
  • Koster Robert Paul
  • Petkovich Milan
  • Deng Mina
RU2648941C2
METHODS AND SYSTEMS FOR CRYPTOGRAPHIC PROTECTION OF PROTECTED CONTENT 2002
  • Inglehnd Pol
  • Pejnado Markus
  • Uilt Nikolas P.
RU2308077C2
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING SIGNATURE KEY 2017
  • Novak, Mark, F.
RU2756040C2
NETWORK MANAGEMENT OF DATA PROTECTION KITS 2013
  • Novak Mark F.
  • Lejmen Endryu Dzhon
  • Nyustrem Magnus
  • Tom Stefan
RU2640653C2
SYSTEM AND METHODS FOR DECRYPTING NETWORK TRAFFIC IN A VIRTUALIZED ENVIRONMENT 2017
  • Caragea Radu
RU2738021C2
TRUSTED ENTITY BASED ANTI-CHEATING MECHANISM 2010
  • Rehj Kennet D.
  • Alkouv Dzhejms M.
  • Makmajkl Lonni Din
  • L'Juis Natan T.
  • Shnell' Patrik
RU2541879C2

RU 2 744 849 C2

Authors

Chen, Ling Tony

Dates

2021-03-16Published

2017-05-18Filed