Patents by Inventor Peer Wichmann

Peer Wichmann has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10628562
    Abstract: The invention relates to a method for protecting a computer program from being influenced by an invasive program or by manipulation software for manipulating computer programs on a computer system comprising a processor, a main storage unit, and a storage medium. The method involves the Kerckhoffs's principle such that the protected computer program is freely accessible and can be read by an invasive program or manipulation software. Parts of the protected computer program are provided multiple times in the program code of the protected computer program as a result of the specialization of the computer program. Parts of the computer program are encrypted in order to prevent a statistical analysis of the computer program without the processor running the computer program, wherein a key which is required to decrypt the encrypted parts of the computer program is stored in a protected key storage unit which communicates with the computer.
    Type: Grant
    Filed: February 24, 2015
    Date of Patent: April 21, 2020
    Assignee: WIBU-Systems AG
    Inventors: Peer Wichmann, Oliver Winzenried, Ruediger Kuegler
  • Publication number: 20170068804
    Abstract: The invention relates to a method for protecting a computer program from being influenced by an invasive program or by manipulation software for manipulating computer programs on a computer system comprising a processor, a main storage unit, and a storage medium. The method involves the Kerckhoffs's principle such that the protected computer program is freely accessible and can be read by an invasive program or manipulation software. Parts of the protected computer program are provided multiple times in the program code of the protected computer program as a result of the specialization of the computer program. Parts of the computer program are encrypted in order to prevent a statistical analysis of the computer program without the processor running the computer program, wherein a key which is required to decrypt the encrypted parts of the computer program is stored in a protected key storage unit which communicates with the computer.
    Type: Application
    Filed: February 24, 2015
    Publication date: March 9, 2017
    Inventors: Peer WICHMANN, Oliver WINZENRIED, Ruediger KUEGLER
  • Patent number: 9355229
    Abstract: A Method for protecting an application program executable on a computer against reverse engineering, said application is created to run with at least one selected dynamic link library (DLL) on said computer, comprises the steps of: adding a specific library loader to the executable application program, said loader either contains or has access to said dynamic link library; setting modified references to said dynamic link library such that upon loading said application program and said loader into the main memory of said computer, said dynamic link library is initialized by said library loader instead of the operating system; The library loader and the pseudo-statically linked library could be embedded into the application program, thereby using unused space within the application. The protected application presents itself as a monolithic application without the vulnerable interface to a DLL.
    Type: Grant
    Filed: January 13, 2012
    Date of Patent: May 31, 2016
    Assignee: WIBU-Systems AG
    Inventors: Peer Wichmann, Alexander Schmitt
  • Publication number: 20150033354
    Abstract: A Method for protecting an application program executable on a computer against reverse engineering, said application is created to run with at least one selected dynamic link library (DLL) on said computer, comprises the steps of: adding a specific library loader to the executable application program, said loader either contains or has access to said dynamic link library; setting modified references to said dynamic link library such that upon loading said application program and said loader into the main memory of said computer, said dynamic link library is initialized by said library loader instead of the operating system; The library loader and the pseudo-statically linked library could be embedded into the application program, thereby using unused space within the application. The protected application presents itself as a monolithic application without the vulnerable interface to a DLL.
    Type: Application
    Filed: January 13, 2012
    Publication date: January 29, 2015
    Inventors: Peer Wichmann, Alexander Schmitt
  • Patent number: 8844049
    Abstract: A method for coupling protected digital data object, for example an application program, and a specified computer, which allows for, if desired, individual components of the computer to be modified. A cryptographic key is generated on the basis of current components of a computer in order to decrypt an encrypted, computer-specific authorization code for executing a protected digital data object on the computer. The computer-specific authorization code is encrypted with a key based on original components of the computer. The key can be determined from the current components of the computer even if they are different from the original components of the computer.
    Type: Grant
    Filed: April 20, 2012
    Date of Patent: September 23, 2014
    Assignee: WIBU-Systems AG
    Inventors: Peer Wichmann, Udo Reuther
  • Patent number: 8490191
    Abstract: Method for protecting computer software by detecting an attack of an intruding program interfering with the execution of said protected software on a computer system with a processor and at least a processor memory, wherein the computer software to be protected communicates with a license container containing a license for using and executing the protected computer software and containing at least one cryptographic key, wherein the license container provides licenses and cryptographic keys for the protected software to protect its usage and its integrity, and wherein the protected computer software is at least partly encrypted and uses the associated cryptographic keys to decrypt said protected software for executing comprises the following steps: during execution of the protected software, analyzing the behavior of the protected software and/or the execution environment of the protected software on the computer system, and searching for patterns of an intrusion or an intruding program, detecting an intrusion
    Type: Grant
    Filed: June 9, 2007
    Date of Patent: July 16, 2013
    Assignee: WIBU-Systems AG
    Inventors: Ruediger Kuegler, Peer Wichmann, Oliver Winzenried, Marcellus Buchheit
  • Publication number: 20120272052
    Abstract: A method for coupling protected digital data object, for example an application program, and a specified computer, which allows for, if desired, individual components of the computer to be modified. A cryptographic key is generated on the basis of current components of a computer in order to decrypt an encrypted, computer-specific authorization code for executing a protected digital data object on the computer. The computer-specific authorization code is encrypted with a key based on original components of the computer. The key can be determined from the current components of the computer even if they are different from the original components of the computer.
    Type: Application
    Filed: April 20, 2012
    Publication date: October 25, 2012
    Inventors: Peer Wichmann, Udo Reuther
  • Publication number: 20100017879
    Abstract: Method for protecting computer software by detecting an attack of an intruding program interfering with the execution of said protected software on a computer system with a processor and at least a processor memory, wherein the computer software to be protected communicates with a license container containing a license for using and executing the protected computer software and containing at least one cryptographic key, wherein the license container provides licenses and cryptographic keys for the protected software to protect its usage and its integrity, and wherein the protected computer software is at least partly encrypted and uses the associated cryptographic keys to decrypt said protected software for executing comprises the following steps: during execution of the protected software, analyzing the behavior of the protected software and/or the execution environment of the protected software on the computer system, and searching for patterns of an intrusion or an intruding program, detecting an intrusion
    Type: Application
    Filed: June 9, 2007
    Publication date: January 21, 2010
    Applicant: Wibu-Systems AG
    Inventors: Ruediger Kuegler, Peer Wichmann, Oliver Winzenried, Marcellus Buchheit