会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 22. 发明申请
    • SYSTEM AND METHOD FOR CALL PATH ENFORCEMENT
    • 用于呼叫路径执行的系统和方法
    • US20110047622A1
    • 2011-02-24
    • US12546520
    • 2009-08-24
    • Ginger M. MylesSrinivas VedulaGianpaolo FasoliJulien LerougeTanya Michelle LattnerAugustin J. Farrugia
    • Ginger M. MylesSrinivas VedulaGianpaolo FasoliJulien LerougeTanya Michelle LattnerAugustin J. Farrugia
    • G06F21/22G06F9/45G06F9/46
    • G06F21/54G06F9/4484G06F9/544G06F9/545
    • Disclosed herein are systems, computer-implemented methods, and computer-readable storage media for call path enforcement. The method includes tracking, during run-time, a run-time call order for a series of function calls in a software program, and when executing a protected function call during run-time, allowing or causing proper execution of a protected function call only if the run-time call order matches a predetermined order. The predetermined order can be an expected run-time call order based on a programmed order of function calls in the software program. The method can include maintaining an evolving value associated with the run-time call order and calling the protected function by passing the evolving value and function parameters corrupted based on the evolving value. The protected function uncorrupts the corrupted parameters based on the passed evolving value and an expected predetermined call order. A buffer containing the uncorrupted parameters can replace the corrupted parameters.
    • 本文公开了用于呼叫路径实施的系统,计算机实现的方法和计算机可读存储介质。 该方法包括在运行期间跟踪软件程序中一系列函数调用的运行时调用顺序,以及在运行时执行受保护函数调用时,只允许或导致仅受保护函数调用的正确执行 如果运行时间调用顺序与预定顺序相匹配。 预定顺序可以是基于软件程序中的功能调用的编程顺序的期望的运行时呼叫顺序。 该方法可以包括维护与运行时呼叫顺序相关联的演进值,并通过传递基于演进值而破坏的演进值和功能参数来调用受保护功能。 受保护的功能基于传递的演进值和预期的预定呼叫顺序来破坏已损坏的参数。 包含未受损参数的缓冲区可以替换损坏的参数。
    • 26. 发明申请
    • DEVICE-INDEPENDENT MANAGEMENT OF CRYPTOGRAPHIC INFORMATION
    • 独立管理信息的设备独立性
    • US20130003977A1
    • 2013-01-03
    • US13474697
    • 2012-05-17
    • Augustin J. FarrugiaGianpaolo FasoliJean-Francois Riendeau
    • Augustin J. FarrugiaGianpaolo FasoliJean-Francois Riendeau
    • H04L9/08
    • Some embodiments provide an account-based DRM system for distributing content. The system includes several devices that are associated with an account and a set of DRM computers that receives a request to access a piece of content on the devices associated with the account. The DRM computer set then generates a several keys for the devices, where each particular key of each particular device allows the particular device to access the piece of content on the particular device. In some embodiments, the DRM computer set sends the content and keys to one device (e.g., a computer), which is used to distribute the content and the key(s) to the other devices associated with the account. In some embodiments, the DRM computer set individually encrypts each key in a format that is used during its transport to its associated device and during its use on this device.
    • 一些实施例提供用于分发内容的基于帐户的DRM系统。 该系统包括与帐户相关联的若干设备和一组DRM计算机,其接收访问与该帐户相关联的设备上的一条内容的请求。 DRM计算机组然后生成用于设备的几个密钥,其中每个特定设备的每个特定密钥允许特定设备访问特定设备上的内容。 在一些实施例中,DRM计算机组将内容和密钥发送到一个设备(例如,计算机),其用于将内容和密钥分发到与该帐户相关联的其他设备。 在一些实施例中,DRM计算机集合以其在其传输到其关联设备期间以及在其在该设备上的使用期间使用的格式单独地加密每个密钥。
    • 27. 发明授权
    • Use of media storage structure with multiple pieces of content in a content-distribution system
    • 在内容分发系统中使用具有多条内容的媒体存储结构
    • US08306918B2
    • 2012-11-06
    • US11249123
    • 2005-10-11
    • Augustin J. FarrugiaThomas DowdyGianpaolo Fasoli
    • Augustin J. FarrugiaThomas DowdyGianpaolo Fasoli
    • G06F21/00H04N7/167
    • G06Q20/1235G06F21/10G06F21/6218G06Q2220/12H04N21/00
    • Some embodiments of the invention provide a method for distributing content over a network. The method distributes a single media storage structure to a device (e.g., a computer, portable player, etc.) that connects to the network. The media storage structure includes first and second pieces of encrypted content. Based on whether the device is allowed to access the first piece of content, the second piece of content, or both, the method provides the device with a set of keys for decrypting the pieces of the content that the device is able to access. The provided set of keys might include one or more keys for decrypting only one of the two encrypted pieces of content. Alternatively, it might include one or more keys for decrypting both encrypted pieces of content. For instance, the selected set of keys might include a first key for decrypting the first encrypted piece and a second key for decrypting the second encrypted piece. Based on the provided set of keys, the device can then decrypt and access either one of the two pieces of content in the media storage structure or both pieces of encrypted content in the media storage structure.
    • 本发明的一些实施例提供了一种通过网络分发内容的方法。 该方法将单个媒体存储结构分发到连接到网络的设备(例如,计算机,便携式播放器等)。 媒体存储结构包括第一和第二片加密内容。 基于该设备是允许访问第一条内容,第二条内容还是两者,该方法向设备提供一组密钥,用于解密设备能够访问的内容片段。 所提供的密钥集可以包括用于仅解密两个加密的内容中的一个的一个或多个密钥。 或者,它可以包括用于解密加密的内容片段的一个或多个密钥。 例如,所选择的密钥集合可以包括用于解密第一加密片段的第一密钥和用于解密第二加密片段的第二密钥。 基于所提供的一组密钥,设备可以解密和访问媒体存储结构中的两条内容中的任何一个或媒体存储结构中的两条加密内容。
    • 28. 发明授权
    • System and method for call path enforcement
    • 呼叫路径执行的系统和方法
    • US08302210B2
    • 2012-10-30
    • US12546520
    • 2009-08-24
    • Ginger M. MylesSrinivas VedulaGianpaolo FasoliJulien LerougeTanya Michelle LattnerAugustin J. Farrugia
    • Ginger M. MylesSrinivas VedulaGianpaolo FasoliJulien LerougeTanya Michelle LattnerAugustin J. Farrugia
    • G06F21/00
    • G06F21/54G06F9/4484G06F9/544G06F9/545
    • Disclosed herein are systems, computer-implemented methods, and computer-readable storage media for call path enforcement. The method includes tracking, during run-time, a run-time call order for a series of function calls in a software program, and when executing a protected function call during run-time, allowing or causing proper execution of a protected function call only if the run-time call order matches a predetermined order. The predetermined order can be an expected run-time call order based on a programmed order of function calls in the software program. The method can include maintaining an evolving value associated with the run-time call order and calling the protected function by passing the evolving value and function parameters corrupted based on the evolving value. The protected function uncorrupts the corrupted parameters based on the passed evolving value and an expected predetermined call order. A buffer containing the uncorrupted parameters can replace the corrupted parameters.
    • 本文公开了用于呼叫路径实施的系统,计算机实现的方法和计算机可读存储介质。 该方法包括在运行期间跟踪软件程序中一系列函数调用的运行时调用顺序,以及在运行时执行受保护函数调用时,只允许或导致仅受保护函数调用的正确执行 如果运行时间调用顺序与预定顺序相匹配。 预定顺序可以是基于软件程序中的功能调用的编程顺序的期望的运行时呼叫顺序。 该方法可以包括维护与运行时呼叫顺序相关联的演进值,并通过传递基于演进值而破坏的演进值和功能参数来调用受保护功能。 受保护的功能基于传递的演进值和预期的预定呼叫顺序来破坏已损坏的参数。 包含未受损参数的缓冲区可以替换损坏的参数。