会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • IMPLEMENTATIONS OF PROGRAM RUNTIME CHECKS
    • 方案运行检查的执行情况
    • US20100192026A1
    • 2010-07-29
    • US12360259
    • 2009-01-27
    • Martin AbadiUlfar ErlingssonDaniel LuchaupMarcus Peinado
    • Martin AbadiUlfar ErlingssonDaniel LuchaupMarcus Peinado
    • G06F11/08
    • G06F11/08
    • Runtime checks on a program may be used to determine whether a pointer points to a legitimate target before the pointer is dereferenced. Legitimate addresses, such as address-taken local variables (ATLVs), global variables, heap locations, functions, etc., are tracked, so that the legitimate targets of pointers are known. The program may be transformed so that, prior to dereferencing a pointer, the pointer is checked to ensure that it points to a legitimate address. If the pointer points to a legitimate address, then the dereferencing may proceed. Otherwise, an error routine may be invoked. One example way to keep track of legitimate addresses is to group address-taken variables together within a specific range or ranges of memory addresses, and to check that a pointer has a value within that range prior to dereferencing the pointer. However, addresses may be tracked in other ways.
    • 在指针取消引用之前,可以使用对程序的运行时检查来确定指针是否指向合法目标。 跟踪合法的地址,例如地址采取的局部变量(ATLV),全局变量,堆位置,函数等,以便指针的合法目标是已知的。 程序可以被转换,使得在取消引用指针之前,检查指针以确保它指向合法的地址。 如果指针指向合法的地址,则可以进行取消引用。 否则,可以调用错误例程。 跟踪合法地址的一个示例方法是将地址采集的变量组合在一个特定的存储器地址范围或范围内,并在取消引用指针之前检查指针是否具有该范围内的值。 但是,地址可以以其他方式跟踪。
    • 5. 发明授权
    • Determining target types for generic pointers in source code
    • 确定源代码中通用指针的目标类型
    • US09329845B2
    • 2016-05-03
    • US12477954
    • 2009-06-04
    • Weidong CuiMarcus Peinado
    • Weidong CuiMarcus Peinado
    • G06F9/45
    • G06F8/434
    • A system described herein includes a receiver component that receives source code from a computer-readable medium of a computing device and a static analysis component that executes a points-to analysis algorithm over the source code to cause generation of a points-to graph, wherein the points-to graph is a directed graph that comprises a plurality of nodes and a plurality of edges, wherein nodes of the points-to graph represent pointers in the source code and edges represent inclusion relationships in the source code. The system also includes an inference component that infers target types for generic pointers in the source code based at least in part upon known type definitions and global variables in the source code.
    • 本文描述的系统包括从计算设备的计算机可读介质接收源代码的接收器组件和在源代码上执行点对分析算法以产生点对图的静态分析组件,其中 点对图是包括多个节点和多个边缘的有向图,其中点对图的节点表示源代码中的指针,边缘表示源代码中的包含关系。 该系统还包括至少部分地基于源代码中的已知类型定义和全局变量来推断源代码中的通用指针的目标类型的推理组件。
    • 10. 发明授权
    • Protection of content stored on portable memory from unauthorized usage
    • 保护存储在便携式存储器上的内容免于未经授权的使用
    • US07689791B2
    • 2010-03-30
    • US11064348
    • 2005-02-22
    • Marcus Peinado
    • Marcus Peinado
    • G06F12/14
    • G06F21/10
    • A device for securely recording protected content to a portable memory, and for reading the protected content therefrom. The device includes a feature that makes it adapted to read or write specially-configured portable memories that are incompatible with standard read/write devices. For example, the device may be designed to work with memories having an unusual shape or size, or may manipulate the data in a non-standard way before storing it on the memory. The read/write devices are trusted components that will only handle the protected content in accordance with rules governing the content. The feature included in the device is preferably a proprietary and/or hardware feature, so that counterfeit devices incorporating the feature cannot be built without overcoming economic and/or legal hurdles. Because of the hurdles to building devices compatible with the specially-configured portable memory, protected content can be transferred to such a memory with reasonable assurance that the content will not be widely copied.
    • 一种用于将受保护内容安全地记录到便携式存储器并用于从其读取受保护内容的装置。 该设备包括一个功能,使其适合于读取或写入与标准读/写设备不兼容的特殊配置的便携式存储器。 例如,设备可以被设计为与具有不寻常形状或尺寸的存储器一起工作,或者可以在将其存储在存储器之前以非标准方式操纵数据。 读/写设备是只能根据管理内容的规则处理受保护内容的受信任组件。 设备中包括的特征优选地是专有和/或硬件特征,使得并入该特征的假冒设备不能克服经济和/或法律障碍。 由于构建与特殊配置的便携式存储器兼容的设备的障碍,受保护的内容可以被合理地保证内容不会被广泛地复制到这样的存储器中。